SlideShare a Scribd company logo
Presented By
Md. Nazrul Islam
ID: 143-15-4480
Department : C.S.E
Daffodil International University
Dhaka Bangladesh
Presentation On
Analog Transmission And Error
Detection
Contents
1. Analog Transmission
2. Digital to Analog Conversion
3. Analog to Analog Conversion
4. Error
5. Error Detection
6. Types of Error
7. Checksum
Analog Transmission
What is analog transmission?
Type of analog transmission:
1. Digital to analog conversion
2. Analog to analog conversion
What is digital to analog conversion?
Type of digital to analog conversion:
1.Amplitude shift keying
2.Frequency shift keying
3.Phase shift keying
Amplitude shift keying (ASK) : Amplitude-shift
keying (ASK) is a form of amplitude modulation that
represents digital data as variations in the amplitude
of a carrier wave.
Frequency shift keying : Frequency shift keying
(FSK) is a frequency modulation scheme in which digital
information is transmitted through discrete frequency
changes of a carrier signal.
Phase shift keying : Phase shift keying (PSK) is a
digital modulation scheme that conveys data by
changing (modulating) the phase of a reference signal.
ANALOG  ANALOG CONVERSION
• Analog signals are modified to represent analog data.
• Also known as Analog Modulation.
• Required when BANDPASS is used.
TYPES
Amplitude Modulation
• In AM transmission, the carrier signal is modulated so that its amplitude
varies with the changing amplitudes of the modulating signal. The
frequency and phase of the carrier remain the same. Only the amplitude
changes to follow variations in the information. The following figure
shows how this concept works. The modulating signal is the envelope of
the carrier.
Frequency Modulation
• In FM transmission, the frequency of the carrier signal is
modulated to follow the changing voltage level (amplitude)
of the modulating signal. The peak amplitude and phase of
the carrier signal remain constant, but as the amplitude of
the information signal changes, the frequency of the carrier
changes correspondingly.
• The following figure shows the relationships of the
modulating signal, the carrier signal, and the resultant FM
signal. FM is normally implemented by using a voltage-
controlled oscillator as with FSK. The frequency of the
oscillator changes according to the input voltage which is the
amplitude of the modulating signal.
Continued……(FM)
Phase Modulation
• In PM transmission, the phase of the carrier signal is modulated to
follow the changing voltage level (amplitude) of the modulating
signal. The peak amplitude and frequency of the carrier signal remain
constant, but as the amplitude of the information signal changes, the
phase of the carrier changes correspondingly. It is proved
mathematically that PM is the same as FM with one difference.
• In FM, the instantaneous change in the carrier frequency is
proportional to the amplitude of the modulating signal; in PM the
instantaneous change in the carrier frequency is proportional to the
derivative of the amplitude of the modulating signal. The following
figure shows the relationships of the modulating signal, the carrier
signal, and the resultant PM signal.
Continued…..(PM)
Errors
A bit error occurs when a source sends a bit, b, and the destination
receives NOT b.
The error can take place on the link , in a switch or router along the path,
or in the source or destination (e.g. failed hardware, or bit errors in
memories).
1. . .bi be  
Rutvi Shah 19
1 0 0 1 1 1 0 0 1 0 1
1 0 0 1 0 1 0 0 1 0 1
Sent
Received
Error
Rutvi Shah 20
TYPES OF ERRORS
• Single bit error :-
- Only one bit in the data unit has changed.
• Burst error :-
- It means that two or more bits in the data unit has changed.
Rutvi Shah 21
Single bit Error
0 0 0 0 1 0 1 0 0 0 0 0 0 0 1 0
Burst Error
0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1
0 1 0 1 1 1 0 1 0 1 0 0 0 0 1 1
0 changed to 1
Received Sent
Sent
Received
Bits corrupted by Burst Error
Winter 2008 CS244a Handout 13 22
Detecting and Correcting Errors
• When we transmit a message, we typically append a checksum to the
message.
• The checksum is calculated by performing a function over all the bits
in the message.
A checksum is a simple type of redundancy check that is
used to detect errors in data.
Sender site:
1. The message is divided into 16-bit words.
2. The value of the checksum word is set to 0.
3. All words including the checksum are
added using one’s complement addition.
4. The sum is complemented and becomes the
checksum.
5. The checksum is sent with the data.
Receiver site
1. The message (including checksum) is
divided into 16-bit words.
2. All words are added using one’s complement addition.
3. The sum is complemented and becomes the
new checksum.
4. If the value of checksum is 0, the message
is accepted; otherwise, it is rejected.
10.28
1
1 1
0
Advantage
Checksum mainly detects single-bit changes in data.
A checksum is mainly employed in data validation when
implementing software.
THANK YOU

