DICO DCC 22414 Chap. 1 To 5 Notes
DICO DCC 22414 Chap. 1 To 5 Notes
DICO DCC 22414 Chap. 1 To 5 Notes
Data communication is the process of transferring digital information between two points.
Data can be alphabets, numeric or symbols and it consists of any one or the combination of the
following:
Microprocessor op-codes, control codes, user addresses, program data or data base information.
At the source or destination the data are in digital form but during the transmission it may be
analog or digital.
A data communication network can be simply consisting of two computers connected to each
other a public telecommunication network.
Data Communications
When we communicate, we are sharing information. This sharing can be local or remote. Between
individuals, local communication usually occurs face to face, while remote communication takes
place over distance. The term telecommunication, which includes telephony, telegraphy, and
television, means communication at a distance (tele is Greek for "far").
The word data refers to information presented in whatever form is agreed upon by the parties
creating and using the data.
Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable. For data communications to occur, the communicating
devices must be part of a communication system made up of a combination of hardware (physical
equipment) and software (programs).
1. Delivery: The system must deliver data to the correct destination. Data must be received by
the intended device or user and only by that device or user.
2 Accuracy: The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are useless.
In the case of video and audio, timely delivery means delivering data as they are produced, in the
same order that they are produced, and without significant delay. This kind of delivery is called
real-time transmission.
4. Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets. For example, let us assume that video packets are sent every
3D Ms. If some of the packets arrive with 3D-ms delay and others with 4D-ms delay, an uneven
quality in the video is the result.
Q. Draw the components of data communication systems and state the function of each block.
2. Sender: The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
3. Receiver: The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
4. Transmission medium: The transmission medium is the physical path by which a message
travels from sender to receiver. Some examples of transmission media include twisted-pair wire,
coaxial cable, fiber-optic cable, and radio waves.
Q. Explain Simplex, Half Duplex and Full Duplex communication with examples.
Communication Modes
Based on whether the system communicates only in one direction or otherwise, the communication
systems are classified as
Simplex systems
Half duplex systems
Full duplex systems
1. Simplex Systems
In Simplex mode, the communication is unidirectional, as on a one-way street.
Only one of the two devices on a link can transmit; the other can only receive.
Keyboards and traditional monitors are examples of simplex devices. The keyboard can
only introduce input; the monitor can only accept output.
The simplex mode can use the entire capacity of the channel to send data in one direction.
When one device is sending, the other can only receive, and vice versa.
The half-duplex mode is like a one-lane road with traffic allowed in both directions. When
cars are traveling in one direction, cars going the other way must wait. In a half-duplex
transmission, the entire capacity of a channel is taken over by whichever of the two devices is
transmitting at the time. Walkie-talkies and CB (citizens band) radios are both half-duplex
systems.
The half-duplex mode is used in cases where there is no need for communication in both
directions at the same time; the entire capacity of the channel can be utilized for each
direction.
3. Full-Duplex
In full-duplex mode (also called duplex), both stations can transmit and receive
simultaneously.
The full-duplex mode is like a two-way street with traffic flowing in both directions at the
same time. In full-duplex mode, signals going in one direction share the capacity of the link:
with signals going in the other direction. This sharing can occur in two ways: Either the link
must contain two physically separate transmission paths, one for sending and the other for
receiving; or the capacity of the channel is divided between signals traveling in both
directions.
When two people are communicating by a telephone line, both can talk and listen at the same
time. The full-duplex mode is used when communication in both directions is required all the
time. The capacity of the channel, however, must be divided between the two directions.
Protocol:
A protocol is a set of rules that govern data communications. A protocol defines what is
communicated, how it is communicated, and when it is communicated.
The term syntax refers to the structure or format of the data, meaning the order in which they
are presented.
For example, a simple protocol might expect the first 8 bits of data to be the address of the
sender, the second 8 bits to be the address of the receiver, and the rest of the stream to be the
message itself.
How is a particular pattern to be interpreted, and what action is to be taken based on that
interpretation? For example, does an address identify the route to be taken or the final
destination of the message?
3) Timing: (when it should be communicated)
The term timing refers to two characteristics: when data should be sent and how fast they can
be sent. For example, if a sender produces data at 100 Mbps but the receiver can process data
at only 1 Mbps, the transmission will overload the receiver and some data will be lost.
Q. Define Standard. Name any four Standard Organizations. Give their functions
Standards:
Standards provide guidelines to manufacturers, vendors, government agencies, and other
service providers to ensure the kind of interconnectivity necessary in today's marketplace and
in international communications.
Standards are essential in creating and maintaining an open and competitive market for
equipment manufacturers and in guaranteeing national and international interoperability of
data and telecommunications technology and processes.
Data communication standards fall into two categories: de facto (meaning "by fact" or "by
convention") and de jure (meaning "by law" or "by regulation").
1) De facto:
Standards that have not been approved by an organized body but have been adopted as
standards through widespread use are de facto standards.
De facto standards are often established originally by manufacturers who seek to define the
functionality of a new product or technology.
2) De jure:
Those standards that have been legislated by an officially recognized body are de jure
standards.
Standards Organizations:
Standards are developed through the cooperation of standards creation committees, forums,
and government regulatory agencies.
(ISO): The ISO is a multinational body whose membership is drawn mainly from the
standards creation committees of various governments throughout the world.
The ISO is active in developing cooperation in the realms of scientific, technological, and
economic activity.
By the early 1970s, a number of countries were defining national standards for
telecommunications, but there was still little international compatibility.
The United Nations responded by forming, as part of its International Telecommunication
Union (ITU), a committee, the Consultative Committee for International Telegraphy and
Telephony (CCITT).
This committee was devoted to the research and establishment of standards for
telecommunications in general and for phone and data systems in particular. On March 1,
1993, the name of this committee was changed to the International Telecommunication
Union - Telecommunication Standards Sector (ITU-T).
Bandwidth, Data Transmission Rate, Baud Rate and Bits Per Second
Bandwidth is measured as the amount of data that can be transferred from one point to
another within a network in a specific amount of time. Typically, bandwidth is expressed as a
bitrate and measured in bits per second (bps).
The term bandwidth refers to the transmission capacity of a connection and is an important
factor when determining the quality and speed of a network or the internet connection.
Definition of Bit Rate
Bit rate can be defined as the number of bit intervals per second. And bit interval is referred to as the
time needed to transfer one single bit. In simpler words, the bit rate is the number of bits sent in one
second, usually expressed in bits per second (bps). For example, kilobits per second (Kbps), Megabits
per second (Mbps), Gigabits per second (Gbps), etc.
An example can illustrate it. For example, 1500 baud rate illustrates that the channel state can alter up
to 1500 times per second. The meaning of changing state means that channel can change its state from
0 to 1 or from 1 to 0 up to 1500 times per second (in the given case).
1. Bit rate is the number bits (0’s and 1’s) transmitted per second.
On the other hand Baud rate is the number of times a signal is traveling comprised of
bits.
2. Baud rate can determine the bandwidth of the channel or its required amount to send
the signal while through Bit rate it is not possible.Bit Rate can be expressed by the
given equation:
Bit rate = baud rate x the number of bits per signal unit
In contrary Baud rate is expressed in the given equation:
Baud rate = bit rate / the number of bits per signal unit
Question: Calculate the baud rate for the given bit rate and type of modulation:
(i) 5000 bps, ASK (ii) 4000 bps, FSK
Answer:
For baud rate (S), we know that the formula is:
S=N/r.
N=S*r
Here, N is Bit rate, S is the Baud rate
r = number of bits in signal elements
So, at first we need to calculate r for each case.
We know, r = log2L.
BASIS FOR
BIT RATE BAUD RATE
COMPARISON
Basic Bit rate is the count of bits per Baud rate is the count of signal units per
second. second.
Meaning It determines the number of bits It determines how many times the state of
traveled per second. a signal is changing.
Term usually used While the emphasis is on While data transmission over the channel
computer efficiency. is more concerned.
Bandwidth Can not determine the It can determine how much bandwidth is
determination bandwidth. required to send the signal.
Equation Bit rate = baud rate x the count Baud rate = bit rate / the number of bits
of bits per signal unit per signal unit
Digital Signal
A digital signal - a must for computer processing - is described as using binary (0s and 1s),
and therefore, cannot take on any fractional values. As illustrated in the graphic below, digital
signals retain a uniform structure, providing a constant and consistent signal. Because of the
inherent reliability of the digital signal, technology using it is rapidly replacing a large
percentage of analog applications and devices. For example, the wristwatch, showing the
time of day, with its minute, hour, and sweeping second hands, is being replaced by the
digital watch, which offers the time of day and other information using a numerical display.
A typical digital signal is represented below. Note the equally dispersed 1s and 0s.
V:Peak Amplitude
F:frequency
t:Time(seconds)
θ:Phase(degree or radians)
Amplitude is the highest height of the signal, maximum value or strength of the signal over
time; typically, this value is measured in volts.
frequency is the rate [in cycles per second, or Hertz (Hz)] at which the signal repeats., and
Phase is a measure of the relative position in time within a single period of a signal
An analog signal is not resistant toward the noise, therefore; it faces distortion as well as
reduces the transmission quality.
Non-periodic signals
A signal that does not repeats its pattern over a period is called aperiodic signal or non
periodic.
Both the Analog and Digital can be periodic or aperiodic: but in data communication periodic
analog signals and aperiodic digital signals are used.
For example, voice and video are continuously varying patterns of intensity. Most data
collected by sensors, such as temperature and pressure, are continuous valued.
