SlideShare a Scribd company logo
Data and ComputerData and Computer
CommunicationsCommunications
Eighth EditionEighth Edition
by William Stallingsby William Stallings
Lecture slides by Lawrie BrownLecture slides by Lawrie Brown
Chapter 6 – Digital DataChapter 6 – Digital Data
Communications TechniquesCommunications Techniques
Digital Data CommunicationsDigital Data Communications
TechniquesTechniques
 A conversation forms a two-way communication link;
there is a measure of symmetry between the two
parties, and messages pass to and fro. There is a
continual stimulus-response, cyclic action; remarks
call up other remarks, and the behavior of the two
individuals becomes concerted, co-operative, and
directed toward some goal. This is true
communication.
—On Human Communication, Colin Cherry
Asynchronous andAsynchronous and
Synchronous TransmissionSynchronous Transmission
 timing problems require a mechanism totiming problems require a mechanism to
synchronize the transmitter and receiversynchronize the transmitter and receiver

receiver samples stream at bit intervalsreceiver samples stream at bit intervals

if clocks not aligned and drifting will sample atif clocks not aligned and drifting will sample at
wrong time after sufficient bits are sentwrong time after sufficient bits are sent
 two solutions to synchronizing clockstwo solutions to synchronizing clocks

asynchronous transmissionasynchronous transmission

synchronous transmissionsynchronous transmission
Asynchronous TransmissionAsynchronous Transmission
Asynchronous - BehaviorAsynchronous - Behavior
 simplesimple
 cheapcheap
 overhead of 2 or 3 bits per char (~20%)overhead of 2 or 3 bits per char (~20%)
 good for data with large gaps (keyboard)good for data with large gaps (keyboard)
Synchronous TransmissionSynchronous Transmission
 block of data transmitted sent as a frameblock of data transmitted sent as a frame
 clocks must be synchronizedclocks must be synchronized

can use separate clock linecan use separate clock line

or embed clock signal in dataor embed clock signal in data
 need to indicate start and end of blockneed to indicate start and end of block

use preamble and postambleuse preamble and postamble
 more efficient (lower overhead) than asyncmore efficient (lower overhead) than async
Types of ErrorTypes of Error
 an error occurs when a bit is altered betweenan error occurs when a bit is altered between
transmission and receptiontransmission and reception
 single bit errorssingle bit errors

only one bit alteredonly one bit altered

caused by white noisecaused by white noise
 burst errorsburst errors

contiguous sequence ofcontiguous sequence of BB bits in which first last andbits in which first last and
any number of intermediate bits in errorany number of intermediate bits in error

caused by impulse noise or by fading in wirelesscaused by impulse noise or by fading in wireless

effect greater at higher data rateseffect greater at higher data rates
Error DetectionError Detection
 will have errorswill have errors
 detect using error-detecting codedetect using error-detecting code
 added by transmitteradded by transmitter
 recalculated and checked by receiverrecalculated and checked by receiver
 still chance of undetected errorstill chance of undetected error
 parityparity

parity bit set so character has even (evenparity bit set so character has even (even
parity) or odd (odd parity) number of onesparity) or odd (odd parity) number of ones

even number of bit errors goes undetectedeven number of bit errors goes undetected
Error Detection ProcessError Detection Process
Cyclic Redundancy CheckCyclic Redundancy Check
 one of most common and powerful checksone of most common and powerful checks
 for block offor block of kk bits transmitter generates anbits transmitter generates an
nn bit frame check sequence (FCS)bit frame check sequence (FCS)
 transmitstransmits k+nk+n bits which is exactly divisiblebits which is exactly divisible
by some numberby some number
 receiver divides frame by that numberreceiver divides frame by that number

if no remainder, assume no errorif no remainder, assume no error

for math, see Stallings chapter 6for math, see Stallings chapter 6
Error CorrectionError Correction
 correction of detected errors usually requirescorrection of detected errors usually requires
data block to be retransmitteddata block to be retransmitted
 not appropriate for wireless applicationsnot appropriate for wireless applications

bit error rate is high causing lots of retransmissionsbit error rate is high causing lots of retransmissions

