SlideShare a Scribd company logo
1 of 39
DATA COMMUNICATIONS &
          NETWORKING
           LECTURE-09

         Course Instructor : Sehrish Rafiq
         Department Of Computer Science
                  University Of Peshawar
LECTURE OVERVIEW
   RZ
   Manchester and Differential Manchester
   Bipolar
   Block coding
   Steps in Block coding
   4B/5B substitution
   Analog to digital conversion
   Sampling
   PAM
   PCM
   Nyquist Theorem
RZ OR RETURN TO ZERO
             ENCODING
   Any time the original data contain strings of consecutive 1s
    or 0s, the receiver can lose its place.

   A solution is to some how include synchronization in the
    encoded signal, something like the solution provided by
    NRZ-I but one capable of handling strings of 0’s as well as
    1s.
   Solution:
   To ensure synchronization , there must be a signal change
    for each bit.

   The receiver can use these changes to synchronize its clock.

   NRZ-I accomplishes this for sequence of 1’s.
RZ CONTINUED…
   But to change with every bit we need more than just two
    values.

   RZ encoding uses three values: positive, negative and zero.

   In RZ the signal changes not between bits but during each bit.

   A 1 bit is actually represented by positive-to-zero and a 0 bit
    by negative-to-zero rather than by positive and negative alone.

   The main disadvantage of RZ encoding is that it requires two
    signal changes to encode one bit and therefore occupies more
    bandwidth.
   But it is more effective than NRZ-L and NRZ-I.
RZ ENCODING
MANCHESTER ENCODING
   Manchester encoding uses an inversion at the
    middle of each bit interval for both
    synchronization and bit representation.

   A negative to positive transition sent binary 1
    and a positive to negative transition represents
    binary 0.

   By using a single transition for a dual purpose,
    Manchester encoding achieves the same level of
    synchronization as RZ but with only two levels of
    amplitude.
MANCHESTER ENCODING
DIFFERENTIAL MANCHESTER
           ENCODING
 In differential Manchester encoding, the
  inversion at the middle of the bit interval is used
  for synchronization but the presence or absence
  of an additional transition at the beginning of
  the interval is used to identify the bit.
 A transition means binary 0 and no transition
  means binary 1.
 Differential Manchester encoding requires two
  signal changes to represent binary 0 but only one
  to represent binary 1.
DIFFERENTIAL MANCHESTER
       ENCODING
BIPOLAR ENCODING
 Bipolar like RZ uses three voltage levels:
  positive, negative and zero .
 However the zero level in bipolar encoding is
  used to represent binary 0.
 The 1’s are represented by alternating positive
  and negative voltages.
 This alternation occurs even when the one bits
  are not consecutive.
AMI ENCODING
 A common bipolar encoding scheme is called
  bipolar alternate mark inversion (AMI).
 AMI means alternate 1 inversion.

 A neutral zero voltage represents binary zero.

 Binary 1s are represented by alternating positive
  and negative voltages.
BIPOLAR AMI ENCODING
2B1Q(TWO BINARY 1
            QUATERNARY)
 The 2B1Q uses four voltage levels.
 Each pulse can represent 2 bits, making each
  pulse more efficient.
MLT-3
   Multiline transmission, three level (MLT-3) is very similar
    to NRZ-I.
   But it uses three levels of signals (+1,0,-1).
   The signal transitions from one level to the next at the
    beginning of a 1 bit, there is no transition at the beginning
    of a zero bit.
BLOCK CODING
 To improve the performance of line coding,block
  coding was introduced.
 We need some kind of redundancy to ensure
  synchronization.
 We need to include other redundandant bits to
  detect errors.
 Block coding can achieve to some extent these
  two goals.
BLOCK CODING
STEPS IN TRANSFORMATION
 Division
 Substitution

 Line coding
DIVISION
 In this step the sequence of bits is divided in to
  groups of m bits.
 E.g. in 4B/5B encoding, the orignal bit sequence
  is divided in to 4-bit groups.
SUBSTITUTION
 In this step we substitute m-bit code for an n-bit
  group.
 To achieve synchronization we can use the m-bit
  codes in such a way that for example we don’t
  have more than 3 consecutive 0’s and 1’s,
 Block coding can definitely help in error
  detection.
 Because only a subset of the 5-bit codes is used,

 If one or more of the bits in the block is changed
  in such a way that one of the unused codes is
  received, the receiver can easily detect the error.
4B/5B
4B/5B