The most familiar example of analog data is audio, which, in the form of acoustic sound
waves, can be perceived directly by human beings.
Digital data take on discrete values; examples are text and integers.
They cannot be easily stored or transmitted by data processing and communications systems
in character form.
Morse code, International Reference Alphabet (IRA) are used to translate text into binary.
Analog transmission
Analog transmission is a means of transmitting analog signals without regard to their
content; the signals may represent analog data (e.g., voice) or digital data.
In either case, the analog signal will become weaker (attenuate) after a certain distance.
To achieve longer distances, the analog transmission system includes amplifiers that boost the
energy in the signal.
Unfortunately, the amplifier also boosts the noise components.
Digital transmission
Digital transmission, in contrast, assumes a binary content to the signal.
A digital signal can be transmitted only a limited distance before attenuation.
To achieve greater distances, repeaters are used. A repeater receives the digital signal,
recovers the pattern of 1s and 0s, and retransmits a new signal. Thus the attenuation is
overcome.
Both analog and digital information can be encoded as either analog or digital signals. The
particular encoding that is chosen depends on the specific requirements to be met and the media
and communications facilities available.
More complex encoding schemes are used to improve performance, by altering the
spectrum of the signal.
Analog data, such as voice and video, are often digitized to be able to use digital
transmission facilities.
The simplest technique is pulse code modulation (PCM), which involves sampling
the analog data.
Analog data are modulated by a carrier frequency to produce an analog signal, which
can be utilized on an analog transmission system.
Modulation:
Now we have to develop some way to send the information of message signal via this carrier signal.
The carrier signal is a high frequency sinusoidal signal represented by amplitude, frequency and
phase. We can vary one of this parameter accordingly with the message information.
What is Modulation?
Modulation is an operation of varying amplitude or frequency or phase of carrier signal according to
the instantaneous amplitude of the baseband signal/modulating signal.
Here baseband signals comes from a audio/video or computer. Baseband signals are also called
modulating signal as it modulates carrir signal. Carrier signals are high frequecy radio waves it
generally comes from a radio frequency oscillators. These two signls are combined in modulator.
Modulator takes the instantenious amplitute of baseband signal and varies amplitute/frequency/phase
of carrier signal. Resultant signal is a modulated signal. It goes to an RF-amplifier for signal power
boosting and then feed to antenna or a co-axial cable.
There are two types of modulation analog and digital. Analog modulation delas with the voice, video
and regular waves of base band signals. Where as digital modulations are with bit streams or symbols
from computing vevices as base band signals.
DeModulation:
Demodulation is the opposite process of modulation. Modulator is a part of signal transmitter
where as demodulator is the receiving side. In broadcast system radio transmitting station does to
modulation part. A radio receiver acts as a demodulator. A modem receives signals and also transmits
signals thus it does modulation and demodulation at the same time. Thus the name modem has been
given. A radio antenna receives low power signal. A co-axial cable end point can also take as an
signal input. An RF amplifier boosts the signal amplitude. Then the signal goes to a demodulator.
demodulator does the reverse of modulation and extracts the backband signal from carrier. Then the
base band signal is amplified to feed a audio speaker or video monitor or TTL/CMOS signal levels to
match computer inputs.
What is De-modulation?
Demodulation is the opposite process of modulation where the varying amplitude, frequency or phase
of carrier signal is extracted to construct the original the message signal.
ASK Modulator
The ASK modulator block diagram comprises of the carrier signal generator, the binary
sequence from the message signal and the band-limited filter. Following is the block
diagram of the ASK Modulator.
Application:
FSK Modulator
The FSK modulator block diagram comprises of two oscillators with a clock and the input
binary sequence. Following is its block diagram.
The two oscillators, producing a higher and a lower frequency signals, are connected to a
switch along with an internal clock. To avoid the abrupt phase discontinuities of the output
waveform during the transmission of the message, a clock is applied to both the oscillators,
internally. The binary input sequence is applied to the transmitter so as to choose the
frequencies according to the binary input.
Question: Explain the process of FSK modulation with diagram. (4Marks)
Answer: In FSK, frequency of sinusoidal carrier is shifted between two discrete values. One
of these frequencies (f1) represents a binary 1 and other value (f2) represents binary 0.There is
no change in amplitude of carrier. It consists of voltage controlled oscillators (VCO) which
produce sine waves at frequencies f1 and f0. Corresponding to "binary 0 "input, the VCO
produces a sinewave of frequency f0 whereas corresponding to binary 1 input VCO produces
a sinewave of frequency f1.
Application:
PSK is of two types, depending upon the phases the signal gets shifted. They are −
BPSK is basically a Double Side Band Suppressed Carrier (DSBSC) modulation scheme, for
message being the digital information.
If this kind of techniques are further extended, PSK can be done by eight or sixteen values
also, depending upon the requirement.
BPSK Modulator
The block diagram of Binary Phase Shift Keying consists of the balance modulator which
has the carrier sine wave as one input and the binary sequence as the other input. Following
is the diagrammatic representation.
The modulation of BPSK is done using a balance modulator, which multiplies the two
signals applied at the input. For a zero binary input, the phase will be 0° and for a high input,
the phase reversal is of 180°.
Following is the diagrammatic representation of BPSK Modulated output wave along with
its given input.
The output sine wave of the modulator will be the direct input carrier or the inverted (180°
phase shifted) input carrier, which is a function of the data signal.
Question: Explain process of phase shift keying.(4 Marks)
Answer: Phase-shift keying (PSK) is a digital to analog modulation scheme based on
changing, or modulating, the initial phase of a carrier signal. PSK is used to represent digital
information, such as binary digits zero (0) and one (1).The modulation of PSK is done using a
balance modulator, which multiplies the two signals applied at the input. For a zero binary
input, the phase will be 180° and for a high input, the phase reversal is of 0°. Following is the
diagrammatic representation of PSK Modulated output wave along with its given input.
The output sine wave of the modulator will be the direct input carrier or the inverted (180°
phase shifted) input carrier, which is a function of the data signal. Amplitude and frequency
of the original carrier signal is kept constant.
Application:
1. AMPLITUDE MODULATION:
The modulation in which the amplitude of the carrier wave is varied according to the
instantaneous amplitude of the modulating signal keeping phase and frequency as constant.
AM is normally implemented by using a simple multiplier because the amplitude of the
carrier signal needs to be changed according to the amplitude of the modulating signal.
AM bandwidth:
The modulation creates a bandwidth that is twice the bandwidth of the modulating signal and
covers a range centered on the carrier frequency.
Bandwidth= 2fm
AM Advantage
AM is the simplest type of modulation. Hardware design of both transmitter and receiver is
very simple and less cost effective.
AM Disadvange:
AM is very susceptible to noise.
Application:
AM radio broad cast is an example
2. Frequency modulation
FM or Frequency modulation is the process of varying the in instantaneous frequency of Carrier signal
accordingly with instantaneous amplitude of message signal.
FM Advantage
Modulation and demodulation does not catch any channel noise.
FM Disadvange:
Circuit needed for FM modulation and demodulation is bit complicated than AM
Application:
FM radio broad cast is an example
PM Advantage
o Modulation and demodulation does not catch any channel noise.
PM Disadvange:
o Circuit needed for PM modulation and demodulation is bit complicated than AM and FM
Application:
o Satellite communication.
Chapter No: 2
TRANSMISSION MEDIA
Transmission Media
• Transmission medium is the way in which data is transmitted from one place to another.
• It provide a pathway over which the message can travel from sender-to-receiver.
• Each of the message can be sent in the form of data by converting them into binary digits.
• These binary digits are then encoded into a signal that can be transmitted over the appropriate
medium.
Guided transmission media are the cables that are tangible or have physical existence.
Bounded transmission means having connectivity between a source and destination using
cables or wires. The signals have to travel through this channel i.e. physical media
Wired/Guided
Media
Advantages of UTP:
Disadvantages of UTP:
Application
• This type of cable has a metal foil covering which encases each pair of insulator conductors.
• Electromagnetic noise penetration is prevented by metal casing. Shielding also eliminates
crosstalk.
• It is similar to UTP but has a mesh shielding that’s protects it from EMI which allows for higher
transmission rate.
• It is more expensive than coaxial and unshielded twisted pair.
Advantages of STP:
Disadvantages of STP:
STP is similar to UTP but with each pair covered by an additional copper braid jacket
or foil wrapping. This shielding helps to protect the signals on the cables from
external interference.
Shielding provides a means to reflect or absorb electric fields that are present around
cables. Shielding comes in a variety of forms from copper braiding or copper meshes
to aluminized.
STP is more expensive than UTP but has the benefit of being able to support higher
transmission rates over longer distances.
STP is heavier and more difficult to manufacture, but it can greatly improve the
signaling rate in a given transmission scheme Twisting provides cancellation of
magnetically induced fields and currents on a pair of conductors.
Magnetic fields arise around other heavy current-carrying conductors and around
large electric motors. Various grades of copper cables are available, with Grade 5
being the best and most expensive.
STP is used in IBM token ring networks.
• Coaxial cables are copper cables with better shielding than twisted pair cables, so that
transmitted signals may travel longer distances at higher speeds.
• Coaxial cabling is the primary type of cabling used by the cable television industry and is also
widely used for computer networks, such as Ethernet.
• Coaxial cable has two wires of copper.
• The core/inner copper wire in centre and is made of solid conductor. It is enclosed in an
insulating sheath.
• The second/outer copper wire is wrapped around, and is used to protect from external
electromagnetic interference (Noise).
