SlideShare a Scribd company logo
ENCODING AND MODULATING -Digital-to-digital conversion (encoding digital data into digital signal) -Analog-to-digital conversion (digitizing analog signal) -Digital-to-analog conversion (modulating a digital signal) -Analog-to-analog conversion (modulating analog signal) Chapter 4
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Unipolar ,[object Object],[object Object],[object Object],[object Object],[object Object]
UNIPOLAR ENCODING Unipolar encoding uses only one voltage level.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lack of synchronization
Polar encoding ,[object Object],[object Object],[object Object],[object Object]
POLAR ENCODING Polar encoding uses two voltage levels (positive and negative).
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],In NRZ-L the level of the signal is dependent upon the state of the bit.
[object Object],[object Object],[object Object],[object Object],In NRZ-I the signal is inverted if a 1 is encountered.
NRZ-L and NRZ-I encoding
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biphase ,[object Object],[object Object],[object Object]
Manchester (or diphase or biphase encoding) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Manchester Encoding In Manchester encoding, the transition at the middle of the bit is used for both synchronization and bit representation.
Differential Manchester Coding ,[object Object],[object Object],[object Object],[object Object],[object Object]
Differential Manchester encoding In differential Manchester encoding, the transition at the middle of the bit is used only for synchronization.  The bit representation is defined by the inversion or noninversion at the beginning of the bit.
[object Object],[object Object],[object Object],[object Object],[object Object]
Analog-to-Digital Encoding ,[object Object],[object Object],[object Object],[object Object],[object Object],Nyquist Theorem
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bit rate=Baud rate X No. of bits per signal element
Example 1 An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, find the baud rate and the bit rate Solution Baud rate = 1000 bauds per second (baud/s) Bit rate = 1000 x 4 = 4000 bps
Example 2 The bit rate of a signal is 3000. If each signal unit carries 6 bits, what is the baud rate? Solution Baud rate = 3000 / 6 = 500 baud/s
[object Object],[object Object],[object Object],[object Object],[object Object]
Relationship between baud rate and bandwidth in ASK
Example 3 Find the minimum bandwidth for an ASK signal transmitting at 2000 bps. The transmission mode is half-duplex. Solution In ASK the baud rate and bit rate are the same. The baud rate is therefore 2000. An ASK signal requires a minimum bandwidth equal to its baud rate. Therefore, the minimum bandwidth is 2000 Hz.
Example 4 Given a bandwidth of 5000 Hz for an ASK signal, what are the baud rate and bit rate? Solution In ASK the baud rate is the same as the bandwidth, which means the baud rate is 5000. But because the baud rate and the bit rate are also the same for ASK, the bit rate is 5000 bps.
[object Object],[object Object],[object Object]
Phase Shift Keying (PSK) ,[object Object],[object Object]
Quadrature Amplitude Modulation (QAM) ,[object Object],[object Object],[object Object]
 
Bit and baud
Time domain for an 8-QAM signal
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Figure 5-40 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Analog to Analog Encoding
Types of analog-to-analog modulation
Amplitude Modulation
AM Bandwidth
AM Band Allocation
Example We have an audio signal with a bandwidth of 4 KHz. What is the bandwidth needed if we modulate the signal using AM? Ignore FCC regulations. Solution An AM signal requires twice the bandwidth of the original signal:   BW = 2 x 4 KHz = 8 KHz
Figure 5-45 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Frequency Modulation
Figure 5-46 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 FM Bandwidth
The bandwidth of a stereo audio signal is usually 15 KHz. Therefore, an FM station needs at least a bandwidth of 150 KHz. The FCC requires the minimum bandwidth to be at least 200 KHz (0.2 MHz). Note:
FM Band Allocation
Example  We have an audio signal with a bandwidth of 4 MHz. What is the bandwidth needed if we modulate the signal using FM? Ignore FCC regulations. Solution An FM signal requires 10 times the bandwidth of the original signal:   BW = 10 x 4 MHz = 40 MHz

More Related Content

What's hot

Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmission
Jeffery Vava
 
Analog to analog conversion
Analog to analog conversionAnalog to analog conversion
Analog to analog conversion
Meherul1234
 
signal encoding techniques
signal encoding techniquessignal encoding techniques
signal encoding techniques
Srinivasa Rao
 
Digital to Analog conversion
Digital to Analog conversionDigital to Analog conversion
Digital to Analog conversion
Mariam Butt
 
Amplitude shift keying
Amplitude shift keyingAmplitude shift keying
Amplitude shift keying
Sunny Kumar
 