Data   Code    Data   Code
0000   11110   1000   10010
0001   01001   1001   10011
0010   10100   1010   10110
0011   10101   1011   10111
0100   01010   1100   11010
0101   01011   1101   11011
0110   01110   1110   11100
0111   01111   1111   11101
4B/5B

        Data           Code
Q (Quiet)              00000
I (Idle)               11111
H (Halt)               00100
J (start delimiter)    11000
K (start delimiter)    10001
T (end delimiter)      01101
S (Set)                11001
R (Reset)              00111
LINE CODING
   In Line coding the block codes are transformed in
     to the digital signals using one of the Line coding
    techniques.
SAMPLING
 The process through which an Analog signal is
  changed to digital signal is called sampling.
 The idea of digitizing the analog signals started
  with telephone companies.
 Digital signals are less prone to noise and
  distortion.
 A small change in an analog signal can change
  the received voice substantially but it takes a
  considerable change to convert a 0 to 1 or a 1 to
  0.
 PAM

 PCM
PULSE AMPLITUDE
          MODULATION(PAM)
 The analog–to-digital conversion method is called
  pulse amplitude modulation.
 This technique takes an analog signal , samples
  it and generates a series of pulses based on the
  results of the sampling.
 Sampling: The term sampling means measuring
  the amplitude of the signal at equal intervals.
 PAM uses a technique called sample and hold.

 At a given moment the signal level is read and
  then held briefly.
PAM
PAM
 Pulse amplitude modulation has some
  applications, but it is not used by itself in data
  communication.
 However, it is the first step in another very
  popular conversion method called pulse code
  modulation.
 The sampled value occurs only instantaneously
  in the actual waveform but it is generalized over
  a still but measurable period in the PAM result.
 PAM is not useful to data communications
  because the pulses measured by PAM are still of
  any amplitude(still an analog signal not digital).
 To make them digital, we must modify them by
PCM
   PCM modifies the pulses created by PAM to
    create a completely digital signal.

   PCM first quantizes the PAM pulses.

   Quantization is a method of assigning integral
    values in a specific range to sampled instances.
QUANTIZED PAM SIGNAL
PCM
 Then a sign and magnitude is assigned to
  quantized samples.
 Each value is translated in to its 7-bit binary
  equivalent.
 The eighth bit creates the sign.
PCM CONTINUED…
   The binary digits are then transformed to a
    digital signal by using one of the line coding
    techniques.
FROM ANALOG SIGNAL TO PCM
      DIGITAL CODE
WHAT SHOULD BE THE
         SAMPLING RATE???
 The accuracy of any digital reproduction of an
  analog signal depends on the number of samples
  taken.
 Using PAM and PCM we can reproduce the
  waveform exactly by taking infinite samples or
  we can reproduce the barest generalization of its
  direction change by taking three samples.
 How many samples are sufficient?

 Answer : Nyquist theorem
NYQUIST THEOREM
 According to Nyquist theorem the
 sampling rate must be at least twice
 the highest frequency of the signal.
Example 1
What sampling rate is needed for a signal with a
bandwidth of 10,000 Hz (1000 to 11,000 Hz)?
Solution
The sampling rate must be twice the highest
frequency in the signal:


   Sampling rate = 2 x (11,000) = 22,000
 samples/s
NYQUIST THEOREM
HOW MANY BITS PER SAMPLE???
 This depends on the level of precision needed.
 The number of bits is chosen such that the
  original signal can be reproduced with the
  desired precision in amplitude.
Example 2
A signal is sampled. Each sample requires at least 12
levels of precision (+0 to +5 and -0 to -5). How many bits
should be sent for each sample?


Solution
 We need 4 bits; 1 bit for the sign and 3 bits for the
 value. A 3-bit value can represent 23 = 8 levels (000
 to 111), which is more than what we need. A 2-bit
 value is not enough since 22 = 4. A 4-bit value is too
 much because 24 = 16.
Have a nice day!!!