• This all is covered by plastic cover used to protect the inner layers from physical damage such
as fire or water.
• Coaxial cables are categorized by their Radio Government (RG) ratings. Each RG number
denotes a unique set of physical specifications
• A fibre optic cable is made of high quality of thin glass or plastic and is used to transfer
digital data signals in the form of light up to distance of thousands of miles.
• Fibre optic cables are not affected by electromagnetic interference, so noise and distortion is
very less.
• Fibre optic cables carry communication signals using pulses of light generated by small lasers
or light-emitting diodes (LEDs).
• The cable consists of one or more strands of glass, each only slightly thicker than a human
hair. The centre of each strand is called the core, which provides the pathway for light to
travel. The core is surrounded by a layer of glass called cladding that reflects light inward to
avoid loss of signal and allow the light to pass through bends in the cable. No light escapes
the glass core because of this reflective cladding.
Single-mode:
It uses step-index fiber and a highly focused source of light that limits beam to a
small range of angles, all close to horizontal.
It is manufactured with much smaller diameter than that of multimode fiber and
with substantially lower density.
The decrease in density results in a critical angle i.e. close enough to 90 to make
propagation of beams almost horizontal.
Question: Differentiate between twisted pair coaxial cable and fiber optic cable (any 4
points).
II. Wireless (Unguided/Unbound) Transmission Media
• A wave can be described as a disturbance that travels through a medium from one location to
another location.
• A wave is a transfer of energy, usually through a form of matter called a medium.
• There are a special type of wave that can travel without a medium, called electromagnetic
waves (also called EM waves), which are waves like radio waves and microwaves.
• Unlike sound waves and water waves, electromagnetic waves don't need a fluid, or a solid, or
even air to help them travel from one place to another. EM waves can travel across the great
vacuum of space, which is why we see light from distant stars and planets.
• Electromagnetic waves are formed when an electric field comes in contact with a magnetic
field. They are hence known as 'electromagnetic' waves.
• Electromagnetic (EM) radiation is a form of energy that is all around us and takes many forms,
such as radio waves, microwaves, X-rays and gamma rays.
• Sunlight is also a form of EM energy. Electromagnetic energy from the sun comes to Earth in
the form of radiation.
• The Electromagnetic Spectrum describes a wide range of different electromagnetic waves.
Radio Waves Transmission
• Radio waves are EM (Electromagnetic) waves that have wavelengths between 1 millimetre and
100 kilometres (or 300 GHz and 3 kHz in frequency).
• Radio frequency is easy to generate because it has large wavelength and can travel long
distance.
• Radio waves are generated by radio transmitters and received by radio receivers.
• Radio stations transmit radio waves using transmitters, which are received by the receiver
installed in our devices. Both transmitters and receivers use antennas to radiate or capture radio
signals
• It can penetrate walls easily, so these waves are widely used for communication both indoors
and outdoors.
• Radio waves are omnidirectional means they travel in all the directions from the source.
• When an antenna transmits radio waves, they are propagated in all directions.
• A sending antenna send waves that can be received by any receiving antenna. The
omnidirectional property has disadvantage, too. The radio waves transmitted by one antenna are
susceptible to interference by another antenna that may send signal using the same frequency or
band.
• It is Used Mobile, AM/FM radio, television
• Microwaves are a type of radio waves with high frequencies. It can be classified as a subclass of
radio waves. The frequency of microwaves lies in the 300 MHz to 300 GHz.
• Unlike radio waves, microwaves are unidirectional, in which the sending and receiving
antennas need to be aligned.
• Microwaves are widely used for point-to-point communications because their small wavelength,
which means that the signal is focused into a narrow beam. Additionally, each antenna must be
within line of sight of the next antenna.
• Electromagnetic waves above 100 MHz tend to travel in a straight line and signals over them can
be sent by beaming those waves towards one particular station. Because Microwaves travels in
straight lines, both sender and receiver must be aligned to be strictly in line-of-sight.
• Microwaves have higher frequencies and do not penetrate wall like obstacles.
• It is used for satellite communication, navigation, radar, remote sensing and other short distance
communication systems.\
Question: Explain the reason for using different frequency bands for uplink
and downlink in satellite communication.
The uplink frequency is the frequency which is used for transmission of signals from
earth station transmitter to the satellite.
The downlink frequency is the frequency which is used for transmission of signals
from the satellite to the earth station receiver
• Infrared signals have frequencies between 300 GHz to 400 THz. They are used for short-range
communication.
• Infrared waves are used for very short distance communication like TV remote, wireless
speakers, automatic doors, hand held devices etc.
• Infrared waves having high frequencies prevents interference b/w one system to another.
• Infrared signals have high frequencies and cannot penetrate walls. Due to its short-range
communication system, the use of an infrared communication system in one room will not be
affected by the use of another system in the next room. This is why using an infrared TV remote
control in our home will not interfere with the use of our neighbour's infrared TV remote control.
• Infrared signals cannot be used for long distance communication. In addition, we cannot use
infrared waves outside a building because sun's rays contain infrared waves that can interfere
with communication.
Chapter No: 3
MULTIPLEXING AND SWITCHING
Multiplexing and De-multiplexing
• To combine multiple signals (analog or digital) for transmission over a single line or media.
• A common type of multiplexing combines several low-speed signals for transmission over a
single high-speed connection.
• Multiplexing is done by using a device called Multiplexer (MUX) that combines n input
lines to generate one output line i.e. (many to one). Therefore multiplexer (MUX) has
several inputs and one output.
• At the receiving end, a device called Demultiplexer (DEMUX) is used that separates signal
into its component signals. So DEMUX has one input and several outputs.
Concept of Multiplexing
As shown in fig multiplexer takes 4 input lines and diverts them to single output line.
The signal from 4 different devices is combined and carried by this single line.
At the receiving side, a demultiplexer takes this signal from a single line & breaks it into
the original signals and passes them to the 4 different receivers.
Advantages of Multiplexing
If no multiplexing is used between the users at two different sites that are distance apart,
then separate communication lines would be required as shown in fig.
This is not only costly but also become difficult to manage. If multiplexing is used then,
only one line is required. This leads to the reduction in the line cost and also it would be
easier to keep track of one line than several lines.
More than one signal can be sent over a single medium.
The bandwidth of a medium can be utilized effectively.
Why to use Multiplexing?
• If there are multiple signals to share one medium, then the medium must be divided in
such a way that each signal is given some portion of the available bandwidth.
• For example: If there are 10 signals and bandwidth of medium is100 units, then the 10
unit is shared by each signal.
• When multiple signals share the common medium, there is a possibility of collision.
Multiplexing concept is used to avoid such collision.
Types of Multiplexing
It is analog technique. Each signal is assigned a different frequency (sub channel) within
the main channel.
FDM requires that the bandwidth of a link should be greater than the combined
bandwidths of the various signals to be transmitted. Thus each signal having different
frequency forms a particular logical channel on the link and follows this channel only.
These channels are then separated by the strips of unused bandwidth called guard bands.
These guard bands prevent the signals from overlapping as shown in Fig.
In FDM, signals to be transmitted must be analog signals. Thus digital signals need to
be converted to analog form, if they are to use FDM.
A typical analog Internet connection via a twisted pair telephone line requires approximately
three kilohertz (3 kHz) of bandwidth for accurate and reliable data transfer.
Twisted-pair lines are common in households and small businesses. But major telephone cables,
operating between large businesses, government agencies, and municipalities, are capable of
much larger bandwidths.
FDM Process
In FDM, signals generated by each sending device modulate different carrier
frequencies. These modulated signals are then combined into a single composite signal
that can be transported by the link.
Carrier frequencies are separated by sufficient bandwidth to accommodate the
modulated signal.
These bandwidth ranges are the channels through which the various signals travel.
Channels can be separated by strips of unused bandwidth guard bands to prevent
signals from overlapping.
Figure: Multiplexing Process :
Question: Five channels, each with a 100-kHz bandwidth, are to be multiplexed together. What is
the minimum bandwidth of the link if there is a need for a guard band of 10 kHz between the
channels to prevent interference? (4 Marks)
Answer:
• For five channels, we need at least four guard bands. This means that the required
bandwidth is at least
Answer:
• Five channels each with 200 kHz bandwidth are multiplexed using FDM.
• For five channels, we need at least four guard bands.
• Guard Bands of 10 KHz is used.
• This means that the required bandwidth is at least :
• 5*200+4*10=1040 KHz.
Advantages of FDM:
Wavelength-Division Multiplexing
• Wavelength-division multiplexing (WDM) is designed to use the high-data-rate capability
of fiber-optic cable.
• The optical fiber data rate is higher than the data rate of metallic transmission cable, but
using a fiber-optic cable for a single line wastes the available bandwidth.
• WDM is conceptually the same as FDM, except that the multiplexing and Demultiplexing
involve optical signals transmitted through fiber-optic channels. The difference is that the
frequencies are very high.
• WDM is an analog multiplexing technique.
• In WDM different signals are optical or light signals that are transmitted through optical
fiber.
• Various light waves from different sources are combined to form a composite light signal
that is transmitted across the channel to the receiver.
• At the receiver side, this composite light signal is broken into different light waves by
Demultiplexer.
• The Combining and the Splitting of light waves is done by using a PRISM. Prism bends beam of
light based on the angle of incidence and the frequency of light wave.
Relatively simple
An order of data is maintained
No addressing information is required, channel capacity should be large.
Commonly used with ISDN (Integrated Services Digital Network).