Data encoding
Data encodingData encoding
Data encoding
Akash Bhandari
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
Imesha Perera
 
Modulation
ModulationModulation
Modulation
Nidhi Baranwal
 
Encoding Techniques
Encoding TechniquesEncoding Techniques
Data Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar codingData Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar coding
Dr Rajiv Srivastava
 
Lecture 09
Lecture 09Lecture 09
Lecture 09
Sehrish Rafiq
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
Basics of signals data communication
Basics of signals data communicationBasics of signals data communication
Basics of signals data communication
Syed Bilal Zaidi
 
TWO STAGE NETWORKS
TWO STAGE NETWORKSTWO STAGE NETWORKS
TWO STAGE NETWORKS
AakankshaR
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
Revathi Subramaniam
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
Sehrish Rafiq
 
Hamming codes
Hamming codesHamming codes
Hamming codes
GIGI JOSEPH
 
Data Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITSData Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITS
Avijeet Negel
 
4. block coding
4. block coding 4. block coding
4. block coding
MdFazleRabbi18
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
Gupta6Bindu
 

What's hot (20)

Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmission
 
Analog to analog conversion
Analog to analog conversionAnalog to analog conversion
Analog to analog conversion
 
signal encoding techniques
signal encoding techniquessignal encoding techniques
signal encoding techniques
 
Digital to Analog conversion
Digital to Analog conversionDigital to Analog conversion
Digital to Analog conversion
 
Amplitude shift keying
Amplitude shift keyingAmplitude shift keying
Amplitude shift keying
 
Data encoding
Data encodingData encoding
Data encoding
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Modulation
ModulationModulation
Modulation
 
Encoding Techniques
Encoding TechniquesEncoding Techniques
Encoding Techniques
 
Data Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar codingData Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar coding
 
Lecture 09
Lecture 09Lecture 09
Lecture 09
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
 
Basics of signals data communication
Basics of signals data communicationBasics of signals data communication
Basics of signals data communication
 
TWO STAGE NETWORKS
TWO STAGE NETWORKSTWO STAGE NETWORKS
TWO STAGE NETWORKS
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
Data Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITSData Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITS
 
4. block coding
4. block coding 4. block coding
4. block coding
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 

Viewers also liked

Encoding techniques
Encoding techniquesEncoding techniques
Encoding techniques
Goriha Naveed
 
4 signal encodingtechniques
4 signal encodingtechniques4 signal encodingtechniques
4 signal encodingtechniques
Hattori Sidek
 
Encoding in Data Communication DC8
Encoding in Data Communication DC8Encoding in Data Communication DC8
Encoding in Data Communication DC8
koolkampus
 
05 signal encoding
05 signal encoding05 signal encoding
05 signal encoding
Bestha Harish
 
L8 signal encoding techniques
L8 signal encoding techniquesL8 signal encoding techniques
L8 signal encoding techniques
Md. Shafiul Alam Sagor
 
10 lecture - ospf part1 , introduction to ospf , areas and abr
10   lecture  - ospf part1 , introduction to ospf , areas and abr10   lecture  - ospf part1 , introduction to ospf , areas and abr
10 lecture - ospf part1 , introduction to ospf , areas and abr
Shafaan Khaliq Bhatti
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
Shafaan Khaliq Bhatti
 
13 lecture - introduction and configuration of eigrp
13   lecture  - introduction and configuration of eigrp13   lecture  - introduction and configuration of eigrp
13 lecture - introduction and configuration of eigrp
Shafaan Khaliq Bhatti
 
15 lecture - acl part1, introduction to access control list
15   lecture  - acl part1, introduction to access control list15   lecture  - acl part1, introduction to access control list
15 lecture - acl part1, introduction to access control list
Shafaan Khaliq Bhatti
 
Chapter 5 - Signal Encoding Techniques 9e
Chapter 5 - Signal Encoding Techniques 9eChapter 5 - Signal Encoding Techniques 9e
Chapter 5 - Signal Encoding Techniques 9e
adpeer
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
Shafaan Khaliq Bhatti
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
Wayne Jones Jnr
 

Viewers also liked (12)

Encoding techniques
Encoding techniquesEncoding techniques
Encoding techniques
 
4 signal encodingtechniques
4 signal encodingtechniques4 signal encodingtechniques
4 signal encodingtechniques
 
Encoding in Data Communication DC8
Encoding in Data Communication DC8Encoding in Data Communication DC8
Encoding in Data Communication DC8
 
05 signal encoding
05 signal encoding05 signal encoding
05 signal encoding
 
L8 signal encoding techniques
L8 signal encoding techniquesL8 signal encoding techniques
L8 signal encoding techniques
 
