Textual Learning Material - Module 1
Textual Learning Material - Module 1
Objectives
Notes
After studying this unit, you should be able to:
Describe the various uses of computer networks.
Discuss different technologies involved in defining the network hardware
Explain concept of process network software and the significance of
layering the communication process and related design issues for the layers
1.1 Introduction
The merging of computers and communications has a profound influence on the way
systems are organized. The concept of computer center as a room with a large
computer to which the users bring their work for processing is now obsolete. The old
model of a single computer servicing all the computational needs of an organization has
been replaced by the one in which a large system of separate but interconnected
computers do the job. These systems are called computer networks. The two
computers are said to be interconnected if they are able to exchange information. The
connection between the computers need not be only via a copper wire or fiber optics or
microwaves. A communication satellite can be used for networking the computers.
1989: 100,000th host. Cuckoo’s Egg released by Cliff Stoll telling true story of East
German cracker accessing US installations.
1990: ARPAnet ceased to exist and the Internet effectively took its role.
1991: Gopher, a software program for retrieving information from servers on the
Internet was made available by the University of Minnesota. The US Government
announced that it no longer intended to restrict activity on the Internet to research. This
policy shift was sufficient for 12 companies to co-operate and produce CIX. Phil
Zimmerman released PGP. Backbone speed upgraded to 44.736 Mbps.
1992: The World Wide Web became a possibility after CERN, in Switzerland,
th
released hypertext. 1,000,000 Host. The author gets his first dialup email account with
Demon Internet (Nov. 1992).
1993: Mosaic, a software program to browse Web sites written by Marc Andreesen,
was released followed by Netscape.
1994: Shopping Malls arrive on the Internet. The UK Treasury goes on line and the
first cyberbank opens. The first banner adverts appeared for Zima (a drink) and AT&T.
1995: Traditional dialup services (AOL, CompuServe etc) start to provide dialup
services. The Vatican goes on line. A number of Internet companies go public.
Netscape leads the field with the largest ever IPO on NASDAQ. DEC launches
AltaVista, which claims to index every HTML page there is. Jeff Bezos launches
Amazon.com. eBay is launched.
1996: 9,272 organizations find themselves unlisted after the InterNIC drops their
name service as a result of not having paid their domain name fee. Various ISPs suffer
extended service outages, bringing into question whether they will be able to handle the
growing number of users. AOL (19 hours), Netcom (13 hours), AT&T WorldNet (28
hours – email only). China requires users of the Internet to register with the Police.
Saudi Arabia restricts use to universities and hospitals. Domain name tv.com sold to
CNET for US$15,000. Backbone speed upgraded to 622 Mbps.
1997: 2000th RFC. 16 Million hosts. 1,000,000th Domain name registered (March
th
6 for Bonny View Cottage Furniture Company).
2000: 10,000,000th Domain name registered. French Courts require that ‘hate’
memorabilia for sale on Yahoo’s auction site must be removed. Gnutella is launched.
ICANN selects new top level domains. Backbone is upgraded to IPv6.
2001: Forwarding email becomes illegal in Australia (Digital Agenda Act). Napster
forced to suspend service after legal action. Taliban bans the Internet in Afghanistan.
Nimda released on the Internet.
2002: Distributed denial of Service attack hits 13 DNS root servers, causing
national security concerns.
2003: The first official Swiss online election takes place in Anières (7 Jan), SQL
Slammer (goes round the world in 10 minutes and takes out 3 of the 13 DNS Servers).
Followed by SoBig.F (19 Aug) and Blaster (11 Aug).
2004: Lycos Europe releases a screen saver to help fight spam by keeping spam
servers busy with requests (1 Dec). The service is discontinued within a few days after
backbone providers block access to the download site and the service causes some
servers to crash.
Main Characters
(i) A WAN contains numerous cables or telephone lines, each one connecting a pair of
routers.
(ii) For those without direct connection, communication takes place indirectly via other
routers.
(iii) When a message (a packet) is sent from one router to another, it is received at
each intermediate router in its entirety, stored there until the required output line is
free, and then forwarded.