when propagation delay long (satellite) compared withwhen propagation delay long (satellite) compared with
frame transmission time, resulting in retransmission offrame transmission time, resulting in retransmission of
frame in error plus many subsequent framesframe in error plus many subsequent frames
 instead need to correct errors on basis of bitsinstead need to correct errors on basis of bits
receivedreceived
 error correction provides thiserror correction provides this
Error Correction ProcessError Correction Process
How Error Correction WorksHow Error Correction Works
 adds redundancy to transmitted messageadds redundancy to transmitted message
 can deduce original despite some errorscan deduce original despite some errors
 eg. block error correction codeeg. block error correction code

mapmap kk bit input onto anbit input onto an nn bit codewordbit codeword

each distinctly differenteach distinctly different

if get error assume codeword sent wasif get error assume codeword sent was
closest to that receivedclosest to that received
 for math, see Stallings chapter 6for math, see Stallings chapter 6
 means have reduced effective data ratemeans have reduced effective data rate
Line Configuration - TopologyLine Configuration - Topology
 physical arrangement of stations onphysical arrangement of stations on
mediummedium

point to point - two stationspoint to point - two stations
• such as between two routers / computerssuch as between two routers / computers

multi point - multiple stationsmulti point - multiple stations
• traditionally mainframe computer and terminalstraditionally mainframe computer and terminals
• now typically a local area network (LAN)now typically a local area network (LAN)
Line Configuration - TopologyLine Configuration - Topology
Line Configuration - DuplexLine Configuration - Duplex
 classify data exchange as half or full duplexclassify data exchange as half or full duplex
 half duplex (two-way alternate)half duplex (two-way alternate)

only one station may transmit at a timeonly one station may transmit at a time

requires one data pathrequires one data path
 full duplex (two-way simultaneous)full duplex (two-way simultaneous)

simultaneous transmission and reception betweensimultaneous transmission and reception between
two stationstwo stations

requires two data pathsrequires two data paths
• separate media or frequencies used for each directionseparate media or frequencies used for each direction

or echo cancelingor echo canceling
SummarySummary
 asynchronous verses synchronousasynchronous verses synchronous
transmissiontransmission
 error detection and correctionerror detection and correction
 line configuration issuesline configuration issues

More Related Content

What's hot

Data bit rate_by_abhishek_wadhwa
Data bit rate_by_abhishek_wadhwaData bit rate_by_abhishek_wadhwa
Data bit rate_by_abhishek_wadhwa
Abhishek Wadhwa
 
Source coding systems
Source coding systemsSource coding systems
Source coding systems
RAMYASREEKUPPALA
 
Error detection
Error detection Error detection
Error detection
MDABDULLAKHAN
 
Differential pulse code modulation
Differential pulse code modulationDifferential pulse code modulation
Differential pulse code modulation
Ramraj Bhadu
 
Ch4 1 v1
Ch4 1 v1Ch4 1 v1
Ch4 1 v1
bhagavanprasad
 
Tcp Ip Overview
Tcp Ip OverviewTcp Ip Overview
Tcp Ip Overview
Amir Malik
 
Channel capacity
Channel capacityChannel capacity
Channel capacity
PALLAB DAS
 
Chapter 4 digital transmission computer_network
Chapter 4 digital transmission  computer_networkChapter 4 digital transmission  computer_network
Chapter 4 digital transmission computer_network
Dhairya Joshi
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
Edlynne Ogena
 
Digital Transmission
Digital TransmissionDigital Transmission
Digital Transmission
TechiNerd
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
Wayne Jones Jnr
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
Abhijay Sisodia
 
Information theory
Information theoryInformation theory
Information theory
AparnaLal2
 
Unit 4
Unit 4Unit 4
Unit 4
Srashti Vyas
 
Ch 03
Ch 03Ch 03
Wireshark tcp - 2110165028
Wireshark tcp - 2110165028Wireshark tcp - 2110165028
Wireshark tcp - 2110165028
Nanda Afif
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital Transmission
Ahmar Hashmi
 
Wireshark tcp
Wireshark tcpWireshark tcp
Wireshark tcp
Yasin Abdullah
 
Digital Transmission
Digital TransmissionDigital Transmission
Digital Transmission
anuragyadav94
 
第四次课程 Chap8
第四次课程 Chap8第四次课程 Chap8
第四次课程 Chap8
Emma2013
 

What's hot (20)

Data bit rate_by_abhishek_wadhwa
Data bit rate_by_abhishek_wadhwaData bit rate_by_abhishek_wadhwa
Data bit rate_by_abhishek_wadhwa
 
