SlideShare a Scribd company logo
CSC339 – NETWORK
FUNDAMENTAL
Jahan University
Computer Science Department
Lecturer: Islahuddin Jalal
Master in Cyber Security
10/16/2015Jahan University 1
Class Policy
 A student must reach the class-room in time. Late comers may join the class
but are not entitled to be marked present.
 Attendance shall be marked at the start of the class and students failing to
secure 75% attendance will not be allowed to sit in final exam.
 The assignment submission deadline must be observed. In case of late
submission, ten percent may be deducted from each day.
 Those who are absent on the announcement date of the assignment/test.
Must get the topic/chapter of test/assignment confirmed through their peers.
 Mobile phones must be switched-off in the class-rooms.
10/16/2015Jahan University 2
Grading Evaluation for Network fundamental
Internal Evaluation
Midterm Exam 20%
Attendance 5%
Assignment/Presentations 5%
Quizzes/Tests 10%
Total Internal Evaluation 40%
Final-term Examination
Final-term Exam 60%
Total Marks 100%
10/16/2015Jahan University 3
Topics to be discussed
 Baseband transmission
 Broadband transmission
 Modes of channel operation
 Attenuation
10/16/2015Jahan University 4
Digital signal vs Analog signal
 Signals can be analog or digital
 Analog signals can have an infinite number of values in a range.
 Digital signals can have only a limited
10/16/2015Jahan University 5
Baseband Transmission
 Baseband transmission
 Digital signals are used
 Time Division Multiplexing is possible
 Baseband is bi-directional transmission
 Short distance signal travelling
 Entire bandwidth of the cable is consumed by a single signal in a baseband
transmission.
 Using dedicated medium
10/16/2015Jahan University 6
Baseband transmission
 In baseband transmission, the required bandwidth is proportional to the bit
rate; if we need to send bits faster, we need more bandwidth.
 Baseband transmission of a digital signal that preserves the shape of the
digital signal is possible only if we have a low pass channel with an infinite or
very wide bandwidth.
10/16/2015Jahan University 7
Baseband transmission
Example of Baseband transmission
 LAN uses a dedicated channel for two stations communicating with each
other.
 In a bus topology LAN with multipoint connections, only two stations can
communicate with each other at each moment in time, the other stations need to
avoid from sending data.
 In a star topology LAN, the entire channel between each station and the hub is
used for communication between these two entities.
 Etc.
10/16/2015Jahan University 9
Broadband transmission
 Broadband:
 Analog signals are used
 Transmission of data is unidirectional
 Signal travelling distance is long
 Frequency division multiplexing is possible
 The signals are sent on multiple frequencies and allow all the multiple signals are
sent simultaneously in broadband transmission.
 Modulator is used
10/16/2015Jahan University 10
Modulation of a digital signal for transmission on a bandpass
channel
Example of Broadband Transmission
 Sending computer data over a telephone line
 Digital Cellular telephone.
 The digital cellular phones convert the analog audio signal to digital and then
convert it again to analog for transmission over a bandpass channel.
10/16/2015Jahan University 12
Attenuation
 Loss of energy
 When a signal travels through a medium, it loses some of its energy due to the
resistance of the medium.
 Some wire or medium carrying electric signals get warm after some time it is
converted into heat
10/16/2015Jahan University 13
Attenuation
Data Transmission Rates
 How fast we can send data
 Bit per second over a channel
10/16/2015Jahan University 15
Data Transmission rate
 Depends of three factors
 The bandwidth available
 The level of the signals
 The quality of the channel (the level of noise)
10/16/2015Jahan University 16
Theoretical formulas for data rate
 There are two formulas for calculating data rate
 Noiseless Channel formula by Nyquist
 BitRate = 2 * bandwidth * log2L
 Noisy Channel formula by Shannon
 Capacity = bandwidth * log2 (1+SNR)
 SNR = signal to noise ratio = average signal power
average noise power
10/16/2015Jahan University 17
Example of Noiseless channel formula
 Consider a noiseless channel with a bandwidth of 3000Hz transmitting a signal
with two signal levels. The maximum bit rate can be calculated as:
 BitRate = 2 * 3000 * Log22
= 6000 * Log22
= 6000 * 1
= 6000 bps
10/16/2015Jahan University 18
Example of noisy channel formula
 We can calculate the theoretical highest bit rate of a regular telephone line.
A telephone line normally has a bandwidth of 3000 Hz (300 to 3300) assigned
for data communications. The signal-to-noise ration is usually 3162. for this
channel the capacity is calculated as:
 C= B log2 (1+SNR)
= 3000 log2 (1+3162)
=3000 log2 (3163)
=3000 * 11.62
=34860bps
10/16/2015Jahan University 19
Modes of Channel Operation
10/16/2015Jahan University 20
 Three types of modes of Channel Operation
 Simplex
 Half duplex
 Full duplex
Simplex
 Data in a simplex channel is always one way. Simplex channels are not often
used because it is not possible to send back error or control signals to the
transmit end.
 E.g Television, radio transmission
10/16/2015Jahan University 21
Half duplex
 A half-duplex channel can send and receive, but not at the same time.
 E.g one-lane bridge, walkie-talkie
 In some aspects, you can think of Internet surfing as being half-duplex, as a
user issues a request for a web document, then that document is downloaded
and displayed before the user issues another request
 In addition, it is possible to perform error detection and request the sender
to retransmit information that arrived corrupted.
10/16/2015Jahan University 22
Half Duplex
10/16/2015Jahan University 23
Full duplex
 Data can travel in both directions simultaneously.
 There is no need to switch from transmit to receive mode like in half duplex.
 Its like a two lane bridge on a two-lane highway.
 E.g Mobile
10/16/2015Jahan University 24
END
Thanks for
hearing…………………….