A subnet using this principle is called point-to-point, store-and-forward or packet-
switched subnet.
WANs may also use broadcast channels, such as satellites or ground radio systems.
1.8.5 Internetworks
A collection of interconnected networks is called an internetwork or just Internet.
The Internet refers to a specific worldwide Internet that is widely used to connect
universities, government offices, companies and private individuals.
Person-to-person Communication
Notes It involves:
Exchange of message via emails that may contain text, digitized voice, pictures,
video images, etc.
Newsgroups covering topics for a particular group.
Real-time collaborative approaches such as videoconferencing and virtual meeting
environments that allow remote users to communicate with negligible delay with
seeing and hearing each other.
Entertainment
It involves:
Video on demand allows the user to select any movie or TV program available in
the video library for having it displayed on screen instantly.
Interactive films where the user has an opportunity to select any scene of his/her
choice to create his/her own film.
Live and interactive TV enables users to participate in quiz shows, and so on.
Due to all these benefits and other also, computer networking becomes increasingly
more important.
Network Architecture
Network architecture defines the communications products and services, which ensure
that the various components can work together. In the early days of data
communication systems, the majority of communications were between the DTE and
the host computer. Therefore, transmission control procedures were alone enough as
communication protocols. However, recent computer systems link with other systems to
OSI Model
Open Systems Interconnection (OSI) was set up as an international standard for
network architecture. OSI Reference Model developed by the International standard
organization deals with connecting open systems. Open systems are open for
communication with other systems. The OSI model contains seven layers. A detailed
discussion of the network architecture has been provided under the topic network
software in this Unit only. The International Organization for Standardization (ISO) took
the initiative in setting up OSI. OSI has two meanings. It refers to the protocols that are
authorized by ISO.
aspect of the data exchange process. The objective of this detail is to develop an
understanding of the complexity and sophistication that this technology has achieved, in
Notes addition to developing the concept for the inner workings of the various components
that contribute to the data communications process.
DCE DCE
(3) (1) (3) CC CPU
P
(4) (2) (2)
(5)
Transmission Control
Data Processing
Analog
In the analog form of electronic communications, information is represented as a
continuous electromagnetic wave form. Analog is best explained by the transmission
signal such as sound or human speech, over an electrified copper wire.
Example: A good example of an analog signal is the loud-speaker of a stereo
system. When the volume is turned up, the sound increases slowly and constantly.
In its native form, human speech is an oscillatory disturbance in the air as shown in
Figure 1.4, 1.5 and 1.6, which varies in terms of its volume, or power (amplitude), and
its pitch or tone (frequency). Analogous variations in electrical or radio waves are
created in order to transmit the analog information signal for video or audio or both over
a network from a transmitter (TV station or CATV source) to a receiver (TV set,
computer connected with antenna). At the receiving end an approximation (analog) of
the original information is presented.
y
Amplitude t
Digital
Computers are digital in nature. Computers process, store, and communicate
information in binary form i.e. in the combination of 1s and 0s which has specific
meaning in computer language. A binary digit (bit) is an individual 1 or 0. Multiple bit
streams are used in a computer network.
Contemporary computer systems communicate in binary mode through variations in
electrical voltage. Digital signalling, in an electrical network, involves a signal which
varies in voltage to represent one of two discrete and well-defined states as depicted in
Figure 1.7 such as either a positive (+) voltage and a null or zero (0), voltage (unipolar)
or a positive (+) or a negative (-) voltage (bipolar).
1 0 0 0 1 1 0 1 0
Notes +5 1 0 0 0
V
-5V
Example
Modern electronic products like computers and mobile phones rely on digital signals.
However, Morse Code is a good example of a digital signal. The signal is sent as a
series of ‘on’ and ‘off’ pulses. The signal is either present or it is not. Morse code was
introduced in 1837 by Samuel Morse, as a method of communication.
Although analog voice and video can be converted into digital, and digital data can
be converted to analog, even then each format has its own advantages.
Advantages of Digital transmission are discussed below:
Digital Data: Digital transmission certainly has the advantage where binary
computer data is being transmitted. The equipment requires converting digital data
to an analog format and sending the digital bit streams over an analog network can
be expensive, susceptible to failure, and can create errors in the information.