Source coding systems
Source coding systemsSource coding systems
Source coding systems
 
Error detection
Error detection Error detection
Error detection
 
Differential pulse code modulation
Differential pulse code modulationDifferential pulse code modulation
Differential pulse code modulation
 
Ch4 1 v1
Ch4 1 v1Ch4 1 v1
Ch4 1 v1
 
Tcp Ip Overview
Tcp Ip OverviewTcp Ip Overview
Tcp Ip Overview
 
Channel capacity
Channel capacityChannel capacity
Channel capacity
 
Chapter 4 digital transmission computer_network
Chapter 4 digital transmission  computer_networkChapter 4 digital transmission  computer_network
Chapter 4 digital transmission computer_network
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Digital Transmission
Digital TransmissionDigital Transmission
Digital Transmission
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Information theory
Information theoryInformation theory
Information theory
 
Unit 4
Unit 4Unit 4
Unit 4
 
Ch 03
Ch 03Ch 03
Ch 03
 
Wireshark tcp - 2110165028
Wireshark tcp - 2110165028Wireshark tcp - 2110165028
Wireshark tcp - 2110165028
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital Transmission
 
Wireshark tcp
Wireshark tcpWireshark tcp
Wireshark tcp
 
Digital Transmission
Digital TransmissionDigital Transmission
Digital Transmission
 
第四次课程 Chap8
第四次课程 Chap8第四次课程 Chap8
第四次课程 Chap8
 

Viewers also liked

ccTLD Best Practices
ccTLD Best PracticesccTLD Best Practices
ccTLD Best Practices
gsorkpor
 
lan overview
lan overviewlan overview
lan overview
Srinivasa Rao
 
Facebook
FacebookFacebook
Carly Williams.
Carly Williams.Carly Williams.
Carly Williams.
Carly Williams
 
Partner
PartnerPartner
Partner
Derick Ochia
 
Orla dracs
Orla dracsOrla dracs
Orla dracs
primer1314
 
ecdl_windows_xp_office_2007_biblia_minta
ecdl_windows_xp_office_2007_biblia_mintaecdl_windows_xp_office_2007_biblia_minta
ecdl_windows_xp_office_2007_biblia_minta
Krist P
 
The government and the financial system united against the progress of brazil
The government and the financial system united against the progress of brazilThe government and the financial system united against the progress of brazil
The government and the financial system united against the progress of brazil
Fernando Alcoforado
 
GXS at Microsoft Convergence 2009
GXS at Microsoft Convergence 2009GXS at Microsoft Convergence 2009
GXS at Microsoft Convergence 2009
GXS
 
Basic Computer Network
Basic Computer NetworkBasic Computer Network
Basic Computer Network
Derick Ochia
 
Graficos presentación
Graficos presentaciónGraficos presentación
Graficos presentación
adrian moreno
 
QM Final Paper
QM Final PaperQM Final Paper
QM Final Paper
Linda Cheung
 
MED303 Addressing Security in Media Workflows - AWS re: Invent 2012
MED303 Addressing Security in Media Workflows - AWS re: Invent 2012MED303 Addressing Security in Media Workflows - AWS re: Invent 2012
MED303 Addressing Security in Media Workflows - AWS re: Invent 2012
Amazon Web Services
 
Hair care
Hair careHair care
Hair care
Aman Deep Nagpal
 
DAT202 Optimizing your Cassandra Database on AWS - AWS re: Invent 2012
DAT202 Optimizing your Cassandra Database on AWS - AWS re: Invent 2012DAT202 Optimizing your Cassandra Database on AWS - AWS re: Invent 2012
DAT202 Optimizing your Cassandra Database on AWS - AWS re: Invent 2012
Amazon Web Services
 
Hospitality and tourism 100k pyramid gacte
Hospitality and tourism 100k pyramid gacteHospitality and tourism 100k pyramid gacte
Hospitality and tourism 100k pyramid gacte
mygmea
 
これからどうなる?! SharePoint ~「超主観的」予想~
これからどうなる?! SharePoint ~「超主観的」予想~これからどうなる?! SharePoint ~「超主観的」予想~
これからどうなる?! SharePoint ~「超主観的」予想~
Kosuke Kuromiya
 

Viewers also liked (18)

ccTLD Best Practices
ccTLD Best PracticesccTLD Best Practices
ccTLD Best Practices
 
lan overview
lan overviewlan overview
lan overview
 
Facebook
FacebookFacebook
Facebook
 
Carly Williams.
Carly Williams.Carly Williams.
Carly Williams.
 