1. The channel capacity cannot be fully utilized. Some of the slots go empty in certain frames.
2. The capacity of single communication line that is used to carry the various transmission
should be greater than the total speed of input lines.
Disadvantages of TDM :
Switching Nodes:
• Nodes may connect to other nodes, or to some stations.
• Network is usually partially connected
• there is not a direct link between every possible pair of nodes.
• However, some redundant connections are desirable for reliability
Types of Switching
Circuit Switching
Circuit Switching is used in public telephone networks.
Telephone network provides telephone service which involves the two way, real-time
transmission of voice signals across a network.
The network connection allows electrical current and the associated voice signal to flow
between the two users.
These networks are connection oriented because they require setting up of a connection
before the actual transfer of information can take place.
The transfer mode of a network that involves setting up a dedicated end to end
connection is called Circuit Switching.
Communication via circuit switching has three phases:
1. Circuit establishment (link by link)
Routing & resource allocation (FDM or TDM)
2. Data transfer
3. Circuit disconnect
Deallocate the dedicated resources
Phases of Operation in Circuit Switching
Communication via Circuit switching takes place over three phases of operation:
For example consider above figure, station A sends a request to node-4 requesting a
connection to station E.
Typically, the link from A to 4 is a dedicated line node 4 must find the next route
leading to E node 4 selects the link to node 5 and so on then sends a message
requesting connection to E.
Thus, a dedicated path has been established from A-4-5-6-E
2. Data Transfer -After establishing a connection actual transfer of information can take
place. It can be analog or digital depending on the nature of network.
Data can now be transmitted from A through the network to E.
The path is A-4 link, internal switching through 4, 4-5 channel, internal switching
through 5, 5-6 channel, internal switching through 6, 6-E link. Generally, the
connection is full duplex.
3. Circuit disconnect (Teardown) : After some time the connection between two users
is terminated usually by the action of one or two stations.Signals must be propagated to
nodes 4, 5, and 6 to deallocate the dedicated resources.
Advantages :
The dedicated transmission channel provides a guaranteed data rate.
Because of dedicated path there is no delay in data flow.
This method is suitable for long continuous transmission.
Disadvantages :
Since the connection is dedicated it cannot be used to transmit any other data even if the
channel is free.
Dedicated channels require more bandwidth.
It takes more time to establish connection.
Message Switching
With message switching there is no need to establish a dedicated path between two stations.
When a station sends a message, the destination address is appended to the message.
The message is then transmitted through the network, in its entirety, from node to node.
Each node receives the entire message, stores it in its entirety on disk, and then transmits the
message to the next node.
This type of network is called a store-and-forward network.
Advantages:
• Channel efficiency can be greater compared to circuit switched systems, because more
devices are sharing the channel.
• Traffic congestion can be reduced, because messages may be temporarily stored in route.
• Message priorities can be established due to store-and-forward technique.
• Message broadcasting can be achieved with the use of broadcast address appended in the
message.
Disadvantages
• Message switching is not compatible with interactive applications.
• Store-and-forward devices are expensive, because they must have large disks to hold
potentially long messages.
Packet Switching
In Packet Switching, messages are broken up into packets, each of which includes a header
with source, destination and intermediate node address information.
Packet switching can be seen as a solution that tries to combine the advantages of message
and circuit switching.
There are two methods of packet switching:
o Datagram and
o virtual circuit.
In packet switching methods, a message is broken into small parts, called packets.
Each packet is tagged with appropriate source and destination addresses.
Since packets have a strictly defined maximum length, they can be stored in main memory
instead of disk, therefore access delay and cost are minimized.
Also the transmission speeds, between nodes, are optimized.
With current technology, packets are generally accepted onto the network on a first-come,
first-served basis.
Advantages:
Better utilization of the network segments in terms of the usage of the network path.
If a certain link goes down during the transmission, the remaining packets can be sent
through another route.
Since many users can share transmission resources efficiently, the cost of intermittent data
communication is reduced.
Disadvantages:
Variable transmission delays caused by packet processing and packet queues at packet
switches.
Some packet-switching networks support variable packet sizes; this contributes to longer
packet processing times at packet switches.
Sometimes packet may not arrive at their destination in the order in which they were
originally transmitted
Datagram packet Switching
Each message is divided into a stream of packets. Each packet is separately addressed and
treated as an independent unit with its own control instructions.
The switching devices route each packet independently through the network, with each
intermediate node determining the packet’s next route segment.
Before transmission starts, the sequence of packets and there are established by the
exchange of control information between the sending terminal, the network and the
receiving terminal.
Resources are not allocated for any packet so there is no reserved bandwidth.
The switches in datagram network are referred to as routers.
No dedicated connection is established between the sender and the receiver, so this network
is called as connectionless network.
Datagram packet switching operates at network layer
Advantages:
No call setup phase required.
More flexible because routing can be used to avoid congested port of the network.
Cheaper in cost.
Disadvantages:
Packets are forwarded slowly as compare to the Virtual circuit approach.
Virtual Circuit Packet Switching
It establishes a logical connection between the sending and receiving devices called Virtual
circuit.
The sending device starts the conversation by communicating with the receiving device and
agreeing as communication parameters, such as maximum message size and the path to be
taken.
Once this virtual circuit is established; the two devices use it for the rest of the conversation.
All packets travel through the logical connection established between the sending device
and the receiving device.
Similar to circuit switched network, there are setup and teardown phases along with the
data transfer phase.
Virtual circuit is established in the data link layer.
Virtual Circuit Identifier(VCI) is a small number which is used by a frame between two
switches.
1. Set up
2. Data Transfer
3. Teardown
Set up Phase:
o In the Set up phase a switch creates an entry for a virtual circuit by following two
approaches-
Figure highlights the key characteristics of any spread spectrum system. Input is fed into a
channel encoder that produces an analog signal with a relatively narrow bandwidth around some
center frequency. This signal is further modulated using a sequence of digits known as a
spreading code or spreading sequence. Typically, but not always, the spreading code is
generated by a pseudo noise, or pseudorandom number, generator. The effect of this modulation
is to increase significantly the bandwidth (spread the spectrum) of the signal to be transmitted.
On the receiving end, the same digit sequence is used to demodulate the spread spectrum signal.
Finally, the signal is fed into a channel decoder to recover the data.
Frequency Hopped Spread Spectrum (FHSS)
This is frequency hopping technique, where the users are made to change the frequencies of
usage, from one to another in a specified time interval, hence called as frequency hopping.
For example, a frequency was allotted to sender 1 for a particular period of time. Now, after
a while, sender 1 hops to the other frequency and sender 2 uses the first frequency, which
was previously used by sender 1. This is called as frequency reuse.
The frequencies of the data are hopped from one to another in order to provide a secure
transmission. The amount of time spent on each frequency hop is called as Dwell time.
With frequency-hopping spread spectrum (FHSS), the signal is broadcast over a seemingly
random series of radio frequencies, hopping from frequency to frequency at fixed intervals.
A receiver, hopping between frequencies in synchronization with the transmitter, picks up
the message.
Would-be eavesdroppers hear only unintelligible blips. Attempts to jam the signal on one
frequency succeed only at knocking out a few bits of it.
Example:
One technique with direct sequence spread spectrum is to combine the digital information
stream with the spreading code bit stream using an exclusive-OR (XOR).
Figure shows an example. Note that an information bit of one inverts the spreading code bits in
the combination, while an information bit of zero causes the spreading code bits to be
transmitted without inversion. The combination bit stream has the data rate of the original
spreading code sequence, so it has a wider bandwidth than the information stream. In this
example, the spreading code bit stream is clocked at four times the information rate.
Another Example:
Question: Explain DSSS mechanism with neat diagram.
The direct sequence spread spectrum (DSSS) technique also expands the bandwidth of
the original signal, but the process is different.
In DSSS, we replace each data bit with 𝑛 bits using a spreading code. In other words,
each bit is assigned a code of 𝑛 bits, called chips, where the chip rate is 𝑛 times that of
the data bit.
As an example, let us consider the sequence used in a wireless LAN,the famous Barker
sequence where 𝑛 is 11. We assume that the original signal and the chips in the chip
generator use polar NRZ encoding. Figure shows the chips and the result of multiplying
the original data by the chips to get spread signal.
The entities comprising the corresponding layers on different machines are called peers
It is the peers that communicate by using the protocols
Actually, data is not transferred from layer n on one machine to layer n on another machine
Each layer passes data and control information to the layer immediately below it, until the lowest
layer is reached
Actual data communication takes place through the lowest layer – the physical layer
Design Issues for the Layers
Addressing
Error control
Order of messages must be preserved
Flow control – fast sender and slow receiver!
Disassembling, transmitting, and reassembling large messages
Multiplexing / de-multiplexing
Routing
Concept of Services and Protocols:-
A service is a set of operations that a layer provides to the layer above it
Service defines what operations the layer is prepared to perform
A service relates to the interface between two layers – the lower layer is service provider and the
upper layer is service user
Physical layer:-
Specifications for the physical components of the network.
Functions of Physical Layer:
Bit representation – encode bits into electrical or optical signals
Transmission rate – The number of bits sent each second
Physical characteristics of transmission media
Synchronizing the sender and receiver clocks
Transmission mode – simplex, half-duplex, full duplex
Physical Topology – how devices are connected – ring, star, mesh, bus topology
Data Link Layer
• Data link layer attempts to provide reliable communication over the physical layer interface.
• Breaks the outgoing data into frames and re-assemble the received frames.
• Create and detect frame boundaries.