More Related Content

What's hot

Data Communication & Computer network: Channel capacity
Data Communication & Computer network: Channel capacityData Communication & Computer network: Channel capacity
Data Communication & Computer network: Channel capacityDr Rajiv Srivastava
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibraribrar562
 
1432.encoding concepts
1432.encoding concepts1432.encoding concepts
1432.encoding conceptstechbed
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Imesha Perera
 
Shannon-Fano algorithm
Shannon-Fano algorithmShannon-Fano algorithm
Shannon-Fano algorithmMANISH T I
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation Badrul Alam
 
Data communications 4 1
Data communications 4 1Data communications 4 1
Data communications 4 1Raymond Pidor
 
Transmission Impairment
Transmission ImpairmentTransmission Impairment
Transmission ImpairmentTaaanu01
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSiddique Ibrahim
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionJeoffnaRuth
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codesRevathi Subramaniam
 
Implementation of reed solomon codes basics
Implementation of reed solomon codes basicsImplementation of reed solomon codes basics
Implementation of reed solomon codes basicsRam Singh Yadav
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Madhumita Tamhane
 

What's hot (20)

Data Communication & Computer network: Channel capacity
Data Communication & Computer network: Channel capacityData Communication & Computer network: Channel capacity
Data Communication & Computer network: Channel capacity
 
Linear block code
Linear block codeLinear block code
Linear block code
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
1432.encoding concepts
1432.encoding concepts1432.encoding concepts
1432.encoding concepts
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
4. block coding
4. block coding 4. block coding
4. block coding
 
Line Coding.pptx
Line Coding.pptxLine Coding.pptx
Line Coding.pptx
 
Shannon-Fano algorithm
Shannon-Fano algorithmShannon-Fano algorithm
Shannon-Fano algorithm
 
Line coding
Line codingLine coding
Line coding
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
 
Data communications 4 1
Data communications 4 1Data communications 4 1
Data communications 4 1
 
Transmission Impairment
Transmission ImpairmentTransmission Impairment
Transmission Impairment
 
Encoding Techniques
Encoding TechniquesEncoding Techniques
Encoding Techniques
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
 
Implementation of reed solomon codes basics
Implementation of reed solomon codes basicsImplementation of reed solomon codes basics
Implementation of reed solomon codes basics
 
Data link layer
Data link layer Data link layer
Data link layer
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 

Viewers also liked (9)

Lecture 05
Lecture 05Lecture 05
Lecture 05
 
Welcome to my
Welcome to myWelcome to my
Welcome to my
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
 
Lecture 02
Lecture 02Lecture 02
Lecture 02
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Ch 04
Ch 04Ch 04
Ch 04
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 
Data Encoding
Data EncodingData Encoding
Data Encoding
 

Similar to Lecture 09

digital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdfdigital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdfKiranG731731
 
Digital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesDigital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesBiplap Bhattarai
 
base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptAbyThomas54
 
CCN
CCNCCN
CCNNICE
 
Binary to digital encoding tbs 301
Binary to digital encoding tbs 301Binary to digital encoding tbs 301
Binary to digital encoding tbs 301Bhupesh Rawat
 
Analog-to Digital Conversion
Analog-to Digital ConversionAnalog-to Digital Conversion
Analog-to Digital Conversionwajahat Gul
 
line coding techniques, block coding and all type of coding
line coding techniques, block coding and all type of codingline coding techniques, block coding and all type of coding
line coding techniques, block coding and all type of codingDrZMaryLivinsaProfEC
 
Lecture7 encodingmodulation
Lecture7 encodingmodulationLecture7 encodingmodulation
Lecture7 encodingmodulationH K
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmissionMeenakshi Paul
 
Data Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar codingData Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar codingDr Rajiv Srivastava
 
W6_Ch5_Signal Encoding.pdf
W6_Ch5_Signal Encoding.pdfW6_Ch5_Signal Encoding.pdf
W6_Ch5_Signal Encoding.pdfmatom84405
 
Chapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptChapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptfaisalahmed441
 
Line coding Tec hniques.pptx
Line coding Tec                 hniques.pptxLine coding Tec                 hniques.pptx
Line coding Tec hniques.pptxnaveen088888
 

Similar to Lecture 09 (20)

digital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdfdigital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdf
 
Dcn aasignment
Dcn aasignmentDcn aasignment
Dcn aasignment
 
Digital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesDigital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling Techniques
 
base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.ppt
 
1 PCM & Encoding
1  PCM & Encoding1  PCM & Encoding
1 PCM & Encoding
 
CCN
CCNCCN
CCN
 
Binary to digital encoding tbs 301
Binary to digital encoding tbs 301Binary to digital encoding tbs 301
Binary to digital encoding tbs 301
 
lec5_13.pptx
lec5_13.pptxlec5_13.pptx
lec5_13.pptx
 
Analog-to Digital Conversion
Analog-to Digital ConversionAnalog-to Digital Conversion
Analog-to Digital Conversion
 
line coding techniques, block coding and all type of coding
line coding techniques, block coding and all type of codingline coding techniques, block coding and all type of coding
line coding techniques, block coding and all type of coding
 