More Related Content

Viewers also liked

Patterns Of Inheritance Modified
Patterns Of Inheritance ModifiedPatterns Of Inheritance Modified
Patterns Of Inheritance Modified
Killester
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Multiple allelism
Multiple allelism Multiple allelism
Multiple allelism
Neha Mahor
 
Sex-linked inheritance by Puzon and Tope
Sex-linked inheritance by Puzon and TopeSex-linked inheritance by Puzon and Tope
Sex-linked inheritance by Puzon and Tope
Kathleen Faye Puzon
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
Zafar Ayub
 
Sex Linked Inheritance
Sex Linked InheritanceSex Linked Inheritance
Sex Linked Inheritance
Juan Miguel Palero
 
Mitosis and meiosis
Mitosis and meiosisMitosis and meiosis
Mitosis and meiosis
Karl Pointer
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
samanthaanderson21
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
Zafar Ayub
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Biology - Chp 11 - Introduction To Genetics - PowerPoint
Biology - Chp 11 - Introduction To Genetics - PowerPointBiology - Chp 11 - Introduction To Genetics - PowerPoint
Biology - Chp 11 - Introduction To Genetics - PowerPointMr. Walajtys
 

Viewers also liked (12)

Patterns Of Inheritance Modified
Patterns Of Inheritance ModifiedPatterns Of Inheritance Modified
Patterns Of Inheritance Modified
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Multiple allelism
Multiple allelism Multiple allelism
Multiple allelism
 
Sex-linked inheritance by Puzon and Tope
Sex-linked inheritance by Puzon and TopeSex-linked inheritance by Puzon and Tope
Sex-linked inheritance by Puzon and Tope
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
Sex Linked Inheritance
Sex Linked InheritanceSex Linked Inheritance
Sex Linked Inheritance
 
Mitosis and meiosis
Mitosis and meiosisMitosis and meiosis
Mitosis and meiosis
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Biology - Chp 11 - Introduction To Genetics - PowerPoint
Biology - Chp 11 - Introduction To Genetics - PowerPointBiology - Chp 11 - Introduction To Genetics - PowerPoint
Biology - Chp 11 - Introduction To Genetics - PowerPoint
 

Similar to Analog Transmission And Error Detection

Networking notes part2 final
Networking notes part2 finalNetworking notes part2 final
Networking notes part2 final
SHARVAN PRAJAPATI
 
Data Encoding
Data EncodingData Encoding
Data EncodingLuka M G
 
UNIT 4.pptx
UNIT 4.pptxUNIT 4.pptx
Digital Modulation ppt for everyone who wants it
Digital Modulation ppt for everyone who wants itDigital Modulation ppt for everyone who wants it
Digital Modulation ppt for everyone who wants it
Shirish30
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmission
Meenakshi Paul
 
E_PS431682@4234143ai.pptx
E_PS431682@4234143ai.pptxE_PS431682@4234143ai.pptx
E_PS431682@4234143ai.pptx
Umesh Yadava
 
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
LeahRachael
 
Digital Modulation
Digital ModulationDigital Modulation
Digital Modulation
ApoorvaPardhi
 
TeleCom Lecture 06.pptx
TeleCom Lecture 06.pptxTeleCom Lecture 06.pptx
TeleCom Lecture 06.pptx
RiyaBatool
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniques
ShriyaGautam3
 
ANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSIONANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSION
Mahmud Hasan Tanvir
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
Mukesh Tekwani
 