• Handle errors by implementing an acknowledgement and retransmission scheme.
• Implement flow control.
The data link layer is responsible for moving frames from one hop (node) to the next.
• This sub layer contains methods to regulate the timing of data signals and eliminate
collisions.
• The MAC sub layer determines where one frame of data ends and the next one starts -
frame synchronization.
• There are four means of frame synchronization:
• Time based,
• Character counting,
• Byte stuffing and
• Bit stuffing.
Network Layer:-
Main functions of this layer are:
Responsible for delivery of packets across multiple networks
Routing – Provide mechanisms to transmit data over independent networks that are linked together.
Network layer is responsible only for delivery of individual packets and it does not recognize any
relationship between those packets
Transport Layer:-
Main functions of this layer are:
Responsible for source-to destination delivery of the entire message
Segmentation and reassembly – divide message into smaller segments, number them and transmit.
Reassemble these messages at the receiving end.
Error control – make sure that the entire message arrives without errors – else retransmit.
Session Layer:-
Main functions of this layer are:
• Dialog control – allows two systems to enter into a dialog, keep a track of whose turn it is to transmit
• Synchronization – adds check points (synchronization points) into stream of data.
Presentation Layer:-
Responsibilities of this layer are:
Translation
• Different computers use different encoding systems (bit order translation)
• Convert data into a common format before transmitting.
• Syntax represents info such as character codes - how many bits to represent data – 8 or 7 bits
Compression – reduce number of bits to be transmitted Encryption – transform data into an
unintelligible format at the sending end for data security
Decryption – at the receiving end
Application Layer:-
•Contains protocols that allow the users to access the network (FTP, HTTP, SMTP, etc)
• Does not include application programs such as email, browsers, word processing applications, etc.
• Protocols contain utilities and network-based services that support email via SMTP, Internet access via
HTTP, file transfer via FTP, etc
Data Encapsulation
• The outgoing information will travel down through the layers to the lowest layer.
• While moving down on the source machine, it acquires all the control information
which is required to reach the destination machine.
• The control information is in the form of Headers and Trailer which surrounds the data
received from the layer above.
• This process of adding headers and trailers to the data is called as data encapsulation.
• The information added by each layer is in the form of headers or trailers.
• At layer 1 the entire package is converted to a form that can be transferred to the
receiving machine.
• At the receiving machine, the message is unwrapped layer by layer, with each
process receiving and removing the data meant for it.
• For example, layer 2 removes the data meant for it, then passes the rest to layer 3.
• Layer 3 then removes the data meant for it and passes the rest to layer 4, and so on.
• The headers and trailers contain control information. The headers and trailers form the
envelope which carries the message to the desired destination.
• D7 means the data unit at layer 7, D6 means the data unit at layer 6, and so on.
• The process starts at layer 7 (the application layer), then moves from layer to layer in
descending, sequential order.
• At each layer, a header, or possibly a trailer, can be added to the data unit.
• Commonly, the trailer is added only at layer 2.
• When the formatted data unit passes through the physical layer (layer 1), it is changed
into an electromagnetic signal and transported along a physical link.
Example of Data Encapsulation
The figure shows the example of five layer stack for data encapsulation.
The fifth layer of sending machine wants to send a message M to the fifth layer of
destination machine.
The message M is produced by layer 5 of machine 1 and given to layer 4 for transmission.
Layer 4 adds header H4 in front of the message and pass it to layer 3.
Layer 3 breaks up the incoming message into small units as M1 and M2 and pass these
packets to layer 2.
Layer 2 adds the header as well as footer to each packet obtained from layer 3 and pass it
to layer 1 for physical transmission.
Horizontal communication
1. The horizontal communication is the logical connection between the layers, there is no
direct communication between them.
2. Information included in each protocol header by the transmitting system is a message
that will be carried to the same protocol in the destination system.
3. For two computers to communicate over a n/w, the protocol used at each layer of the
OSI model in the transmitting system must be duplicated at the receiving system.
4. The packet travels up through the protocol stack and each successive header is stripped
of by the appropriate protocol & processed.
5. When the packet arrived at its destination, the process by which the headers are
applied at the source is repeated in server.
Vertical communication:
1. In addition to communicating horizontally with the same protocol in the other system,
the header information also enables each layer to communicate with the layer above &
below it.
Eg. The n/w layer will communicate with the data link layer & transport layer.
2. This interlayer communication is called communication vertical.
3. When a system receives a packet & passes it up through various layers the data link
layer protocol header includes a field which specifies the name of n/w layer protocol to
be used to process the packet.
4. The n/w layer protocol header will specify the name of transport layer protocol to be
used to process the packet.
5. Due to vertical communication, it becomes protocol at each layer simultaneously.
Error detection and correction are implemented either at the data link layer or the
transport layer of the OSI model.
Definition of Error
Networks must be able to transform data from once device to another with complete accuracy.
While the transmission data can be corrupted, for reliable communication errors must be
detected and corrected.
Types of Errors
Single-bit errors
In a single-bit error, only 1 bit in the data unit has changed from either 0 to 1 or 1 to 0.
Single bit errors are the least likely type of errors in serial data transmission because
the noise must have a very short duration which is very rare. However this kind of
errors can happen in parallel transmission.
Example:
o If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1 μs.
o For a single-bit error to occur, the noise must have a duration of only 1 μs, which
is very rare.
Multiple-bit errors
A multi bit error means that 2 or more bits in the data unit have changed
Burst errors
A burst error means that 2 or more consecutive bits in the data unit have changed.
The term burst error means that two or more bits in the data unit have changed from 1
to 0 or from 0 to 1.
Burst errors does not necessarily mean that the errors occur in consecutive bits,
the length of the burst is measured from the first corrupted bit to the last corrupted bit.
Some bits in between may not have been corrupted.
Burst error is most likely to happen in serial transmission since the duration of noise is
normally longer than the duration of a bit.
The number of bits affected depends on the data rate and duration of noise.
Example:
🢂 If data is sent at rate = 1Kbps then a noise of 1/100 sec can affect 10 bits.(1/100*1000)
🢂 If same data is sent at rate = 1Mbps then a noise of 1/100 sec can affect 10,000
bits.(1/100*106)
Error detection
Error detection means to decide whether the received data is correct or not without
having a copy of the original message.
Error detection uses the concept of redundancy, which means adding extra bits for
detecting errors at the destination.
Enough redundancy is added to detect an error.
The receiver knows an error occurred but does not know which bit(s) is(are) in error.
Has less overhead than error correction.
Redundancy:
The central concept in detecting or correcting errors is redundancy.
To be able to detect or correct errors, we need to send some extra bits with our data.
These redundant bits are added by the sender and removed by the receiver. Their presence
allows the receiver to detect or correct corrupted bits.
Detection versus Correction:
The correction of errors is more difficult than detection.
In error detection, we are looking only to see if any error has occurred. The answer is a
simple yes or no.
In error correction, we need to know the exact number of bits that are corrupted and more
importantly, their location in the message. The number of errors and the size of message are
important.
Detection Techniques
⚫ Parity Checks
⚫ Checksum methods
⚫ Cyclic redundancy checks (CRC)
Parity Check
A parity bit is added to every data unit so that the total number of 1s(including the parity bit)
becomes even for even-parity check or odd for odd-parity check
Example-2: Now suppose the word world in Example 1 is received by the receiver without
being corrupted in transmission.
The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4).
The data are accepted.
Example-3: Now suppose the word world in Example 1 is corrupted during transmission.
The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4).
The receiver knows that the data are corrupted, discards them, and asks for retransmission.
However, it is hit by a burst noise of length 8, and some bits are corrupted.
10100011 10001001 11011101 11100111 10101010
When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the
whole block is discarded.
Question: State any two drawbacks of parity checking for error detection.
Question: Assuming even parity technique find the parity bit for following frames:
i) 0000010 ii) 1111000 iii) 1010101 iv) 1011011
Answer:
Question: Assuming odd parity, find the parity bit for each of the following data unit:
(i) 1011010 (ii) 0010110 (iii) 1001111 (iv) 1100000
Answer: Odd parity refers to number of „1‟ present in a byte to be transmitted should be odd.
(i) 1011010:
Step 1: Count the number of “1”s in the byte
Answer: 4
Step 2: compute the parity bit
Answer: 1011010 1
Since the total number of 1’s is 4, the odd parity will have a value of “1”.
(ii) 0010110:
Step 1: Count the number of “1”s in the byte
Answer: 3
Step 2: compute the parity bit
Answer: 0010110 0
Since the total number of 1’s is 3, the odd parity will have a value of “0”.
(iii) 1001111:
Step 1: Count the number of 1’s in the byte
Answer: 5
Step 2: compute the parity bit
Answer: 1001111 0
Since the total number of 1’s is 5, the odd parity will have a value of “0”.
(iv) 1100000:
Step 1: Count the number of 1’s in the byte
Answer: 2
Step 2: compute the parity bit
Answer: 1100000 1
Since the total number of 1’s is 2, the odd parity will have a value of “1”.
CRC Encoder:
o In the encoder, the dataword has 𝑘 bits; the codeword has n bits.
o The size of the dataword is augmented by adding 𝑛−𝑘 0s to the right-hand side of the
word. The 𝑛-bit result is fed into the generator.
o The generator uses a divisor of size 𝑛 − 𝑘 + 1, predefined and agreed upon. The generator
divides the augmented dataword by the divisor (modulo-2 division).
o The quotient of the division is discarded; the remainder 𝑟2 𝑟1 𝑟0 is appended to the
dataword to create the codeword.