Partner
PartnerPartner
Partner
 
Orla dracs
Orla dracsOrla dracs
Orla dracs
 
ecdl_windows_xp_office_2007_biblia_minta
ecdl_windows_xp_office_2007_biblia_mintaecdl_windows_xp_office_2007_biblia_minta
ecdl_windows_xp_office_2007_biblia_minta
 
The government and the financial system united against the progress of brazil
The government and the financial system united against the progress of brazilThe government and the financial system united against the progress of brazil
The government and the financial system united against the progress of brazil
 
GXS at Microsoft Convergence 2009
GXS at Microsoft Convergence 2009GXS at Microsoft Convergence 2009
GXS at Microsoft Convergence 2009
 
Basic Computer Network
Basic Computer NetworkBasic Computer Network
Basic Computer Network
 
Graficos presentación
Graficos presentaciónGraficos presentación
Graficos presentación
 
QM Final Paper
QM Final PaperQM Final Paper
QM Final Paper
 
MED303 Addressing Security in Media Workflows - AWS re: Invent 2012
MED303 Addressing Security in Media Workflows - AWS re: Invent 2012MED303 Addressing Security in Media Workflows - AWS re: Invent 2012
MED303 Addressing Security in Media Workflows - AWS re: Invent 2012
 
Hair care
Hair careHair care
Hair care
 
DAT202 Optimizing your Cassandra Database on AWS - AWS re: Invent 2012
DAT202 Optimizing your Cassandra Database on AWS - AWS re: Invent 2012DAT202 Optimizing your Cassandra Database on AWS - AWS re: Invent 2012
DAT202 Optimizing your Cassandra Database on AWS - AWS re: Invent 2012
 
Hospitality and tourism 100k pyramid gacte
Hospitality and tourism 100k pyramid gacteHospitality and tourism 100k pyramid gacte
Hospitality and tourism 100k pyramid gacte
 
これからどうなる?! SharePoint ~「超主観的」予想~
これからどうなる?! SharePoint ~「超主観的」予想~これからどうなる?! SharePoint ~「超主観的」予想~
これからどうなる?! SharePoint ~「超主観的」予想~
 
Web 2
Web 2Web 2
Web 2
 

Similar to digital datacomm

Digital Data Comm.ppt
Digital Data Comm.pptDigital Data Comm.ppt
Digital Data Comm.ppt
RobeelShaukat
 
06 digital datacomm
06 digital datacomm06 digital datacomm
Chapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9eChapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9e
adpeer
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Anwal Mirza
 
Ch6.ppt
Ch6.pptCh6.ppt
Ch6.ppt
BezaAlem2
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
John Mathias
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
botAlert
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
k2w9psdb96
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
nesarahmad37
 
data link layer to print
data link layer to printdata link layer to print
data link layer to print
BishalWosti1
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.ppt
kekeuwoe
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
AhmedMuhumed2
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
Bathshebaparimala
 
Flow control 11
Flow control 11Flow control 11
Flow control 11
Abhishek Kesharwani
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin Jani
 
transport protocols
transport protocolstransport protocols
transport protocols
Srinivasa Rao
 
Ch 6 data and computer communicationwilliam stallings (1)
Ch 6 data and computer communicationwilliam stallings (1)Ch 6 data and computer communicationwilliam stallings (1)
Ch 6 data and computer communicationwilliam stallings (1)
bheemsain
 
Ch 6 data and computer communicationwilliam stallings
Ch 6 data and computer communicationwilliam stallingsCh 6 data and computer communicationwilliam stallings
Ch 6 data and computer communicationwilliam stallings
bheemsain
 

Similar to digital datacomm (20)

Digital Data Comm.ppt
Digital Data Comm.pptDigital Data Comm.ppt
Digital Data Comm.ppt
 
06 digital datacomm
06 digital datacomm06 digital datacomm
06 digital datacomm
 
Chapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9eChapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9e
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Ch6.ppt
Ch6.pptCh6.ppt
Ch6.ppt
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
 
data link layer to print
data link layer to printdata link layer to print
data link layer to print
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.ppt
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
 