Compression: Digital data can be compressed relatively easily, thereby increasing
the efficiency of transmission. As a result, substantial volumes of voice, data, video
and image information can be transmitted using relatively little raw bandwidth.
Security: Digital systems offer better security. While analog systems offer some
measure of security through the scrambling, or intertwining of several frequencies,
scrambling is fairly simple to defeat. Digital information, on the other hand, can be
encrypted to create the appearance of a single, pseudo-random bit stream.
Thereby, the true meaning of individual bits, sets of bits, or the total bit stream
cannot be determined without having the key to unlock the encryption algorithm
employed.
Quality: Digital transmission offers improved error performance (quality) as
compared to analog. This is due to the devices that boost the signal at periodic
intervals in the transmission system in order to overcome the effects of attenuation.
Additionally, digital networks deal more effectively with noise, which always is
present in transmission networks.
Cost: The cost of the computer components required in digital conversion and
transmission has dropped considerably, while the ruggedness and reliability of
those components has increased over the years.
Upgradability: Since digital networks are comprised of computer (digital)
components, they are relatively easy to upgrade. Such upgrades can increase
bandwidth, improve error performance, and enhance functionality. Some upgrades
can be effected remotely over a network, eliminating the need to dispatch
expensive technicians for that purpose.
Management: Generally speaking digital networks can be managed much more
easily and effectively due to the fact that such networks consist of computerized
components. Such components can sense their own level of performance, isolate
and diagnose failures, initiate alarms, respond to queries, and respond to
commands to correct any failure. Further, the cost of so enabling these components
continues to drop.
Notes It is the creation of ARPA (later DARPA, now ARPA), the (periodically Defense)
Advanced Research Projects Agency of the US Department of Defense.
Much of our present knowledge about networking is a direct result of the ARPANET
project.
ARPANET technologies:
1. IMP (Interface Message Processor): Originally Honeywell DDP-316 mini. with 12K
16-bit words memory. Replaced several times by more powerful machines.
Some IMPs allow direct terminal connection. They were called TIPs (Terminal
Interface Processors).
IMPs were connected by 56 kbps or 230.4 kbps leased lines. Each IMP could
originally handle only one to four hosts, and subsequently tens of hosts and
hundreds of terminals simultaneously.
2. Protocols: ARPANET did not follow the OSI model at all (it predates OSI by more
than a decade).
The first experimental system consisted of four nodes (Dec. 1969).
The TCP/IP model and protocols were specifically designed to handle the
interconnection of the vast number of WANs and LANs comprising the ARPA
internet.
TCP/IP protocols were then integrated in Berkeley UNIX by a convenient program
interface to the network (sockets), which makes TCP/IP very widespread.
To facilitate finding hosts in the ARPANET, DNS (Domain Naming System) was
created to organize machines into domains and map host names onto IP
addresses.
By 1990, the ARPANET had been overtaken by newer networks that it itself had
spawned, so it was shut down and dismantled.
1.12.3 NSFNET
By the late 1970s, the NSF (National Science Foundation, USA) set up CSNET to
provide networking facilities to the computer science community in USA as a whole
(particularly those without access to ARPANET).
CSNET was centered around a single machine (CSNET-RELAY) at BBN that
supports dial-up lines (PHONENET) and had connections to the ARPANET and other
networks (e.g., X.25, CYPRESS).
Its major services include – emails, file transfer and remote login.
By 1984, NSF began designing a high-speed network, called NSFNET, that would
be open to all university research groups.
NSFNET consists of a backbone network connecting six supercomputer centers,
and about 20 regional networks. Backbone speeds: 56 kbps, 448 kbps, 1.5 Mbps, 45
Mbps (ANSNET).
1.13 Summary
A network consists of two or more computers that are linked in order to share resources
(such as printers and CD-ROMs), exchange files or allow electronic communications.