CRC Decoder:
The codeword can change during transmission.
The decoder does the same division process as the encoder. The remainder of the division is
the syndrome.
If the syndrome is all 0s, there is no error; the dataword is separated from the received
codeword and accepted.
Otherwise, everything is discarded.
Remainder:1 1 1 0
Transmitted msg: 1 1 0 1 0 1 1 0 1 1 1 1 1 0
Question: Explain the process of CRC with respect to following example. If G (X) = 110010
and M (X) = 101 then calculate CRC for above stream.
Answer:
Procedure:- data bits= G(X)=110010 divisor=M(X)=101
Here divisor is 3 bits so we need to append 2 zeroes (2 bit) to the data bits for division.
Division carried is the normal binary division.
Result is calculated by the following condition:
1. If the remainder after division process is zero, it indicates that the data bits has no errors and the
data bit is acceptable
2. If the remainder after division is non-zero , it indicates that the data bits has errors and we have to
append the remainder bits to the original data bits and then send the data again. This remainder bits
are called as the CRC. So the data bits transmitted will be DATA + CRC.
Consider the given example, lets perform division process for CRC.
Here the divisor is 3 bits hence we append 2 zeroes to the data bits, so the data bits will be 11001000
this will be divided by 101. Since remainder is 0 there is no error in the data.
Question: Explain process of CRC (Cyclic Redundancy Check) with example.
Answer:
CRC Encoder:
In the encoder, the dataword has 𝑘 bits (4 here); the codeword has n bits (7 here). The size of the
dataword is augmented by adding 𝑛 −𝑘 (3 here) 0s to the right-hand side of the word. The 𝑛-bit
result is fed into the generator. The generator uses a divisor of size 𝑛 − 𝑘 + 1 (4 here), predefined
and agreed upon. The generator divides the augmented dataword by the divisor (modulo-2 division).
The quotient of the division is discarded; the remainder 𝑟2 𝑟1 𝑟0 is appended to the dataword to create
the codeword.
Example:
Let us take a closer look at the encoder. The encoder takes the dataword and augments it with 𝑛 − 𝑘
number of 0s. It then divides the augmented dataword by th divisor, as shown in Figure.
CRC Decoder:
The codeword can change during transmission. The decoder does the same division process as the
encoder. The remainder of the division is the syndrome. If the syndrome is all 0s, there is no error;
the dataword is separated from the received codeword and accepted. Otherwise, everything is
discarded.
Checksum:
Checksum is an error detection method. It can be done by following steps
Step-01:
At sender side, If m bit checksum is used, the data unit to be transmitted is divided into
segments of m bits.
All the m bit segments are added.
The result of the sum is then complemented using 1‟s complement arithmetic.
The value so obtained is called as checksum.
Step-02:
The data along with the checksum value is transmitted to the receiver.
Step-03:
All the m bit segments are added along with the checksum value. The value so obtained is
complemented and the result is checked.
Case-01: Result = 0 If the result is zero
Receiver assumes that no error occurred in the data during the transmission.
Receiver accepts the data.
Case-02: Result ≠ 0 If the result is non-zero,
Receiver assumes that error occurred in the data during the transmission.
Receiver discards the data and asks the sender for retransmission.
Example:
At the sender Original data : 10101001 00111001
10101001
00111001
11100010 Sum
00011101 Checksum(1’s complement)
At the receiver
Received data:10101001 00111001 00011101
10101001
00111001
00011101
11111111 Sum
00000000 Complement is zero so the data is accepted.
Example-2: Consider the data unit to be transmitted is- 10011001111000100010010010000100
Consider 8 bit checksum is used.
Step-01:
At sender side,
The given data unit is divided into segments of 8 bits as-
Now, all the segments are added and the result is obtained as- 10011001 + 11100010 +
00100100 + 10000100 = 1000100011
Since the result consists of 10 bits, so extra 2 bits are wrapped around.
00100011 + 10 = 00100101 (8 bits)
Now, 1‟s complement is taken which is 11011010.
Thus, checksum value = 11011010
Step-02:
The data along with the checksum value is transmitted to the receiver.
Step-03:
At receiver side, The received data unit is divided into segments of 8 bits.
All the segments along with the checksum value are added.
Sum of all segments + Checksum value =
00100101 + 11011010= 11111111
Complemented value = 00000000
Since the result is 0, receiver assumes no error occurred in the data and therefore
accepts it.
Example:
Calculating the r values (Sender Side)
1. Now Consider that receiver receives data with one bit error as shown in the fig.
Framing:
The data link layer needs to pack bits into frames, so that each frame is distinguishable from
another.
Our postal system practices a type of framing. The simple act of inserting a letter into an
envelope separates one piece of information from another; the envelope serves as the
delimiter.
Framing in the data link layer separates a message from one source to a destination, or from
other messages to other destinations, by adding addresses.
The destination address defines where the packet is to go; the sender address helps the
recipient acknowledge the receipt.
Frames can be of fixed or variable size.
Fixed-Size Framing
In fixed-size framing, there is no need for defining the boundaries of the frames.
The size itself can be used as a delimiter.
An example of this type of framing is the ATM wide-area network, which uses frames of
fixed size called cells.
Variable-size framing
Variable-size framing is used in local- area networks.
In variable-size framing, we need a way to define the end of the frame and the beginning of
the next.
Historically, two approaches were used for this purpose:
a character-oriented approach and
a bit-oriented approach.
Question: Two channels one with a bit rate of 100 Kbps and another with bit rate of 200 Kbps
are to be multiplexed.
Answer the following questions:
i) Calculate size of frames in bits
ii) Calculate the frame rate
iii) Calculate the duration of frame
Answer:
Channel 1 has a bit rate of 100Kbps. Channel 2 has a bit rate of 200Kbps Hence channel 2 is
demultiplexed into 2 channels of 100Kbps each. Hence 3 channels of 100 Kbps are multiplexed
effectively.
Let us consider that one slot of the channel 1 is allocated and two slots of the channel 2 is allocated
in the frame .
i) Calculate size of frames in bits: Thus each frame carries 3 bits.
ii) Calculate the frame rate: The total bit rate of the multiplexed link is 300kbps. Each frame has 3
bits. The frame rate is100,000 frames per second (Any other assumption may also be considered).
iii) Calculate the duration of frame: Thus the frame duration is
1/100,000s or 1µs.
Error Control:
Error control is both error detection and error correction.
It allows the receiver to inform the sender of any frames lost or damaged in transmission and
coordinates the retransmission of those frames by the sender.
In the data link layer, the term error control refers primarily to methods of error detection and
retransmission.
Error control in the data link layer is often implemented simply: Any time an error is detected
in an exchange, specified frames are retransmitted. This process is called automatic repeat
request (ARQ).
1. Normal Operation:
The sender will not send the next frame until it is sure that the current one is correctly receive
sequence number is necessary to check for duplicated frames
2. Lost or damaged frame
A damage or lost frame treated by the same manner by the receiver.
No NACK when frame is corrupted / duplicate
5.
Piggybacking ( Bidirectional transmission)
Is a method to combine a data frame with an acknowledgment.
It can save bandwidth because data frame and an ACK frame can combined into just one
frame.
The Stop and Wait ARQ offers error and flow control, but may cause big performance issues
as sender always waits for acknowledgement even if it has next packet ready to send.
Consider a situation where you have a high bandwidth connection and propagation delay is
also high (you are connected to some server in some other country though a high speed
connection), you can’t use this full speed due to limitations of stop and wait.
Sliding Window protocol handles this efficiency issue by sending more than one packet at a
time with a larger sequence numbers. The idea is same as pipelining in architectures.
Working Principle
In these protocols, the sender has a buffer called the sending window and the
receiver has buffer called the receiving window.
The size of the sending window determines the sequence number of the outbound
frames. If the sequence number of the frames is an n-bit field, then the range of
sequence numbers that can be assigned is 0 to 2 𝑛−1. Consequently, the size of the
sending window is 2𝑛−1. Thus in order to accommodate a sending window size of
2𝑛−1, a n-bit sequence number is chosen.
The sequence numbers are numbered as modulo-n. For example, if the sending
window size is 4, then the sequence numbers will be 0, 1, 2, 3, 0, 1, 2, 3, 0, 1, and
so on. The number of bits in the sequence number is 2 to generate the binary
sequence 00, 01, 10, 11.
The size of the receiving window is the maximum number of frames that the receiver
can accept at a time. It determines the maximum number of frames that the sender
can send before receiving acknowledgment.
Example
Suppose that we have sender window and receiver window each of size 4. So the
sequence numbering of both the windows will be 0,1,2,3,0,1,2 and so on. The
following diagram shows the positions of the windows after sending the frames and
receiving acknowledgments.
Go – Back – N ARQ
Go – Back – N ARQ provides for sending multiple frames before receiving the acknowledgment
for the first frame. It uses the concept of sliding window, and so is also called sliding window
protocol. The frames are sequentially numbered and a finite number of frames are sent. If the
acknowledgment of a frame is not received within the time period, all frames starting from that
frame are retransmitted.
Working Principle
Go – Back – N ARQ provides for sending multiple frames before receiving the
acknowledgment for the first frame. The frames are sequentially numbered and a finite
number of frames. The maximum number of frames that can be sent depends upon the
size of the sending window. If the acknowledgment of a frame is not received within an
agreed upon time period, all frames starting from that frame are retransmitted.
The size of the sending window determines the sequence number of the outbound frames.