Flow control 11
Flow control 11Flow control 11
Flow control 11
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Ch 6 data and computer communicationwilliam stallings (1)
Ch 6 data and computer communicationwilliam stallings (1)Ch 6 data and computer communicationwilliam stallings (1)
Ch 6 data and computer communicationwilliam stallings (1)
 
Ch 6 data and computer communicationwilliam stallings
Ch 6 data and computer communicationwilliam stallingsCh 6 data and computer communicationwilliam stallings
Ch 6 data and computer communicationwilliam stallings
 

More from Srinivasa Rao

Oscillators
OscillatorsOscillators
Oscillators
Srinivasa Rao
 
power amplifiers
power amplifierspower amplifiers
power amplifiers
Srinivasa Rao
 
Amplifiers
AmplifiersAmplifiers
Amplifiers
Srinivasa Rao
 
Transistors
TransistorsTransistors
Transistors
Srinivasa Rao
 
Rectifiers
RectifiersRectifiers
Rectifiers
Srinivasa Rao
 
Process control 3 chapter
Process control 3 chapterProcess control 3 chapter
Process control 3 chapter
Srinivasa Rao
 
Process control 5 chapter
Process control 5 chapterProcess control 5 chapter
Process control 5 chapter
Srinivasa Rao
 
Process control 2 chapter
Process control 2 chapterProcess control 2 chapter
Process control 2 chapter
Srinivasa Rao
 
Process control 4 chapter
Process control 4 chapterProcess control 4 chapter
Process control 4 chapter
Srinivasa Rao
 
Process control 3 chapter
Process control 3 chapterProcess control 3 chapter
Process control 3 chapter
Srinivasa Rao
 
Process control
Process controlProcess control
Process control
Srinivasa Rao
 
Weight measurement
Weight measurementWeight measurement
Weight measurement
Srinivasa Rao
 
Density and viscocity
Density and viscocityDensity and viscocity
Density and viscocity
Srinivasa Rao
 
Flow measurement
Flow measurementFlow measurement
Flow measurement
Srinivasa Rao
 
Level measurement
Level measurementLevel measurement
Level measurement
Srinivasa Rao
 
C14 ee-105-electrical engineering materials
C14 ee-105-electrical engineering materialsC14 ee-105-electrical engineering materials
C14 ee-105-electrical engineering materials
Srinivasa Rao
 
C14 ee-106-basic electrical engineering
C14 ee-106-basic electrical engineeringC14 ee-106-basic electrical engineering
C14 ee-106-basic electrical engineering
Srinivasa Rao
 
C 14-met-mng-aei-107-engg drawing
C 14-met-mng-aei-107-engg drawingC 14-met-mng-aei-107-engg drawing
C 14-met-mng-aei-107-engg drawing
Srinivasa Rao
 
C 14-ee-101-english
C 14-ee-101-englishC 14-ee-101-english
C 14-ee-101-english
Srinivasa Rao
 
C 14-met-mng-aei-104-engg chemistry
C 14-met-mng-aei-104-engg chemistryC 14-met-mng-aei-104-engg chemistry
C 14-met-mng-aei-104-engg chemistry
Srinivasa Rao
 

More from Srinivasa Rao (20)

Oscillators
OscillatorsOscillators
Oscillators
 
power amplifiers
power amplifierspower amplifiers
power amplifiers
 
Amplifiers
AmplifiersAmplifiers
Amplifiers
 
Transistors
TransistorsTransistors
Transistors
 
Rectifiers
RectifiersRectifiers
Rectifiers
 
Process control 3 chapter
Process control 3 chapterProcess control 3 chapter
Process control 3 chapter
 
Process control 5 chapter
Process control 5 chapterProcess control 5 chapter
Process control 5 chapter
 
Process control 2 chapter
Process control 2 chapterProcess control 2 chapter
Process control 2 chapter
 
Process control 4 chapter
Process control 4 chapterProcess control 4 chapter
Process control 4 chapter
 
Process control 3 chapter
Process control 3 chapterProcess control 3 chapter
Process control 3 chapter
 
Process control
Process controlProcess control
Process control
 
Weight measurement
Weight measurementWeight measurement
Weight measurement
 
Density and viscocity
Density and viscocityDensity and viscocity
Density and viscocity
 