Koding
KodingKoding
Koding
 
Lecture7 encodingmodulation
Lecture7 encodingmodulationLecture7 encodingmodulation
Lecture7 encodingmodulation
 
Unit 4
Unit 4Unit 4
Unit 4
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmission
 
Data Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar codingData Communication & Computer Networks : Unipolar & Polar coding
Data Communication & Computer Networks : Unipolar & Polar coding
 
Lecture 08
Lecture 08Lecture 08
Lecture 08
 
W6_Ch5_Signal Encoding.pdf
W6_Ch5_Signal Encoding.pdfW6_Ch5_Signal Encoding.pdf
W6_Ch5_Signal Encoding.pdf
 
Pulse code mod
Pulse code modPulse code mod
Pulse code mod
 
Chapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptChapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.ppt
 
Line coding Tec hniques.pptx
Line coding Tec                 hniques.pptxLine coding Tec                 hniques.pptx
Line coding Tec hniques.pptx
 

More from Sehrish Rafiq

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Sehrish Rafiq
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 

More from Sehrish Rafiq (20)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Lecture 09

  • 1. DATA COMMUNICATIONS & NETWORKING LECTURE-09 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. LECTURE OVERVIEW  RZ  Manchester and Differential Manchester  Bipolar  Block coding  Steps in Block coding  4B/5B substitution  Analog to digital conversion  Sampling  PAM  PCM  Nyquist Theorem
  • 3. RZ OR RETURN TO ZERO ENCODING  Any time the original data contain strings of consecutive 1s or 0s, the receiver can lose its place.  A solution is to some how include synchronization in the encoded signal, something like the solution provided by NRZ-I but one capable of handling strings of 0’s as well as 1s.  Solution:  To ensure synchronization , there must be a signal change for each bit.  The receiver can use these changes to synchronize its clock.  NRZ-I accomplishes this for sequence of 1’s.
  • 4. RZ CONTINUED…  But to change with every bit we need more than just two values.  RZ encoding uses three values: positive, negative and zero.  In RZ the signal changes not between bits but during each bit.  A 1 bit is actually represented by positive-to-zero and a 0 bit by negative-to-zero rather than by positive and negative alone.  The main disadvantage of RZ encoding is that it requires two signal changes to encode one bit and therefore occupies more bandwidth.  But it is more effective than NRZ-L and NRZ-I.
  • 6. MANCHESTER ENCODING  Manchester encoding uses an inversion at the middle of each bit interval for both synchronization and bit representation.  A negative to positive transition sent binary 1 and a positive to negative transition represents binary 0.  By using a single transition for a dual purpose, Manchester encoding achieves the same level of synchronization as RZ but with only two levels of amplitude.
  • 8. DIFFERENTIAL MANCHESTER ENCODING  In differential Manchester encoding, the inversion at the middle of the bit interval is used for synchronization but the presence or absence of an additional transition at the beginning of the interval is used to identify the bit.  A transition means binary 0 and no transition means binary 1.  Differential Manchester encoding requires two signal changes to represent binary 0 but only one to represent binary 1.
  • 10. BIPOLAR ENCODING  Bipolar like RZ uses three voltage levels: positive, negative and zero .  However the zero level in bipolar encoding is used to represent binary 0.  The 1’s are represented by alternating positive and negative voltages.  This alternation occurs even when the one bits are not consecutive.
  • 11. AMI ENCODING  A common bipolar encoding scheme is called bipolar alternate mark inversion (AMI).  AMI means alternate 1 inversion.  A neutral zero voltage represents binary zero.  Binary 1s are represented by alternating positive and negative voltages.
  • 13. 2B1Q(TWO BINARY 1 QUATERNARY)  The 2B1Q uses four voltage levels.  Each pulse can represent 2 bits, making each pulse more efficient.
  • 14. MLT-3  Multiline transmission, three level (MLT-3) is very similar to NRZ-I.  But it uses three levels of signals (+1,0,-1).  The signal transitions from one level to the next at the beginning of a 1 bit, there is no transition at the beginning of a zero bit.
  • 15. BLOCK CODING  To improve the performance of line coding,block coding was introduced.  We need some kind of redundancy to ensure synchronization.  We need to include other redundandant bits to detect errors.  Block coding can achieve to some extent these two goals.