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
BalaMurugan992669
 
Chapter 2.1.pptx
Chapter 2.1.pptxChapter 2.1.pptx
Chapter 2.1.pptx
Tekle12
 
Chapter 2.1.pptx
Chapter 2.1.pptxChapter 2.1.pptx
Chapter 2.1.pptx
Tekle12
 
Computer Communication & Computer Networking Module 1 , 2 Notes.pdf
Computer Communication & Computer Networking Module 1 , 2 Notes.pdfComputer Communication & Computer Networking Module 1 , 2 Notes.pdf
Computer Communication & Computer Networking Module 1 , 2 Notes.pdf
navikvel
 
Lecture notes eng - Line Coding New.ppt
Lecture notes eng  - Line Coding New.pptLecture notes eng  - Line Coding New.ppt
Lecture notes eng - Line Coding New.ppt
JumanneChiyanda
 
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes:  EEEC6440315 Communication Systems - Digital ModulationLecture Notes:  EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
AIMST University
 

Similar to Analog Transmission And Error Detection (20)

Networking notes part2 final
Networking notes part2 finalNetworking notes part2 final
Networking notes part2 final
 
Data Encoding
Data EncodingData Encoding
Data Encoding
 
UNIT 4.pptx
UNIT 4.pptxUNIT 4.pptx
UNIT 4.pptx
 
Digital Modulation ppt for everyone who wants it
Digital Modulation ppt for everyone who wants itDigital Modulation ppt for everyone who wants it
Digital Modulation ppt for everyone who wants it
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmission
 
E_PS431682@4234143ai.pptx
E_PS431682@4234143ai.pptxE_PS431682@4234143ai.pptx
E_PS431682@4234143ai.pptx
 
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
 
Digital Modulation
Digital ModulationDigital Modulation
Digital Modulation
 
TeleCom Lecture 06.pptx
TeleCom Lecture 06.pptxTeleCom Lecture 06.pptx
TeleCom Lecture 06.pptx
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniques
 
ASK,FSK and M-PSK using Matlab
ASK,FSK and M-PSK using MatlabASK,FSK and M-PSK using Matlab
ASK,FSK and M-PSK using Matlab
 
ANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSIONANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSION
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
 
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
3.4_OOK systems – ASK, FSK, PSK, BPSK, QPSK, applications of Data communicati...
 
Chapter 2.1.pptx
Chapter 2.1.pptxChapter 2.1.pptx
Chapter 2.1.pptx
 
Chapter 2.1.pptx
Chapter 2.1.pptxChapter 2.1.pptx
Chapter 2.1.pptx
 
Computer Communication & Computer Networking Module 1 , 2 Notes.pdf
Computer Communication & Computer Networking Module 1 , 2 Notes.pdfComputer Communication & Computer Networking Module 1 , 2 Notes.pdf
Computer Communication & Computer Networking Module 1 , 2 Notes.pdf
 
Lecture notes eng - Line Coding New.ppt
Lecture notes eng  - Line Coding New.pptLecture notes eng  - Line Coding New.ppt
Lecture notes eng - Line Coding New.ppt
 
Lecture 08
Lecture 08Lecture 08
Lecture 08
 
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes:  EEEC6440315 Communication Systems - Digital ModulationLecture Notes:  EEEC6440315 Communication Systems - Digital Modulation
Lecture Notes: EEEC6440315 Communication Systems - Digital Modulation
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 

Recently uploaded (20)