Flow measurement
Flow measurementFlow measurement
Flow measurement
 
Level measurement
Level measurementLevel measurement
Level measurement
 
C14 ee-105-electrical engineering materials
C14 ee-105-electrical engineering materialsC14 ee-105-electrical engineering materials
C14 ee-105-electrical engineering materials
 
C14 ee-106-basic electrical engineering
C14 ee-106-basic electrical engineeringC14 ee-106-basic electrical engineering
C14 ee-106-basic electrical engineering
 
C 14-met-mng-aei-107-engg drawing
C 14-met-mng-aei-107-engg drawingC 14-met-mng-aei-107-engg drawing
C 14-met-mng-aei-107-engg drawing
 
C 14-ee-101-english
C 14-ee-101-englishC 14-ee-101-english
C 14-ee-101-english
 
C 14-met-mng-aei-104-engg chemistry
C 14-met-mng-aei-104-engg chemistryC 14-met-mng-aei-104-engg chemistry
C 14-met-mng-aei-104-engg chemistry
 

Recently uploaded

Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
IIIT Hyderabad
 
Concepts Basic/ Technical Electronic Material.pdf
Concepts Basic/ Technical Electronic Material.pdfConcepts Basic/ Technical Electronic Material.pdf
Concepts Basic/ Technical Electronic Material.pdf
OBD II
 
libro de modelado de diseño-part-1[160-250].pdf
libro de modelado de diseño-part-1[160-250].pdflibro de modelado de diseño-part-1[160-250].pdf
libro de modelado de diseño-part-1[160-250].pdf
celiosilva66
 
Vernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsxVernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsx
Tool and Die Tech
 
Online toll plaza booking system project report.doc.pdf
Online toll plaza booking system project report.doc.pdfOnline toll plaza booking system project report.doc.pdf
Online toll plaza booking system project report.doc.pdf
Kamal Acharya
 
Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
Md.Shohel Rana ( M.Sc in CSE Khulna University of Engineering & Technology (KUET))
 
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY pptCONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
ASHOK KUMAR SINGH
 
DBMS Commands DDL DML DCL ENTITY RELATIONSHIP.pptx
DBMS Commands  DDL DML DCL ENTITY RELATIONSHIP.pptxDBMS Commands  DDL DML DCL ENTITY RELATIONSHIP.pptx
DBMS Commands DDL DML DCL ENTITY RELATIONSHIP.pptx
Tulasi72
 
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
YanKing2
 
EAAP2023 : Durabilité et services écosystémiques de l'élevage ovin de montagne
EAAP2023 : Durabilité et services écosystémiques de l'élevage ovin de montagneEAAP2023 : Durabilité et services écosystémiques de l'élevage ovin de montagne
EAAP2023 : Durabilité et services écosystémiques de l'élevage ovin de montagne
idelewebmestre
 
CGR-Unit-1 Basics of Computer Graphics.pdf
CGR-Unit-1 Basics of Computer Graphics.pdfCGR-Unit-1 Basics of Computer Graphics.pdf
CGR-Unit-1 Basics of Computer Graphics.pdf
Rugved Collection
 
李易峰祝绪丹做爱视频流出【网芷:ht28.co】可爱学生妹>>>[网趾:ht28.co】]<<<
李易峰祝绪丹做爱视频流出【网芷:ht28.co】可爱学生妹>>>[网趾:ht28.co】]<<<李易峰祝绪丹做爱视频流出【网芷:ht28.co】可爱学生妹>>>[网趾:ht28.co】]<<<
李易峰祝绪丹做爱视频流出【网芷:ht28.co】可爱学生妹>>>[网趾:ht28.co】]<<<
amzhoxvzidbke
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
Rafael Santos
 
lecture10-efficient-scoring.ppmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmt
lecture10-efficient-scoring.ppmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmtlecture10-efficient-scoring.ppmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmt
lecture10-efficient-scoring.ppmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmt
RAtna29
 
FINE-TUNING OF SMALL/MEDIUM LLMS FOR BUSINESS QA ON STRUCTURED DATA
FINE-TUNING OF SMALL/MEDIUM LLMS FOR BUSINESS QA ON STRUCTURED DATAFINE-TUNING OF SMALL/MEDIUM LLMS FOR BUSINESS QA ON STRUCTURED DATA
FINE-TUNING OF SMALL/MEDIUM LLMS FOR BUSINESS QA ON STRUCTURED DATA
kevig
 