10 lecture - ospf part1 , introduction to ospf , areas and abr
10   lecture  - ospf part1 , introduction to ospf , areas and abr10   lecture  - ospf part1 , introduction to ospf , areas and abr
10 lecture - ospf part1 , introduction to ospf , areas and abr
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
13 lecture - introduction and configuration of eigrp
13   lecture  - introduction and configuration of eigrp13   lecture  - introduction and configuration of eigrp
13 lecture - introduction and configuration of eigrp
 
15 lecture - acl part1, introduction to access control list
15   lecture  - acl part1, introduction to access control list15   lecture  - acl part1, introduction to access control list
15 lecture - acl part1, introduction to access control list
 
Chapter 5 - Signal Encoding Techniques 9e
Chapter 5 - Signal Encoding Techniques 9eChapter 5 - Signal Encoding Techniques 9e
Chapter 5 - Signal Encoding Techniques 9e
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 

Similar to Data Encoding

W6_Ch5_Signal Encoding.pdf
W6_Ch5_Signal Encoding.pdfW6_Ch5_Signal Encoding.pdf
W6_Ch5_Signal Encoding.pdf
matom84405
 
Lecture7 encodingmodulation
Lecture7 encodingmodulationLecture7 encodingmodulation
Lecture7 encodingmodulation
H K
 
Lecture notes eng - Line Coding New.ppt
Lecture notes eng  - Line Coding New.pptLecture notes eng  - Line Coding New.ppt
Lecture notes eng - Line Coding New.ppt
JumanneChiyanda
 
CCN
CCNCCN
CCN
NICE
 
Chapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptChapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.ppt
faisalahmed441
 
komdat5
komdat5komdat5
komdat5
pasca
 
Digital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesDigital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling Techniques
Biplap Bhattarai
 
05 signal encodingtechniques
05 signal encodingtechniques05 signal encodingtechniques
05 signal encodingtechniques
chameli devi group of institutions
 
base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.ppt
AbyThomas54
 
Binary to digital encoding tbs 301
Binary to digital encoding tbs 301Binary to digital encoding tbs 301
Binary to digital encoding tbs 301
Bhupesh Rawat
 
24071 digitalcommunication
24071 digitalcommunication24071 digitalcommunication
24071 digitalcommunication
sharma ellappan
 
digital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdfdigital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdf
KiranG731731
 
lec5_13.pptx
lec5_13.pptxlec5_13.pptx
lec5_13.pptx
ShakibAhmed52
 
TeleCom Lecture 07.ppt
TeleCom Lecture 07.pptTeleCom Lecture 07.ppt
TeleCom Lecture 07.ppt
RiyaBatool
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATION
Deepak kango
 
Unit 3.pptx
Unit 3.pptxUnit 3.pptx
analog communication system for undergraduate .pdf
analog communication  system for undergraduate .pdfanalog communication  system for undergraduate .pdf
analog communication system for undergraduate .pdf
AlaAwouda
 
Line Coding.pptx
Line Coding.pptxLine Coding.pptx
Line Coding.pptx
vishal choudhary
 
Lecture 08
Lecture 08Lecture 08
Lecture 08
Sehrish Rafiq
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
Shiraz316
 

Similar to Data Encoding (20)

W6_Ch5_Signal Encoding.pdf
W6_Ch5_Signal Encoding.pdfW6_Ch5_Signal Encoding.pdf
W6_Ch5_Signal Encoding.pdf
 
Lecture7 encodingmodulation
Lecture7 encodingmodulationLecture7 encodingmodulation
Lecture7 encodingmodulation
 
Lecture notes eng - Line Coding New.ppt
Lecture notes eng  - Line Coding New.pptLecture notes eng  - Line Coding New.ppt
Lecture notes eng - Line Coding New.ppt
 
CCN
CCNCCN
CCN
 
Chapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptChapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.ppt
 
komdat5
komdat5komdat5
komdat5
 
Digital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesDigital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling Techniques
 
05 signal encodingtechniques
05 signal encodingtechniques05 signal encodingtechniques
05 signal encodingtechniques
 
base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.ppt
 
Binary to digital encoding tbs 301
Binary to digital encoding tbs 301Binary to digital encoding tbs 301
Binary to digital encoding tbs 301
 
24071 digitalcommunication
24071 digitalcommunication24071 digitalcommunication
24071 digitalcommunication
 
digital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdfdigital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdf
 
lec5_13.pptx
lec5_13.pptxlec5_13.pptx
lec5_13.pptx
 
TeleCom Lecture 07.ppt
TeleCom Lecture 07.pptTeleCom Lecture 07.ppt
TeleCom Lecture 07.ppt
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATION
 