If the sequence number of the frames is an n-bit field, then the range of sequence numbers
that can be assigned is 0 to 2 n−1. Consequently, the size of the sending window is 2 n−1.
Thus in order to accommodate a sending window size of 2n−1, a n-bit sequence number is
chosen.
The sequence numbers are numbered as modulo-n. For example, if the sending window
size is 4, then the sequence numbers will be 0, 1, 2, 3, 0, 1, 2, 3, 0, 1, and so on. The
number of bits in the sequence number is 2 to generate the binary sequence 00, 01, 10, 11.
The size of the receiving window is 1.
Example: The sender has sent frame 6, and timer expires for frame 3(frame 3 has not been
acknowledge); the sender goes back and resends frames 3, 4,5 and 6
The sending-window size enables the sender to send multiple frames without receiving the
acknowledgement of the previous ones.
The receiving-window enables the receiver to receive multiple frames and acknowledge them.
The receiver keeps track of incoming frame’s sequence number.
When the sender sends all the frames in window, it checks up to what sequence number it has
received positive acknowledgement.
If all frames are positively acknowledged, the sender sends next set of frames.
If sender finds that it has received NACK (negative acknowledgement)or has not receive any
ACK for a particular frame, it retransmits all the frames after which it does not receive any
positive ACK.
Chapter No: 5
WIRELESS COMMUNICATION
IEEE Wireless Standards
Wireless networks are standardized by IEEE.
Under 802 LAN MAN standards committee.
The 802.11 standard is defined through several specifications of WLANs. It defines an over-the-
air interface between a wireless client and a base station or between two wireless clients.
There are several specifications in the 802.11 family −
802.11 − This pertains to wireless LANs and provides 1 - or 2-Mbps transmission in the
2.4-GHz band using either frequency-hopping spread spectrum (FHSS) or direct-sequence
spread spectrum (DSSS).
802.11a − This is an extension to 802.11 that pertains to wireless LANs and goes as fast as
54 Mbps in the 5-GHz band. 802.11a employs the orthogonal frequency division
multiplexing (OFDM) encoding scheme as opposed to either FHSS or DSSS.
802.11b − The 802.11 high rate WiFi is an extension to 802.11 that pertains to wireless
LANs and yields a connection as fast as 11 Mbps transmission (with a fallback to 5.5, 2,
and 1 Mbps depending on strength of signal) in the 2.4-GHz band. The 802.11b
specification uses only DSSS. Note that 802.11b was actually an amendment to the original
802.11 standard added in 1999 to permit wireless functionality to be analogous to hard-
wired Ethernet connections.
802.11g − This pertains to wireless LANs and provides 20+ Mbps in the 2.4-GHz band.
802.11n — 802.11n builds upon previous 802.11 standards by adding multiple
input multiple-output (MIMO). The additional transmitter and receiver antennas allow for
increased data throughput through spatial multiplexing and increased range by exploiting
the spatial diversity through coding schemes like Alamouti coding. The real speed would
be 100 Mbit/s (even 250 Mbit/s in PHY level), and so up to 4-5 times faster than 802.11g.
802.11ac — 802.11ac builds upon previous 802.11 standards, particularly the 802.11n
standard, to deliver data rates of 433Mbps per spatial stream, or 1.3Gbps in a three-
antenna (three stream) design. The 802.11ac specification operates only in the 5 GHz
frequency range and features support for wider channels (80MHz and 160MHz) and beam
forming capabilities by default to help achieve its higher wireless speeds.
Advantages of WLANs
1. They provide clutter free homes, offices and other networked places.
2. The LANs are scalable in nature, i.e. devices may be added or removed from the network
at a greater ease than wired LANs.
3. The system is portable within the network coverage and access to the network is not
bounded by the length of the cables.
4. Installation and setup is much easier than wired counterparts.
5. The equipment and setup costs are reduced.
Disadvantages of WLANs
1. Since radio waves are used for communications, the signals are noisier with more
interference from nearby systems.
2. Greater care is needed for encrypting information. Also, they are more prone to errors. So,
they require greater bandwidth than the wired LANs.
3. WLANs are slower than wired LANs.
1. When a station wants to transmit, it senses the channel to see whether it is free or not.
2. If the channel is not free the station waits for back off time.
3. If the station finds a channel to be idle, the station waits for a period of time called distributed
interframe space (DIFS).
4. The station then sends control frame called request to send (RTS) as shown in figure.
5. The destination station receives the frame and waits for a short period of time called short
interframe space (SIFS).
6. The destination station then sends a control frame called clear to send (CTS) to the source station.
This frame indicates that the destination station is ready to receive data.
7. The sender then waits for SIFS time and sends data.
8. The destination waits for SIFS time and sends acknowledgement for the received frame.
802.11 Addressing
• There are four different addressing cases depending upon the value of To DS And from DS
subfields of FC field.
• Each flag can be 0 or 1, resulting in 4 different situations.
1. If To DS = 0 and From DS = 0, it indicates that frame is not going to distribution system and is
not coming from a distribution system. The frame is going from one station in a BSS to another.
2. If To DS = 0 and From DS = 1, it indicates that the frame is coming from a distribution system.
The frame is coming from an AP and is going to a station. The address 3 contains original sender
of the frame (in another BSS).
3. If To DS = 1 and From DS = 0, it indicates that the frame is going to a distribution system. The
frame is going from a station to an AP. The address 3 field contains the final destination of the
frame.
4. If To DS = 1 and From DS = 1,it indicates that frame is going from one AP to another AP in a
wireless distributed system.
The table below specifies the addresses of all four cases.
1. Piconet:
Piconet is a Bluetooth network that consists of one primary (master) node and seven active
secondary (slave) nodes.
All Slave stations are synchronized with Master.
Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or stations within
the distance of 10 meters.
There can be only one primary or master station in each piconet.
The communication between the primary and the secondary can be one-to-one or one-to-
many.
All communication is between master and a slave. Salve-slave communication is not
possible.
In addition to seven active slave stations, a piconet can have up to 255 parked nodes. These
parked nodes are secondary or slave stations and cannot take part in communication until it
is moved from parked state to active state.
2. Scatternet :
The baseband layer is responsible for searching other devices, assigning master and slave
roles.
This layer also controls Bluetooth unit’s synchronization and transmission frequency
hopping sequence. It manages link between devices and determines packet types supported
for synchronous and asynchronous traffic.
iv. Host Controller Interface (HCI)
The HCI allows higher layers of stack, including applications, to access the baseband, link
manager, etc., through a single standard interface.
It serves the purpose of interoperability between host devices and Bluetooth modules.
HCI commands, module may enter certain modes of operation. Higher layers are informed
about certain events through HCI.
2. Middleware protocol group
The protocols in this group are needed for existing applications to operate over Bluetooth
links.
These protocols may be third party protocols (Industry standard) or developed by ‘simple
interest group (SIG)’ specifically for Bluetooth.
Some of the protocols in this group:
i. RFCOMM layer
It provides a virtual serial port for applications needed for scenarios like dial-up
networking, etc.
This eliminates the use of cables.
The SDP is a standard method for Bluetooth devices to discover and learn about the
services offered by other device once a connection is established with it.
iii. Infrared data association(IrDA) interoperability protocols
The SIG has adopted some IrDA protocols to ensure interoperability between applications
to exchange a wide variety of data.
v. Networking layers
This layer is designed to set up voice calls. It supports functions like call control and group
management.
TCS can also be used to set up data calls.
TCS protocols are compatible with ITU Specifications.
Bluetooth audio communication takes place at rate of 64Kbps using one of two encoding
schemes: 8-bit logarithmic PCM or continuous variable slope delta modulation.
3. Application group
This group consists of actual applications that make use of Bluetooth links and refers to
software that exists above protocol stack.
The Bluetooth-SIG does not define any application protocols nor does it specify any API.
Bluetooth profiles are developed to establish a base point for use of a protocol stack to
accomplish a given usage case.
Bluetooth Devices:
Every Bluetooth device consists of a built in short range radio transmitter. The current data rate
is1 Mbps.
So an interface between the IEEE 802.11 wireless LAN and Bluetooth LAN is possible.
Bluetooth specification standard defines a short-range(10 meter) radio link.
The devices carrying Bluetooth-enabled chips can easily transfer data through walls, clothing and
luggage bags.
The interaction between devices occurs by itself without direct human intervention whenever they
are within each other’s range.
Each Bluetooth-enabled device contains a 1.5 inch square transceiver chip operating in the ISM band
of 2.40 GHz to 2.48 GHz.
The ISM band is divided into 79 channels with each carrying a bandwidth of 1 MHz.
Bluetooth Applications:
1. It is used for providing communication between peripheral devices like wireless mouse or keyboard
with the computer.
2. It is used by modern healthcare devices to send signals to monitors.
3. It is used by modern communicating devices like mobile phone, PDAs, palmtops etc to transfer data
rapidly.
4. It is used for dial up networking. Thus allowing a notebook computer to call via a mobile phone.
5. It is used for cordless telephoning to connect a handset and its local base station.
6. It also allows hands-free voice communication with headset.
7. It also enables a mobile computer to connect to a fixed LAN.
8. It can also be used for file transfer operations from one mobile phone to another.
Advantages of Bluetooth:
Bluetooth is inexpensive
Bluetooth provides low interference
It require low energy consumption
It allows sharing of data
It is cheaper in cost
Easy to use
Disadvantage of Bluetooth
It only allows short range (30 feet) communication between devices.
Bluetooth only offers 1 mbps data transfer rate.