More Related Content

What's hot

Different types of network topologies
Different types of network topologiesDifferent types of network topologies
Different types of network topologies
kona paul
 
Cables
CablesCables
Cables
MdAnikKhan
 
Videotext
VideotextVideotext
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
KalpanaC14
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical Segmentation
TELKOMNIKA JOURNAL
 
802.15.5 mesh topology
802.15.5  mesh topology802.15.5  mesh topology
802.15.5 mesh topology
sunil raj kumar
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networkingKhan Rahimeen
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
guest0f230cfc
 
Networking Ethernet
Networking EthernetNetworking Ethernet
Networking Ethernet
SSG1631
 
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
IJECEIAES
 
Network Topology
Network TopologyNetwork Topology
Network Topology
TahsinaTabassum1
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
Subhajit Sahu
 
DATA COMMUNICATION SYSTEMS
DATA COMMUNICATION SYSTEMSDATA COMMUNICATION SYSTEMS
DATA COMMUNICATION SYSTEMS
Dhairya Gandha
 
Medium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networksMedium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networks
LeMeniz Infotech
 
fiber optic communication connectors
fiber optic communication connectors fiber optic communication connectors
fiber optic communication connectors
Rana Kashif Hussain
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
IJCSIS Research Publications
 
Datacom module 3: Data Communications Circuits, Arrangements, and Networks
Datacom module 3:  Data Communications Circuits, Arrangements, and NetworksDatacom module 3:  Data Communications Circuits, Arrangements, and Networks
Datacom module 3: Data Communications Circuits, Arrangements, and Networks
Jeffrey Des Binwag
 
OSI Model
OSI ModelOSI Model

What's hot (20)

Different types of network topologies
Different types of network topologiesDifferent types of network topologies
Different types of network topologies
 
Cables
CablesCables
Cables
 
Videotext
VideotextVideotext
Videotext
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical Segmentation
 
Chapter7
Chapter7Chapter7
Chapter7
 
802.15.5 mesh topology
802.15.5  mesh topology802.15.5  mesh topology
802.15.5 mesh topology
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
Unit 1 ethernet vsd
Unit 1 ethernet vsdUnit 1 ethernet vsd
Unit 1 ethernet vsd
 
Networking Ethernet
Networking EthernetNetworking Ethernet
Networking Ethernet
 
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
 
DATA COMMUNICATION SYSTEMS
DATA COMMUNICATION SYSTEMSDATA COMMUNICATION SYSTEMS
DATA COMMUNICATION SYSTEMS
 
Medium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networksMedium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networks
 
fiber optic communication connectors
fiber optic communication connectors fiber optic communication connectors
fiber optic communication connectors
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
 
Datacom module 3: Data Communications Circuits, Arrangements, and Networks
Datacom module 3:  Data Communications Circuits, Arrangements, and NetworksDatacom module 3:  Data Communications Circuits, Arrangements, and Networks
Datacom module 3: Data Communications Circuits, Arrangements, and Networks
 
OSI Model
OSI ModelOSI Model
OSI Model
 

Viewers also liked

Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521
Amanda Whitmire
 
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview. BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
Jonathan Eisen
 