  • 17. STEPS IN TRANSFORMATION  Division  Substitution  Line coding
  • 18. DIVISION  In this step the sequence of bits is divided in to groups of m bits.  E.g. in 4B/5B encoding, the orignal bit sequence is divided in to 4-bit groups.
  • 19. SUBSTITUTION  In this step we substitute m-bit code for an n-bit group.  To achieve synchronization we can use the m-bit codes in such a way that for example we don’t have more than 3 consecutive 0’s and 1’s,  Block coding can definitely help in error detection.  Because only a subset of the 5-bit codes is used,  If one or more of the bits in the block is changed in such a way that one of the unused codes is received, the receiver can easily detect the error.
  • 20. 4B/5B
  • 21. 4B/5B Data Code Data Code 0000 11110 1000 10010 0001 01001 1001 10011 0010 10100 1010 10110 0011 10101 1011 10111 0100 01010 1100 11010 0101 01011 1101 11011 0110 01110 1110 11100 0111 01111 1111 11101
  • 22. 4B/5B Data Code Q (Quiet) 00000 I (Idle) 11111 H (Halt) 00100 J (start delimiter) 11000 K (start delimiter) 10001 T (end delimiter) 01101 S (Set) 11001 R (Reset) 00111
  • 23. LINE CODING  In Line coding the block codes are transformed in to the digital signals using one of the Line coding techniques.
  • 24. SAMPLING  The process through which an Analog signal is changed to digital signal is called sampling.  The idea of digitizing the analog signals started with telephone companies.  Digital signals are less prone to noise and distortion.  A small change in an analog signal can change the received voice substantially but it takes a considerable change to convert a 0 to 1 or a 1 to 0.  PAM  PCM
  • 25. PULSE AMPLITUDE MODULATION(PAM)  The analog–to-digital conversion method is called pulse amplitude modulation.  This technique takes an analog signal , samples it and generates a series of pulses based on the results of the sampling.  Sampling: The term sampling means measuring the amplitude of the signal at equal intervals.  PAM uses a technique called sample and hold.  At a given moment the signal level is read and then held briefly.
  • 26. PAM
  • 27. PAM  Pulse amplitude modulation has some applications, but it is not used by itself in data communication.  However, it is the first step in another very popular conversion method called pulse code modulation.  The sampled value occurs only instantaneously in the actual waveform but it is generalized over a still but measurable period in the PAM result.  PAM is not useful to data communications because the pulses measured by PAM are still of any amplitude(still an analog signal not digital).  To make them digital, we must modify them by
  • 28. PCM  PCM modifies the pulses created by PAM to create a completely digital signal.  PCM first quantizes the PAM pulses.  Quantization is a method of assigning integral values in a specific range to sampled instances.
  • 30. PCM  Then a sign and magnitude is assigned to quantized samples.  Each value is translated in to its 7-bit binary equivalent.  The eighth bit creates the sign.
  • 31. PCM CONTINUED…  The binary digits are then transformed to a digital signal by using one of the line coding techniques.
  • 32. FROM ANALOG SIGNAL TO PCM DIGITAL CODE
  • 33. WHAT SHOULD BE THE SAMPLING RATE???  The accuracy of any digital reproduction of an analog signal depends on the number of samples taken.  Using PAM and PCM we can reproduce the waveform exactly by taking infinite samples or we can reproduce the barest generalization of its direction change by taking three samples.  How many samples are sufficient?  Answer : Nyquist theorem
  • 34. NYQUIST THEOREM  According to Nyquist theorem the sampling rate must be at least twice the highest frequency of the signal.
  • 35. Example 1 What sampling rate is needed for a signal with a bandwidth of 10,000 Hz (1000 to 11,000 Hz)? Solution The sampling rate must be twice the highest frequency in the signal: Sampling rate = 2 x (11,000) = 22,000 samples/s
  • 37. HOW MANY BITS PER SAMPLE???  This depends on the level of precision needed.  The number of bits is chosen such that the original signal can be reproduced with the desired precision in amplitude.
  • 38. Example 2 A signal is sampled. Each sample requires at least 12 levels of precision (+0 to +5 and -0 to -5). How many bits should be sent for each sample? Solution We need 4 bits; 1 bit for the sign and 3 bits for the value. A 3-bit value can represent 23 = 8 levels (000 to 111), which is more than what we need. A 2-bit value is not enough since 22 = 4. A 4-bit value is too much because 24 = 16.
  • 39. Have a nice day!!!