This document discusses various types of analog transmission techniques. It defines analog transmission as the transmission of analog signals using a band-pass channel, where baseband signals are converted to complex analog signals with frequencies suitable for the channel. It describes different modulation techniques used in analog transmission including amplitude shift keying (ASK), frequency shift keying (FSK), phase shift keying (PSK), and quadrature amplitude modulation (QAM). It also discusses analog-to-analog conversion techniques such as amplitude modulation (AM), frequency modulation (FM), and phase modulation (PM).
Error Detection and correction concepts in Data communication and networksNt Arvind
single bit , burst error detection and correction in data communication networks , block coding ( hamming code , simple parity check code , Cyclic redundancy check-CRC , checksum , internet checksum etc
Digital Data to Digital Signal ConversionArafat Hossan
Digital to Digital Conversion
Conversion Techniques
Line Coding
Relationship Between Data Rate and Signal Rate
Line Coding Schemes
Unipolar
Polar
Bipolar
Block Coding
Scrambling
Data Communication & Computer Networks: Multi level, multi transition & block...Dr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. It covers Multi level, Multi transition and Block codes which are used in communication of data. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.
Parity checking, Cyclic redundancy checking (CRC) and Hamming codes are some error detection techniques that I discussed here.
Error Detection and correction concepts in Data communication and networksNt Arvind
single bit , burst error detection and correction in data communication networks , block coding ( hamming code , simple parity check code , Cyclic redundancy check-CRC , checksum , internet checksum etc
Digital Data to Digital Signal ConversionArafat Hossan
Digital to Digital Conversion
Conversion Techniques
Line Coding
Relationship Between Data Rate and Signal Rate
Line Coding Schemes
Unipolar
Polar
Bipolar
Block Coding
Scrambling
Data Communication & Computer Networks: Multi level, multi transition & block...Dr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. It covers Multi level, Multi transition and Block codes which are used in communication of data. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.
Parity checking, Cyclic redundancy checking (CRC) and Hamming codes are some error detection techniques that I discussed here.
Analog Transmission, data communication
Digital-to-analog conversion, analog-to-analog conversion, Digital to Digital conversion, Analog to Digital Conversion, Amplitude Shift Keying , Frequency Shift Keying, Phase Shift Keying,Quadrature Amplitude Modulation, Amplitude Modulation (AM), Frequency Modulation (FM), Phase Modulation (PM)
will provide you a basic introduction about digital modulation techniques, provide a basic introduction of ASK(Amplitude shift keying) PSK(phase shift keying) FSK(frequency shift keying) and will also provide a introduction about types of PSK
what is modulation and types of it, amplitude modulation, frequency modulation, Phase modulation, Digital to Analog , Analog to Digital, Amplitude Shift Keying, Frequency Shift Keying, Phase Shift Keying
Digital Communication System
Communication Channels
AWGN: Universal channel model
Band Limited Channel: Channel BW <Signal BW, ISI
Fading Channel: multipath waves
Basic Modulation Methods
Criteria for choosing Modulation Schemes
Power Efficiency: Required Eb/N for certain error probability over AWGN channel
Bandwidth Efficiency: no. of bits per second that can be transmitted on system bandwidth.
System Complexity: Amount of circuit involved and complexity
System Performance Parameters
Average SNR
Outage Probability: instantaneous prob. Exceed certain limit
Average BEP
Amount of Fading/severity of fading
Average Outage duration: O/P SNR fall below certain SNR
The Elphinstonian 1988-College Building Centenary Number (2).pdfMukesh Tekwani
This is the 1988 issue of The Elphinstonian, the annual magazine of Elphinstone College, Mumbai. This is the special issue to commemorate the Century of the Elphinstone College Building in Mumbai.
What is gravitation, Newton's law of gravitation, projection of a satellite, derivations, weightlessness explained, change in value of g with altitude, time period of a satellite, binding energy, escape velocity of a satellite,
ISCE-Class 12-Question Bank - Electrostatics - PhysicsMukesh Tekwani
This is a 14 page question bank on the chapters of Electrostatics. This is based on the syllabus of most Board exams such as CBSE, ISCE and state boards.
Extremely important topic for Digital electronics, digital circuits, computer architecture and computer science.
Full video is available on Youtube: https://youtu.be/oyOaXqx06pY
This video explains the method of converting a decimal number to a binary number. Many solved examples are given here and also two exercises which you can attempt on your own and then check the answers.
I have also discussed the concept of LSB (least significant bit) and MSB (most significant bit), and also least significant digit (LSD) and most significant digit (MSD).
This topic is important for following courses: class 11 and 12 computer science of all state boards, class 11 and 12 physics, BSc Computer science, BSc IT, MCA (Masters degree in Computer Applications), BTech, BE (First Year), and many competitive examinations.