HCI-Lecture-1
HCI-Lecture-1HCI-Lecture-1
HCI-Lecture-1
Christian Sandor
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
Irsandi Hasan
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
Abdelkhalik Mosa
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
Zafar Ayub
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
Abdelkhalik Mosa
 
Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)
Lora Aroyo
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
Zafar Ayub
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2
Alphorm
 

Viewers also liked (18)

Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521
 
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview. BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
 
Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
HCI-Lecture-1
HCI-Lecture-1HCI-Lecture-1
HCI-Lecture-1
 
Ch 03
Ch 03Ch 03
Ch 03
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
Chapter 2 point-to-point protocol (ppp)
Chapter 2   point-to-point protocol (ppp)Chapter 2   point-to-point protocol (ppp)
Chapter 2 point-to-point protocol (ppp)
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2
 

Similar to Csc339 – lecture 2a network fundamental

Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
eSAT Journals
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
eSAT Publishing House
 
Performance improvement of mimo mc cdma system using relay and itbf
Performance improvement of mimo mc  cdma system using relay and itbfPerformance improvement of mimo mc  cdma system using relay and itbf
Performance improvement of mimo mc cdma system using relay and itbf
Tamilarasan N
 
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
ijdpsjournal
 
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...Beneyam Haile
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
IRJET Journal
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
ijfcstjournal
 
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
IRJET Journal
 
Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5
Randa Elanwar
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
VLSICS Design
 
B011120510
B011120510B011120510
B011120510
IOSR Journals
 
Massive mimo
Massive mimoMassive mimo
Massive mimo
Mustafa Khaleel
 
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
IJERA Editor
 
Mobile Communication MDM College
Mobile Communication MDM CollegeMobile Communication MDM College
Mobile Communication MDM Collegegueste2620035
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
IJECEIAES
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)IMRAN KHAN
 
Notes on Class 4
Notes on Class 4Notes on Class 4
Notes on Class 4
Shakhawat Ahammed
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
ijwmn
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeGregorio Toro Rivera
 

Similar to Csc339 – lecture 2a network fundamental (20)

Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Performance improvement of mimo mc cdma system using relay and itbf
Performance improvement of mimo mc  cdma system using relay and itbfPerformance improvement of mimo mc  cdma system using relay and itbf
Performance improvement of mimo mc cdma system using relay and itbf
 
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
 
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
 
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
 
Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
 
B011120510
B011120510B011120510
B011120510
 
40120140501003
4012014050100340120140501003
40120140501003
 
Massive mimo
Massive mimoMassive mimo
Massive mimo
 
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
 
Mobile Communication MDM College
Mobile Communication MDM CollegeMobile Communication MDM College
Mobile Communication MDM College
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
 
Notes on Class 4
Notes on Class 4Notes on Class 4
Notes on Class 4
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig bee
 

More from Kabul Education University

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
Kabul Education University
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
Kabul Education University
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
Kabul Education University
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
Kabul Education University
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
Kabul Education University
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
Kabul Education University
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
Kabul Education University
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
Kabul Education University
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
Kabul Education University
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
Kabul Education University
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
Kabul Education University
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
Kabul Education University
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
Kabul Education University
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
Kabul Education University
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
Kabul Education University
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
Kabul Education University
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
Kabul Education University
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
Kabul Education University
 

More from Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Csc339 – lecture 2a network fundamental