The computers on a network may be linked through cables, telephone lines, radio
waves, satellites or infrared light beams. The primary purpose of a computer network is
to share resources. The main goal of networking is Resource sharing. A second goal
is to provide high reliability by having alternative sources of supply. Another goal is
saving money. Another closely related goal is to increase the systems performance as
the work load increases by just adding more processors. With central mainframes,
Amity Directorate of Distance & Online Education
Introduction to Computer Networks 21
when the system is full, it must be replaced by a larger one, usually at great expense
and with even greater disruption to the users. Computer networks provide a powerful
communication medium. There are two important dimensions for classifying networks Notes
— transmission technology and scale.
Broadcast networks: These networks have a single communication channel
shared by all the machines on the network. Point-to-point networks consist of many
connections between individual pairs of machines. Multiple routes and intermediate
machines may exist between a pair of machines; so routing algorithms play an
important role here.
A collection of interconnected networks is called an internetwork or just Internet.
The Internet refers to a specific worldwide Internet that is widely used to connect
universities, government offices, companies and private individuals. A network topology
is the basic design of a computer network. It details how key network components such
as nodes and links are interconnected. There are three primary types of network
topologies which refer to the physical and logical layout of the Network cabling. They
are star, ring and bus topology.
7. Which one of the following extends a private network across public networks?
(a) Local area network
Notes
(b) Virtual private network
(c) Enterprise private network
(d) Storage area network
8. Communication between a computer and a keyboard involves ………………
transmission
(a) Automatic
(b) Half-duplex
(c) Full-duplex
(d) Simplex
9. The first Network
(a) CNNET
(b) NSFNET
(c) ASAPNET
(d) ARPANET
10. The ……………… is the physical path over which a message travels
(a) Ppath
(b) Medium
(c) Protocol
(d) Route
Objectives
After studying this unit, you should be able to:
Describe the digital transmission concept and technology
Discuss different encoding technique
Explain digital communication technique
2.1 Introduction
In this lesson, you will study the concept of data transmission. The conveyance, or
transmission, of information across a distance necessarily involves some form of
transmission medium. The selection of physical transmission media that serve to
transport the information is critical to its successful conveyance. You will study data
encoding techniques and digital data communication techniques.
The utilisation of data transmission facilities makes the process of the collection and
dissemination of information faster and allows subscribers with low-cost terminal
equipment in order to enjoy the services provided by huge computer centres.
Frequency Spectrum
In the transmission of data the range of carrier frequencies depends on the nature of
the medium and the requirements of the applications supported. Therefore, frequency
spectrum may be defined as the range of frequencies being supported by a particular
transmission medium. The actual range of frequencies supporting a given
communication is known as a pass band.
Bandwidth
You must understand that in a very general way bandwidth may be defined as the
range of frequencies assigned to a channel. In other words, you may say that
bandwidth is the difference, expressed in Hertz, between the highest and the lowest
frequencies of a band. In general, the higher the bandwidth, the more will be the data
transmission rate or throughput. It should be noted that bandwidth and data
transmission rate are very closely interrelated to each other. Clearly, any transmission
system becomes more attractive if the available bandwidth is greater, introduced errors
are fewer, and the maximum distance between various network elements (amplifiers,
repeaters, and antennae) is greater.
Distances
The higher frequency signals offer greater bandwidth; they also generally suffer to a
greater extent from signal attenuation than lower frequencies. This fact results in more
errors in transmission, unless the amplifiers/repeaters are spaced more closely
together. It clearly demonstrates the close and direct relationship between bandwidth,
distance, and error performance.
Bandwidth, in this context, refers to the raw amount of bandwidth the medium
supports. Error performance refers to the number or percentage of errors, which are
introduced in the process of transmission. Distance refers to the minimum and
maximum spatial separation between devices over a link, in the context of a complete,
end-to-end circuit.
Propagation Delay
It is important for you to note that propagation delay refers to the length of time required
for a signal to travel from transmitter to receiver across a transmission system. While
electromagnetic energy travels at roughly the speed of light (30,000 km per second) in
free space. In contrast, the speed of propagation for twisted pair or coaxial cable is a
fraction of this figure. The nature of the transmission system will have considerable
impact on the level of propagation delay. In other words, the total length of the circuit
Notes directly influences the length of time it takes for the signal to reach the receiver.