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 

Analog Transmission And Error Detection

  • 1.
  • 2. Presented By Md. Nazrul Islam ID: 143-15-4480 Department : C.S.E Daffodil International University Dhaka Bangladesh
  • 4. Contents 1. Analog Transmission 2. Digital to Analog Conversion 3. Analog to Analog Conversion 4. Error 5. Error Detection 6. Types of Error 7. Checksum
  • 6. What is analog transmission? Type of analog transmission: 1. Digital to analog conversion 2. Analog to analog conversion
  • 7. What is digital to analog conversion? Type of digital to analog conversion: 1.Amplitude shift keying 2.Frequency shift keying 3.Phase shift keying
  • 8. Amplitude shift keying (ASK) : Amplitude-shift keying (ASK) is a form of amplitude modulation that represents digital data as variations in the amplitude of a carrier wave.
  • 9. Frequency shift keying : Frequency shift keying (FSK) is a frequency modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier signal.
  • 10. Phase shift keying : Phase shift keying (PSK) is a digital modulation scheme that conveys data by changing (modulating) the phase of a reference signal.
  • 11. ANALOG  ANALOG CONVERSION • Analog signals are modified to represent analog data. • Also known as Analog Modulation. • Required when BANDPASS is used.
  • 12. TYPES
  • 13. Amplitude Modulation • In AM transmission, the carrier signal is modulated so that its amplitude varies with the changing amplitudes of the modulating signal. The frequency and phase of the carrier remain the same. Only the amplitude changes to follow variations in the information. The following figure shows how this concept works. The modulating signal is the envelope of the carrier.
  • 14. Frequency Modulation • In FM transmission, the frequency of the carrier signal is modulated to follow the changing voltage level (amplitude) of the modulating signal. The peak amplitude and phase of the carrier signal remain constant, but as the amplitude of the information signal changes, the frequency of the carrier changes correspondingly. • The following figure shows the relationships of the modulating signal, the carrier signal, and the resultant FM signal. FM is normally implemented by using a voltage- controlled oscillator as with FSK. The frequency of the oscillator changes according to the input voltage which is the amplitude of the modulating signal.
  • 16. Phase Modulation • In PM transmission, the phase of the carrier signal is modulated to follow the changing voltage level (amplitude) of the modulating signal. The peak amplitude and frequency of the carrier signal remain constant, but as the amplitude of the information signal changes, the phase of the carrier changes correspondingly. It is proved mathematically that PM is the same as FM with one difference. • In FM, the instantaneous change in the carrier frequency is proportional to the amplitude of the modulating signal; in PM the instantaneous change in the carrier frequency is proportional to the derivative of the amplitude of the modulating signal. The following figure shows the relationships of the modulating signal, the carrier signal, and the resultant PM signal.
  • 18. Errors A bit error occurs when a source sends a bit, b, and the destination receives NOT b. The error can take place on the link , in a switch or router along the path, or in the source or destination (e.g. failed hardware, or bit errors in memories). 1. . .bi be  
  • 19. Rutvi Shah 19 1 0 0 1 1 1 0 0 1 0 1 1 0 0 1 0 1 0 0 1 0 1 Sent Received Error
  • 20. Rutvi Shah 20 TYPES OF ERRORS • Single bit error :- - Only one bit in the data unit has changed. • Burst error :- - It means that two or more bits in the data unit has changed.
  • 21. Rutvi Shah 21 Single bit Error 0 0 0 0 1 0 1 0 0 0 0 0 0 0 1 0 Burst Error 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1 0 1 0 1 1 1 0 1 0 1 0 0 0 0 1 1 0 changed to 1 Received Sent Sent Received Bits corrupted by Burst Error
  • 22. Winter 2008 CS244a Handout 13 22 Detecting and Correcting Errors • When we transmit a message, we typically append a checksum to the message. • The checksum is calculated by performing a function over all the bits in the message.
  • 23. A checksum is a simple type of redundancy check that is used to detect errors in data.
  • 24. Sender site: 1. The message is divided into 16-bit words. 2. The value of the checksum word is set to 0. 3. All words including the checksum are added using one’s complement addition. 4. The sum is complemented and becomes the checksum. 5. The checksum is sent with the data.
  • 25.
  • 26. Receiver site 1. The message (including checksum) is divided into 16-bit words. 2. All words are added using one’s complement addition. 3. The sum is complemented and becomes the new checksum. 4. If the value of checksum is 0, the message is accepted; otherwise, it is rejected.
  • 27.
  • 29. Advantage Checksum mainly detects single-bit changes in data. A checksum is mainly employed in data validation when implementing software.
  • 30.