  • 1. CSC339 – NETWORK FUNDAMENTAL Jahan University Computer Science Department Lecturer: Islahuddin Jalal Master in Cyber Security 10/16/2015Jahan University 1
  • 2. Class Policy  A student must reach the class-room in time. Late comers may join the class but are not entitled to be marked present.  Attendance shall be marked at the start of the class and students failing to secure 75% attendance will not be allowed to sit in final exam.  The assignment submission deadline must be observed. In case of late submission, ten percent may be deducted from each day.  Those who are absent on the announcement date of the assignment/test. Must get the topic/chapter of test/assignment confirmed through their peers.  Mobile phones must be switched-off in the class-rooms. 10/16/2015Jahan University 2
  • 3. Grading Evaluation for Network fundamental Internal Evaluation Midterm Exam 20% Attendance 5% Assignment/Presentations 5% Quizzes/Tests 10% Total Internal Evaluation 40% Final-term Examination Final-term Exam 60% Total Marks 100% 10/16/2015Jahan University 3
  • 4. Topics to be discussed  Baseband transmission  Broadband transmission  Modes of channel operation  Attenuation 10/16/2015Jahan University 4
  • 5. Digital signal vs Analog signal  Signals can be analog or digital  Analog signals can have an infinite number of values in a range.  Digital signals can have only a limited 10/16/2015Jahan University 5
  • 6. Baseband Transmission  Baseband transmission  Digital signals are used  Time Division Multiplexing is possible  Baseband is bi-directional transmission  Short distance signal travelling  Entire bandwidth of the cable is consumed by a single signal in a baseband transmission.  Using dedicated medium 10/16/2015Jahan University 6
  • 7. Baseband transmission  In baseband transmission, the required bandwidth is proportional to the bit rate; if we need to send bits faster, we need more bandwidth.  Baseband transmission of a digital signal that preserves the shape of the digital signal is possible only if we have a low pass channel with an infinite or very wide bandwidth. 10/16/2015Jahan University 7
  • 9. Example of Baseband transmission  LAN uses a dedicated channel for two stations communicating with each other.  In a bus topology LAN with multipoint connections, only two stations can communicate with each other at each moment in time, the other stations need to avoid from sending data.  In a star topology LAN, the entire channel between each station and the hub is used for communication between these two entities.  Etc. 10/16/2015Jahan University 9
  • 10. Broadband transmission  Broadband:  Analog signals are used  Transmission of data is unidirectional  Signal travelling distance is long  Frequency division multiplexing is possible  The signals are sent on multiple frequencies and allow all the multiple signals are sent simultaneously in broadband transmission.  Modulator is used 10/16/2015Jahan University 10
  • 11. Modulation of a digital signal for transmission on a bandpass channel
  • 12. Example of Broadband Transmission  Sending computer data over a telephone line  Digital Cellular telephone.  The digital cellular phones convert the analog audio signal to digital and then convert it again to analog for transmission over a bandpass channel. 10/16/2015Jahan University 12
  • 13. Attenuation  Loss of energy  When a signal travels through a medium, it loses some of its energy due to the resistance of the medium.  Some wire or medium carrying electric signals get warm after some time it is converted into heat 10/16/2015Jahan University 13
  • 15. Data Transmission Rates  How fast we can send data  Bit per second over a channel 10/16/2015Jahan University 15
  • 16. Data Transmission rate  Depends of three factors  The bandwidth available  The level of the signals  The quality of the channel (the level of noise) 10/16/2015Jahan University 16
  • 17. Theoretical formulas for data rate  There are two formulas for calculating data rate  Noiseless Channel formula by Nyquist  BitRate = 2 * bandwidth * log2L  Noisy Channel formula by Shannon  Capacity = bandwidth * log2 (1+SNR)  SNR = signal to noise ratio = average signal power average noise power 10/16/2015Jahan University 17
  • 18. Example of Noiseless channel formula  Consider a noiseless channel with a bandwidth of 3000Hz transmitting a signal with two signal levels. The maximum bit rate can be calculated as:  BitRate = 2 * 3000 * Log22 = 6000 * Log22 = 6000 * 1 = 6000 bps 10/16/2015Jahan University 18
  • 19. Example of noisy channel formula  We can calculate the theoretical highest bit rate of a regular telephone line. A telephone line normally has a bandwidth of 3000 Hz (300 to 3300) assigned for data communications. The signal-to-noise ration is usually 3162. for this channel the capacity is calculated as:  C= B log2 (1+SNR) = 3000 log2 (1+3162) =3000 log2 (3163) =3000 * 11.62 =34860bps 10/16/2015Jahan University 19
  • 20. Modes of Channel Operation 10/16/2015Jahan University 20  Three types of modes of Channel Operation  Simplex  Half duplex  Full duplex
  • 21. Simplex  Data in a simplex channel is always one way. Simplex channels are not often used because it is not possible to send back error or control signals to the transmit end.  E.g Television, radio transmission 10/16/2015Jahan University 21
  • 22. Half duplex  A half-duplex channel can send and receive, but not at the same time.  E.g one-lane bridge, walkie-talkie  In some aspects, you can think of Internet surfing as being half-duplex, as a user issues a request for a web document, then that document is downloaded and displayed before the user issues another request  In addition, it is possible to perform error detection and request the sender to retransmit information that arrived corrupted. 10/16/2015Jahan University 22
  • 24. Full duplex  Data can travel in both directions simultaneously.  There is no need to switch from transmit to receive mode like in half duplex.  Its like a two lane bridge on a two-lane highway.  E.g Mobile 10/16/2015Jahan University 24