Security
Security, in the context of transmission systems, addresses the protection of data from
interception as it transverses the network. Particularly in the case of data networking, it
also is important that access to a remote system and the data resident on it be limited to
authorized users.
Physical Dimensions
It will be interesting for you to know that the physical dimensions of a transmission
system must be considered as well. This is especially true, once again, in the case of
wired systems. Certainly, the sheer weight of a cable system must be considered as
one attempts to deploy it effectively. Additionally, the bulk (diameter) of the cable is of
importance, as conduit and raceway space often is at a premium. The physical
dimensions of airwave systems also must be considered, as the size and weight of the
reflective dish and mounting system (e.g., bracket and tower) may require support.
You must note that the two variations are discussed below:
Notes 1. NRZ-Level: In this level of encoding, the signal’s polarity changes only when the
incoming signal changes from 1 to 0 or from 0 to 1. This technique looks just like
the NRZ technique, excluding the first input one data bit. This is because NRZ-L
considers the first data bit to be a polarity change. Where NRZ does not.
2. NRZ-Inverted (NRZ-I): Transition that takes place at the beginning of bit interval is
equal to bit 1 and when no transition takes place at beginning of bit interval is equal
to bit 0 or vice-versa. This technique is called differential encoding.
NRZ-I has a benefit over NRZ-L. Assume a situation where two data wires are
erroneously connected in each other's position. In case of NRZ-L, every bit sequence
will get reversed. This is because voltage levels get swapped. On the other hand, as the
bits in case of NRZ-I are recognised by transition, the bits will be interpreted correctly.
In case of NRZ codes, a drawback is that a string of 0's or 1's will avoid synchronization
of transmitter clock with receiver clock and a separate clock line is required to be
provided.
Biphase Encoding
You need to keep in mind that it consists of the following characteristics:
1. As there is an expectable transition during every bit time, the receiver can perform
synchronization on that transition. That is, clock is extracted from the signal itself.
2. As a transition can take place at the beginning and in the middle of the bit interval,
the clock functions at twice the data transfer rate.
Now you will understand the different types of encoder.
Biphase-manchester: In case of Biphase-manchester, transition from high to low
in middle of interval is equal to 1 and transition from low to high in middle of interval is
equal to 0.
Differential-manchester: This technique is also known as Conditioned Diphase
encoding (CDP). In this type of encoding, data and clock signals are combined to
produce a single self-synchronizing data stream.
4B/5B Encoding: In case of Manchester encoding scheme, there is a transition
after each bit. It signifies that it is must to have clocks with double the speed in order to
send same amount of data as in NRZ encodings. Alternatively, you can say that only
50% of the data is sent. We can improve this performance factor substantially if a better
encoding scheme is used. This method may have a transition after fixed number of bits
rather than every other bit. If you have a transition after every four bits, then it signifies
that you will be sending 80% data of actual capacity. This is considered as a significant
enhancement in the performance.
This method is known as 4B/5B. In this method, we convert 4-bits to 5-bits,
assuring at least one transition in them. Here, the fundamental idea is that the 5-bit
code selected must have:
one leading 0
no more than two trailing 0s
Therefore, it is assured that more than three consecutive 0s cannot exist. Now these
5-bit codes are transmitted by means of NRZI coding. Thus problem of consecutive 1s
is solved.
Out of the remaining 16 codes, 7 are unacceptable and others are utilised to send
some control information such as line dead(00000), line idle(11111), Halt(00100) etc.
Other variants for this scheme include 5B/6B, 8B/10B etc. These variants have self-
suggesting names.
8B/6T Encoding: In the schemes discussed above, we have used two/three
voltage levels for a signal. However, more than three voltage levels can be used
altogether. This allows us to send more than one bit over a single signal. If we utilise six
voltage levels and 8-bits, then the scheme is known as 8B/6T. Here, we have 729(3^6)
combinations for signal and 256(2^8) combinations for bits.
Bipolar AIM
In case of Bipolar AIM, there are three voltage levels: middle, upper, lower.
Representation 1: Middle level =0 Upper, Lower level =1 such that successive 1's
will be represented alternately on upper and lower levels.