Unit 3.pptx
Unit 3.pptxUnit 3.pptx
Unit 3.pptx
 
analog communication system for undergraduate .pdf
analog communication  system for undergraduate .pdfanalog communication  system for undergraduate .pdf
analog communication system for undergraduate .pdf
 
Line Coding.pptx
Line Coding.pptxLine Coding.pptx
Line Coding.pptx
 
Lecture 08
Lecture 08Lecture 08
Lecture 08
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Data Encoding

  • 1. ENCODING AND MODULATING -Digital-to-digital conversion (encoding digital data into digital signal) -Analog-to-digital conversion (digitizing analog signal) -Digital-to-analog conversion (modulating a digital signal) -Analog-to-analog conversion (modulating analog signal) Chapter 4
  • 2.
  • 3.
  • 4.
  • 5. UNIPOLAR ENCODING Unipolar encoding uses only one voltage level.
  • 6.
  • 8.
  • 9. POLAR ENCODING Polar encoding uses two voltage levels (positive and negative).
  • 10.
  • 11.
  • 12. NRZ-L and NRZ-I encoding
  • 13.
  • 14.
  • 15.
  • 16. Manchester Encoding In Manchester encoding, the transition at the middle of the bit is used for both synchronization and bit representation.
  • 17.
  • 18. Differential Manchester encoding In differential Manchester encoding, the transition at the middle of the bit is used only for synchronization. The bit representation is defined by the inversion or noninversion at the beginning of the bit.
  • 19.
  • 20.
  • 21.  
  • 22.
  • 23. Example 1 An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, find the baud rate and the bit rate Solution Baud rate = 1000 bauds per second (baud/s) Bit rate = 1000 x 4 = 4000 bps
  • 24. Example 2 The bit rate of a signal is 3000. If each signal unit carries 6 bits, what is the baud rate? Solution Baud rate = 3000 / 6 = 500 baud/s
  • 25.
  • 26. Relationship between baud rate and bandwidth in ASK
  • 27. Example 3 Find the minimum bandwidth for an ASK signal transmitting at 2000 bps. The transmission mode is half-duplex. Solution In ASK the baud rate and bit rate are the same. The baud rate is therefore 2000. An ASK signal requires a minimum bandwidth equal to its baud rate. Therefore, the minimum bandwidth is 2000 Hz.
  • 28. Example 4 Given a bandwidth of 5000 Hz for an ASK signal, what are the baud rate and bit rate? Solution In ASK the baud rate is the same as the bandwidth, which means the baud rate is 5000. But because the baud rate and the bit rate are also the same for ASK, the bit rate is 5000 bps.
  • 29.
  • 30.
  • 31.
  • 32.  
  • 34. Time domain for an 8-QAM signal
  • 35.
  • 36.
  • 37. Figure 5-40 WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998 Analog to Analog Encoding
  • 42. Example We have an audio signal with a bandwidth of 4 KHz. What is the bandwidth needed if we modulate the signal using AM? Ignore FCC regulations. Solution An AM signal requires twice the bandwidth of the original signal: BW = 2 x 4 KHz = 8 KHz
  • 43. Figure 5-45 WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998 Frequency Modulation
  • 44. Figure 5-46 WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998 FM Bandwidth
  • 45. The bandwidth of a stereo audio signal is usually 15 KHz. Therefore, an FM station needs at least a bandwidth of 150 KHz. The FCC requires the minimum bandwidth to be at least 200 KHz (0.2 MHz). Note:
  • 47. Example We have an audio signal with a bandwidth of 4 MHz. What is the bandwidth needed if we modulate the signal using FM? Ignore FCC regulations. Solution An FM signal requires 10 times the bandwidth of the original signal: BW = 10 x 4 MHz = 40 MHz

Editor's Notes

  1. Key Points: Like IBM, Digital’s architecture DNA (Digital Network Architecture), is closely associated with its product offerings. VAX is a CISC (Complex Instruction Set Computer) that is at the heart of many of DEC’s products. It is a proprietary hardware architecture platform unique to Digital. DEC also has a RISC (Reduced Instruction Set Computer) developed by MIPS Computer Systems. Again, this is similar to product offerings in the IBM architecture. Rounding out their product line is the DEC ALPHA. This is a PC desktop product that performs similar to Intel-based products. It is important to stress that, regardless of the various products hardware characteristics, many standard applications such as client/server resource sharing, centralized printing services and database services are all supported in the DEC computing world.