Free Lectures on YouTube for IGCSE Physics for the syllabus effective 2020-21. These lectures cover the syllabus of IGCSE and a major part of GCSE syllabus also.
1. The Hidden Meaning of Words in Science Question Papers
2. Scientific Notation or Powers of Ten Notation
3. Units and Base Quantities
4. What is Physics?
What is Cyber Law? Why is cyber security law needed? International cyber law. What is copyright? What are security, controls, privacy, piracy and ethics? Code of ethics for computer professionals. What is cyber insurance?
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Pushing the limits of ePRTC: 100ns holdover for 100 days
Chap 5 analog transmission
1. Chap 5. Analog Transmission 1
5. Analog Transmission
1. Define analog transmission.
Analog transmission refers to the transmission of analog signals using a band-pass channel. Baseband
digital or analog signals are converted to a complex analog signal with a range of frequencies suitable
for the channel.
2. Define carrier signal and its role in analog transmission.
1. In analog transmission, the sending device produces a high-frequency signal that acts as a base for
the information signal. This base signal is called the carrier signal or carrier frequency. It is a
constant frequency signal.
2. The carrier frequency is chosen so that it is compatible with the transmission medium.
3. The receiving device must be tuned into the frequency of this carrier signal.
4. Digital information changes one or more characteristics of the carrier signal (e.g., amplitude,
frequency, or phase). This digital information is the input signal or modulating signal.
5. This type of modification is called modulation or shift keying. The resultant signal is called a
modulated signal.
3. Define digital-to-analog conversion.
1. An analog signal has characteristics such as frequency, amplitude and phase.
2. The process of changing one of the characteristics of an analog signal based on the information in
digital data is called digital-to-analog conversion. It is also called modulation of a digital signal.
3. When we change any one of the characteristics of a sine wave, we create a new wave.
4. We can change any one characteristics of an analog signal so as to represent digital data.
5. Thus, there are following three methods to modulate digital data into analog data. These techniques
are: frequency shift keying (FSK), amplitude shift keying. (ASK), and phase shift keying (PSK).
6. A fourth technique is called QAM (quadrature amplitude modulation) and it combines changes in
both amplitude and phase. This is the most efficient method of converting digital signal to analog.
7. At the transmitting end, the conversion of digital to analog data is done by the modulator, while at
the receiving end conversion of analog signal back to digital data is carried out by the demodulator.
4. Describe amplitude shift keying (ASK).
1. In amplitude shift keying (ASK), the amplitude of the carrier wave is changed but frequency and
phase remain constant.
2. The two types of techniques are: Binary ASK (BASK) and Multilevel ASK (MASK).
3. Binary ASK: In binary ASK, we have 2 types of signal elements. Each signal element has different
amplitude.
4. Bandwidth for ASK: When a simple sine wave is modulated, it produces a non-periodic composite
signal. This signal has a continuous range of frequencies. The bandwidth is proportional to the
signal rate. The bandwidth is also dependent on another factor d which depends on the modulation
and filtering. ) and 0 <= d <= 1.
B = (1 + d) x S, where S is the signal rate and B is the bandwidth.
mukeshtekwani@hotmail.com Prof. Mukesh N. Tekwani
2. 2 Analog Transmission
Minimum bandwidth is obtained when d = 0 or B = S and maximum bandwidth is obtained when d = 1
and B = 2S.
5. From the diagram we observe that the middle of the bandwidth coincides with the carrier frequency
fc. So if we have a bandpass channel available we can choose fc so that the modulated signal
occupies the bandwidth.
6. Consider a digital signal with a high voltage of 1V and a low voltage of 0 V. We multiply the
digital signal by the carrier signal. When the amplitude of the digital signal is 1, the amplitude of
the carrier frequency is max and when the amplitude of the digital signal becomes 0, the amplitude
of the carrier signal is also 0.
7. In full-duplex transmission, data has to be sent in
both directions. The available bandwidth is
divided into two with 2 carrier frequencies. The
total bandwidth of 100 kHz is divided into 2 parts
of 50 kHz each. The available bandwidth for
each direction is now 50 kHz.
Multilevel ASK:
In multilevel ASK, there are more than 2 levels of the digital signal. We can use 4, 8, 16 or more
different amplitudes for the signal and modulate the data using 2, 3, 4 or more bits at a time.
5. Describe frequency shift keying (FSK).
1. In FSK, the frequency of the carrier is
changed to represent the binary 1 and 0.
For binary 0 the carrier frequency will be
f1 and for binary 1, the frequency will be
f 2.
2. The frequency of the modulated signal is
constant for the duration of one signal
element (say binary 0) but changes for
the next signal element (say binary 1).