Representation 2: Middle level =1 Upper, Lower level=0
Asynchronous Transmission
In asynchronous transmission, small blocks of bits (usually bytes) are sent at a time
with no time relation among consecutive bytes .When no transmission takes place, a
default state is maintained corresponding to bit 1. Because of arbitrary delay between
consecutive bytes, the time incidences of the clock pulses at the receiving end need to
be synchronized for every byte. This is attained by providing two extra bits, that is, start
and stop.
Start bit: Start bit is prefixed to each byte and equals 0. Therefore, it assures a
transition from 1 to 0 at onset of byte transmission. You can use the leading edge of
start bit as a reference for generating clock pulses at necessary sampling instants.
Therefore, every onset of a byte leads to resynchronization of receiver clock.
Stop bit: To assure that the transition from 1 to 0 is always available at the
beginning of a byte, it is essential that default state should be 1. However, there
may be two bytes, one immediately following the other and if last bit of first byte is
0, transition from 1 to 0 will not take place. Thus, a stop bit is suffixed to each byte
equalling 1. Its duration is generally 1, 1.5, 2 bits.
Asynchronous transmission is considered as simple and inexpensive. However, it
needs an overhead of 3 bits, that is, for 7 bit code 2 (start, stop bits) + 1 parity bit
implying 30% overhead. Nevertheless, % can be reduced by sending larger blocks of
data, but then timing errors among receiver and sender cannot be tolerated beyond
[50/no. of bits in block] % (assuming sampling is done at middle of bit interval). Apart
from resulting in incorrect sampling, it also misalign bit count, that is, a data bit can be
mistaken for stop bit if the clock of receiver is faster.
Synchronous Transmission
In synchronous transmission, larger blocks of bits are transmitted in a successful
manner. Blocks of data are either considered as sequence of bits or bytes. In order to
avoid timing drift, clocks at two ends are required to be synchronised. This can
performed in two ways:
Baud Rate
The baud rate determines how fast the signal changes value or its amplitude. The baud
rate is computed as the number of times per second the signal switches as it’s
transmitting a string of alternating 0’s and 1’s. A higher data rate can be achieved by
switching the amplitude of the signal faster. The amplitude may be voltage. In digital
notation, +5 Volt signifies 1 and – 5 Volt signifies 0. Baud rate is different from data rate.
Channel characteristics are the major factors determining the rate of data transmission.
A channel may be defined as a path between transmitter and receiver. This path may
be logical or physical in nature. It may also be hard wired or wireless. The path provides
a passage for the information or data from transmitter to receiver with certain amount of
loss of information or data, which may be reproduced with other techniques. In some
cases, the information may not be reproduced or the information may not reach at
receiver at all. Such kinds of phenomenon may be very well understood from the
following channel characteristic issues:
Channel Bandwidth
Channel bandwidth may be defined as the size of the range of frequencies that can be
transmitted through a channel. In other words we may define it as the volume of
information per unit time that a computer, person, or transmission medium can handle.
It is measured in Hertz (Hz). Bandwidth is expressed as data speed in bits per second
(bps) in digital systems while as the difference between highest frequency to lowest
frequency in analog system. Bandwidth determines how fast data flows on a given
transmission path. It is determined as the amount of data transmitted or received per
unit time. As it has already been explained in noise that low bandwidth signal produces
less internal noise compared to high bandwidth signal therefore these are preferred.
However in this case, we have to sacrifice data transmission speed. Therefore, a trade-
off is required to be determined based on the performance requirements.
Bandwidth is affected by the type and physical characteristics of media used,
amount of noise present in transmission channel and data encoding method used.
Further, C Shannon extended the work of H Nyquist and proposed a data rate for
random noise.
Notes
Nyquist stated that if an arbitrary signal has been run through a low pass filter of
bandwidth H, the filtered signal can be reconstructed by sampling the signal twice the
frequency of the signal. Mathematically,
Maximum data rate = 2H log2W/second
where W represents the number of discrete levels in the signal
Shannon’s Theorem
The above is a case of a noiseless channel. If random (internal) noise is present the
situation deteriorates rapidly. As we have already explained that SNR is given by a
quantity 10 log10S/N dB.