Question: In Bluetooth communication calculate the length of frame for following scenarios:
(i) Three slot (ii) Five slot
Answer: Assume data rate = 1 mbps
In Bluetooth communication, when the link speed or data rate is
1Mbps each slot length is 625μs or 1600 hops/sec Packets can be of 1, 3, 5 slots.
i) Since each slot length is 625μs, Total length of the frame containing three slots is
625*3=1875μs, Or 1600*3=4800 hops/sec
ii) Since each slot length is 625μs, Total length of the frame containing five slots is
625*5=3125μs, Or 1600*=8000 hops/sec.
Smart Bluetooth
In 2010, Sony started the development of a Bluetooth version called smart Bluetooth, a smaller
low powered version of Bluetooth, which targeted the market of fitness and healthcare.
Smart Bluetooth needed to be small and power efficient.
However small and power efficiency is loved by all so a part of the Sony development became
a part of the Bluetooth version 4.0 standard.
This standard is also known as BLE which stands for Bluetooth low energy.
Bluetooth low energy is a wireless personal area network technology designed and marketed by
the Bluetooth special interest group.
Mobile operating systems including iOS, Android, windows phone, blackberry, as well as
macOS, Linux, windows 8 and windows 10 natively support Bluetooth low energy.
There are two trademarks from the Bluetooth SIG as bellow
1. Bluetooth Smart Ready (HUBS):
Bluetooth Smart Ready devices are the devices that receive data sent from the classic Bluetooth
and Bluetooth smart devices and give it to applications that make use of that data
The applications could be running on these devices themselves or could be running anywhere
else on the internet
E.g. phones, tablets PCs etc
After collecting this information these devices send it to the Bluetooth smart ready devices.
These devices collect a specific piece of information like heart rate or temperature and then relay it to the
Bluetooth smart ready devices
As shown in fig the mobile phone is the smart ready devices and it is communicating to two devices
at the same time.
2. Collecting temperature information from a Bluetooth smart thermometer and acting as a hub to relay that
information to a server located in the hospital. The server can then take the appropriate action like informing
the doctor or pharmacist.
NFC is a simple but profound technology that is fast evolving along with other mobile technologies
in the market.
This technology enables interaction between the virtual mobile world and the physical world.
NFC is a wireless communication technology that potentially facilitates mobile phone usage of
billions of people throughout the world offers an enormous number of use cases including credit
cards, debit cards, loyalty cards, car keys, access keys for hotels, offices and houses, e-payments, e-
ticketing, smart advertising, data money transfer and social services, eventually integrating all such
materials into single mobile phone.
NFC is a short range, high frequency, low bandwidth and wireless communication technology
between two NFC enabled devices.
Communication between NFC devices occurs at 13.56MHz high frequency which was originally
used by radio frequency identification (RFID)
There are two different roles that a device can play in NFC which can be illustrated as a “request and reply”
concept as shown in fig.
The initiator sends a request message to a target and the target replies by sending a message back to
the initiator.
The role of the target is to respond to the requests coming from the initiator.
An active device can act as both an initiator and a target. However, a passive device cannot be an
initiator.
Mobile Telephone System
Basic Concept
In cell phone distance is not restricted to within home but one can travel in the city or even outside
the city without interruption in communication.
The demand for cellular phone is increasing at alarming level and is likely that wired communication
will be replaced by wireless technology.
In the cellular system city is divided into small areas called ‘Cells’. Each cell is around 10 square
kilometer. (Depends upon power of base station)
Cell 1
2 4
3
The cells are normally thought of hexagons. Because cell phones and base stations use low power
transmitters, the same frequencies can be reused in non-adjacent cell.
The cell just covers only few square kilometer areas, thus reducing the power requirement
necessary to communicate with cellular phones
3. MTSO:-
Each cell is linked to central location called the Mobile Telephone Switching Office (MTSO).
MTSO coordinates all mobile calls between an area comprised of several cell sites and the central
office. Time and billing information for each mobile unit is accounted for by MTSO.
An important function of BSC is that it manages the “handoff” from one BS to another as a
subscriber moves from cell to cell
It is necessary that the BSs are to be connected to a switching network and that network is to be
connected to other networks such as the PSTN so that calls can be made to and from mobile
subscribers.
6. Cell:
7. Cluster:
Fig. shows the cluster of SEVEN cells or a SEVEN cell cluster (n=7).
5
7 4
1
8 3
2
Generally two frequency bands are allocated for this purpose. One for the communication initiated
by the cell phone and for the land phone.
For cellular communication, the FCC has appointed 40 MHz of the frequency spectrum from 825
to 845 MHz and 870 to 890 MHz . Full-duplex operation is possible by separating transmit and
receive signals into separate frequency bands. Cellular phone units transmit in the lower band of
frequencies, 825 to 845 MHz, and receive in the higher band, 870 to 890 MHz.
The opposite frequency bands are used by the base units at the cell sites. Within these two bands,
666 separate channels (333 channels per band) have been assigned for voice and control. Each
channel occupies a bandwidth of 30 KHz.
In the mobile communication system either the transmitter or the receiver or both are going to be
movable. As the points between which the communication takes place are movable, the
communication channel is essentially air, which means it is a wireless communication.
The structure of the mobile phone network along with the PSTN is shown in figure.
Each cell has a Base station situated at the center.
The task of the Base stations is to act as an interface between the mobile phone and the cellular
radio system.
The interface is a bi-directional [i.e. Exchange of information between MTSO and Base station is a
two way].
The MTSO acts as the interface between the PSTN and the Base station. PSTN performs the
supervision and control operations in the mobile communication system.
The communication can take place between two Mobile subscribers or between a mobile
subscriber and a Landline Telephone.
If a mobile subscriber travels from one cell area to the other then it automatically gets connected to
the Base station of that cell. Thus the service provided to a mobile subscriber is continuous without
any break.
Function of MTSO:
The MTSO control all the cells and provides the interface between each cell and the main
telephone office.
As the vehicle moves from one cell to the next the system automatically switches from one cell to
the next.
The MTSO switches from the vehicle to the stronger cell within a very short time.
Calls using Mobile Phones
When we make a call from the mobile by entering the required 10 digit phone number the
sequence of events takes place as follows:
Transmitting/Receiving/Handoff Operations
Hand off Procedure:
During the conversation, if a Mobile phone crosses the exiting cell, the signal became weak.
The MTSO is checking the signal level continuously, so if it finds signal level low then it
immediately switch the call which can improve the signal strength.
The MTSO will then change the cell carrying channel very smoothly without interrupting the call
or changing user.
This process of handling the signal of Old channel to the new channel is called as Hand-off /
Handover Procedure.
The user can continue talking without even noticing that the Hand-off Procedure has taken place.
Cell size is not fixed and can be increased or decreased on the population of the area. The typical
radius of a cell is 1 to 12mi. High density areas require more, geographically smaller cells to meet
traffic demands than do low-density areas. Once determined, cell size to optimize to prevent the
interference of adjacent cell signals. The transmission power of each cell is kept low to prevent its
signal from interfering with those of other cells.
In the past few decades, mobile wireless technologies have experience 4 or 5 generations of
technology revolution and evolution, namely from 0G to 4G. Current research in mobile wireless
technology concentrates on advance implementation of 4G technology and 5G technology.
Currently 5G termis not officially used.
0G Wireless technology
0G refers to pre-cell phone mobile telephony technology, such as radio telephones that some had
in cars before the advent of cell phones. Mobile radio telephone systems preceded modern cellular
mobile telephony technology. Since they were the predecessors of the first generation of cellular
telephones, these systems are called 0G (zero generation) systems.
As the system expanded and neared capacity, the ability to reduce transmission power allowed
new cells to be added, resulting in more, smaller cells and thus more capacity.
The second generation introduced a new variant to communication, as SMS text messaging
became possible, initially on GSM networks and eventually on all digital networks. Soon SMS
became the communication method of preference for the youth. Today in many advanced markets
the general public prefers sending text messages to placing voice calls.
Some benefits of 2G were Digital signals require consume less battery power, so it helps mobile
batteries to last long. Digital coding improves the voice clarity and reduces noise in the line.
Digital signals are considered environment friendly. Digital encryption has provided secrecy and
safety to the data and voice calls. The use of 2G technology requires strong digital signals to help
mobile phones work properly.
“2.5G” using GPRS (General Packet Radio Service) technology is a cellular wireless
technology developed in between its predecessor, 2G, and its successor, 3G. GPRS could provide
data rates from 56 kbit/s up to 115 kbit/s. It can be used for services such as Wireless Application
Protocol (WAP) access, Multimedia Messaging Service (MMS), and for Internet communication
services such as email and World Wide Web access.
2.75 – EDGE is an abbreviation for Enhanced Data rates for GSM Evolution. EDGE technology
is an extended version of GSM. It allows the clear and fast transmission of data and information
up to 384kbit/s speed.
4G LTE data transfer speed can reach peak download 100 Mbit/s, peak upload 50 Mbit/s,
WiMAX offers peak data rates of 128 Mbit/s downlink and 56 Mbit/s uplink.
What is VoLTE?
VoLTE stands for voice over Long Term Evolution. Utilising IMS technology, it is a
digital packet voice service that is delivered over IP via an LTE access network.
Voice calls over LTE are recognised as the industry-agreed progression of voice services across
mobile networks, deploying LTE radio access technology.
First Generation
Second Generation:2.5G, 2.75G
Third Generation:3.5, 3.75G
Fourth Generation
Fifth Generation
Question: Compare first, second, third and fourth generation mobile telephone systems (any
3 points).