3. The peak amplitude and phase remain constant.
4. Bandwidth for FSK: The middle of one bandwidth is f1 while
the middle of the other bandwidth is f2. These two bandwidths
are Δf apart from the midpoint between the two bands. The
difference between the two frequencies is 2 Δf.
Multilevel FSK: This is also called multiple FSK. More than 2
frequencies are used. E.g., we can use 4 different frequencies to
send 2 bits at a time. To send 3 bits at a time, we use 8 frequencies.
Prof. Mukesh N Tekwani mukeshtekwani@hotmail.com
3. Chap 5: Analog Transmission 3
6. Describe phase shift keying (PSK).
In phase shift keying, the phase of the carrier is changed to represent different signal elements (1 / 0).
The peak amplitude and frequency remain constant.
Binary PSK:
1. There are only 2 signal elements one with a phase shift of 0o ; the other with a phase shift of 180 o.
2. The advantage of PSK is that it is less susceptible (or affected) by noise. In PSK, the bit detection
depends on the phase of the carrier signal. Although noise can change the amplitude of the carrier,
changes in phase are more difficult. Also, PSK is superior to FSK because we donot require 2
carrier signals.
3. Implementing FSK is simple because the signal element with phase 180o is just the complement of
the signal element with phase 0. We multiply a polar NRZ data signal with a carrier signal. We
represent the 1 bit (positive voltage) by phase starting at 0 . The 0 bit (negative voltage) is
represented by a phase starting at 1800
Quadrature PSK:
1. Instead of using only 2 variations of a signal, we use four variations.
2. Each phase shift represents 2 bits. A phase of 00 now represents 00; 900 represents 01; 1800
represents 10; and 2700 represents 11. This technique is called 4-PSK or Q-PSK. The pair of bits
represented by each phase is called a dibit.
3. The incoming bits are first passed through a serial to parallel converter. It sends one bit to a
modulator and the next bit to another modulator.
4. The 2 signals created by multipliers are sine waves with same frequency but different phases.
When these two signals are added, the result is another sine wave which can have phases of 45o, -
45o, 135o, or -135o. Since there are four kinds of signal elements in the output signal, we can send
2 bits per signal element.
mukeshtekwani@hotmail.com Prof. Mukesh N. Tekwani
4. 4 Analog Transmission
7. Describe Quadrature Amplitude Modulation (QAM).
1. This modulation technique is a combination of ASK and PSK.
2. In QAM technique, we change two characteristics – the amplitude of one carrier wave and the and
the phase of the other carrier wave.
3. The amplitude of the two carrier signals are different.
8. Define analog-to-analog conversion.
1. Analog-to-analog conversion I the representation of analog information by an analog signal.
2. Such a modulation is required if the medium is bandpass.
3. Analog-to-analog conversion is achieved in 3 ways: Amplitude Modulation (AM), Frequency
Modulation (FM), and Phase Modulation (PM)
9. Describe Amplitude Modulation (AM)
1. Modulation is defined as the process of combining an input signal and a carrier frequency to
produce a signal whose bandwidth is centered around fc.
2. In AM, we use two signals: the carrier signal and the modulating signal. Both are analog signals.
3. The carrier signal is modulated so that its amplitude varies with changes in the amplitude of the
modulating signal.
4. The frequency and phase of the carrier signal remain constant, only the amplitude changes.
5. The modulating signal is the envelope of the carrier wave.
6. The bandwidth of the AM signal is two times the bandwidth of the modulating signal. The central
frequency is fc. The signal components above and below fc carry the same information.
Why is modulation of analog signal necessary?
Modulation of an analog signal is necessary for two reasons:
a) A higher frequency may be needed for transmission of a signal. The size of the antenna decreases
as the carrier frequency increases so a modulated signal is needed.
b) Modulation permits frequency division multiplexing.
10. Describe Frequency Modulation (FM)
1. In Frequency Modulation, the frequency of the carrier wave is changed to follow the changing
amplitude of the modulating signal.
2. The peak amplitude and phase of the carrier signal remain constant but as the amplitude of the
modulating (or information) signal changes, the frequency o the carrier signal also changes.
3. The total bandwidth of the FM signal is given by: BW = 2(1 + β)B, where β is the modulation
index
Prof. Mukesh N Tekwani mukeshtekwani@hotmail.com
5. Chap 5: Analog Transmission 5
11. Discuss Phase Modulation (PM).
1. In Phase Modulation, the phase of the carrier signal is changed in accordance with the changing
amplitude of the modulating signal.
2. The peak amplitude and frequency of the carrier signal remain constant, but the phase of the carrier
changes with changes in amplitude of the information signal (or the modulating signal).
mukeshtekwani@hotmail.com Prof. Mukesh N. Tekwani