Shannon’s theorem computes the maximum data rate for channels having noise. All
real channels have certain amount of noise. According to Shannon’s theorem, the
maximum data rate of a noisy channel of bandwidth H, signal-to-noise ratio of S/N is
given by:
Maximum data rate = H log2 (1 + S/N)
Channel Capacity
It is the amount of information per unit time handled by either a link or a node (system,
element). The messages transmitted may be either similar or different. It is usually
measured in bits per second.
Transmission Time
It is the time required transmitting a message through the channel. It is the size of the
message in bits divided by the data rate in bits per second (bps) of the channel over
which the transmission takes place. It is also given as the packet length divided by the
channel capacity.
Throughput
Throughput may be defined as the number of bits, characters, or blocks passing
through a data communication system over a period of time.
Throughput = Packet length in bits/Transmission time + Propagation time
Channel Utilization
Channel utilization is nothing but the fraction of the channel’s data rate actually used to
transmit data. From the throughput it is observed that the propagation time and
transmission time are two different parameters which are respectively depended upon
the path length and packet length (number of bits in a message).
Hence,
Channel Utilization = a/1+a
Where a is given as the ratio of propagation time and transmission time and is
known as bit length.
Notes
system may use odd-parity checking, where the number of 1s should be odd. The
principle is the same; the calculation is different.
Notes
CRC Generator
It is important for you to know that a CRC generator used modulo-2 division, Figure1.8
shows the process. In the first step, the four-bit divisor is subtracted from the first four
bits of the dividend. Each bit of the divisor is subtracted from the corresponding bit of
the dividend without disturbing the next higher bit. In our example, the divisor, 1101, is
subtracted from the first four bits of the dividend, 1101 and yielding 100 (the leading 0 of
the remainder is dropped off).
The next unused bit from the dividend is then pulled down to make the number of
bits in the remainder equal to the number of bits in the divisor. The next step, therefore,
is 1000-1101, which yields 101, and so on. In this process, the divisor always begins
with a 1; the divisor is subtracted from a portion of the previous dividend/remainder that
is equal to it in length; the divisor can only be subtracted from a string of 0s, of the same
length as the divisor, replaces the divisor in that step of the process.
Amity Directorate of Distance & Online Education
40 Computer Communication Network
For string of 0s, of the same length as the divisor, replaces the divisor in that step of
the process. Example: If the divisor is four bits long, it is replaced by four 0s.
Notes
Remember, we are dealing with bit patterns, not with quantitative values; 0000 is
not the same as 0. This restriction means that, at any step, the leftmost subtraction will
be either 0 – 0 or 1 – 1, both of which equal 0. So, after subtraction, the leftmost bit of
the remainder will always be a leading zero which is dropped off, and the next unused
bit of the dividend is pulled down to fill out the remainder. Note that only the first bit of
the remainder is dropped – if the second bit is also 0. It is retained, and the
dividend/remainder for the next step will begin with 0. This process repeats units the
entire dividend has been used.
2.5 Multiplexing
When two communicating nodes are connected through a media, it generally happens
that bandwidth of media is several times greater than that of the communicating nodes.
Transfer of a single signal at a time is both slow and expensive. The whole capacity of
the link is not being utilized in this case. This link can be further exploited by sending
several signals combined into one. This combining of signals into one is called
multiplexing.
Frequency Division Multiplexing (FDM): This is possible in the case where
transmission media has a bandwidth than the required bandwidth of signals to be
transmitted. A number of signals can be transmitted at the same time. Each source is
allotted a frequency range in which it can transfer its signals, and a suitable frequency
gap is given between two adjacent signals to avoid overlapping. This is type of
multiplexing is commonly seen in the cable TV networks.
2.6 Summary
Data transmission refers to the movement of data in form of bits between two or more
digital devices. Both analog and digital information can be encoded as either analog or
digital signals. In Asynchronous Transmission, small blocks of bits (generally bytes) are
sent at a time without any time relation between consecutive bytes. In Synchronous
Transmission, larger blocks of bits are successfully transmitted.