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptxIE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
BehairyAhmed2
 
Top EPC companies in India - Best EPC Contractor
Top EPC companies in India - Best EPC  ContractorTop EPC companies in India - Best EPC  Contractor
Top EPC companies in India - Best EPC Contractor
MangeshK6
 
Stiffness Method for structure analysis - Truss
Stiffness Method  for structure analysis - TrussStiffness Method  for structure analysis - Truss
Stiffness Method for structure analysis - Truss
adninhaerul
 
PPT_grt.pptx engineering criteria grt for accrediation
PPT_grt.pptx engineering criteria  grt for accrediationPPT_grt.pptx engineering criteria  grt for accrediation
PPT_grt.pptx engineering criteria grt for accrediation
SHALINIRAJAN20
 
Online airline reservation system project report.pdf
Online airline reservation system project report.pdfOnline airline reservation system project report.pdf
Online airline reservation system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
 
Concepts Basic/ Technical Electronic Material.pdf
Concepts Basic/ Technical Electronic Material.pdfConcepts Basic/ Technical Electronic Material.pdf
Concepts Basic/ Technical Electronic Material.pdf
 
libro de modelado de diseño-part-1[160-250].pdf
libro de modelado de diseño-part-1[160-250].pdflibro de modelado de diseño-part-1[160-250].pdf
libro de modelado de diseño-part-1[160-250].pdf
 
Vernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsxVernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsx
 
Online toll plaza booking system project report.doc.pdf
Online toll plaza booking system project report.doc.pdfOnline toll plaza booking system project report.doc.pdf
Online toll plaza booking system project report.doc.pdf
 
Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
 
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY pptCONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
 
DBMS Commands DDL DML DCL ENTITY RELATIONSHIP.pptx
DBMS Commands  DDL DML DCL ENTITY RELATIONSHIP.pptxDBMS Commands  DDL DML DCL ENTITY RELATIONSHIP.pptx
DBMS Commands DDL DML DCL ENTITY RELATIONSHIP.pptx
 
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
 
EAAP2023 : Durabilité et services écosystémiques de l'élevage ovin de montagne
EAAP2023 : Durabilité et services écosystémiques de l'élevage ovin de montagneEAAP2023 : Durabilité et services écosystémiques de l'élevage ovin de montagne
EAAP2023 : Durabilité et services écosystémiques de l'élevage ovin de montagne
 
CGR-Unit-1 Basics of Computer Graphics.pdf
CGR-Unit-1 Basics of Computer Graphics.pdfCGR-Unit-1 Basics of Computer Graphics.pdf
CGR-Unit-1 Basics of Computer Graphics.pdf
 
李易峰祝绪丹做爱视频流出【网芷:ht28.co】可爱学生妹>>>[网趾:ht28.co】]<<<
李易峰祝绪丹做爱视频流出【网芷:ht28.co】可爱学生妹>>>[网趾:ht28.co】]<<<李易峰祝绪丹做爱视频流出【网芷:ht28.co】可爱学生妹>>>[网趾:ht28.co】]<<<
李易峰祝绪丹做爱视频流出【网芷:ht28.co】可爱学生妹>>>[网趾:ht28.co】]<<<
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
 
lecture10-efficient-scoring.ppmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmt
lecture10-efficient-scoring.ppmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmtlecture10-efficient-scoring.ppmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmt
lecture10-efficient-scoring.ppmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmt
 
FINE-TUNING OF SMALL/MEDIUM LLMS FOR BUSINESS QA ON STRUCTURED DATA
FINE-TUNING OF SMALL/MEDIUM LLMS FOR BUSINESS QA ON STRUCTURED DATAFINE-TUNING OF SMALL/MEDIUM LLMS FOR BUSINESS QA ON STRUCTURED DATA
FINE-TUNING OF SMALL/MEDIUM LLMS FOR BUSINESS QA ON STRUCTURED DATA
 
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptxIE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
 
Top EPC companies in India - Best EPC Contractor
Top EPC companies in India - Best EPC  ContractorTop EPC companies in India - Best EPC  Contractor
Top EPC companies in India - Best EPC Contractor
 
Stiffness Method for structure analysis - Truss
Stiffness Method  for structure analysis - TrussStiffness Method  for structure analysis - Truss
Stiffness Method for structure analysis - Truss
 
PPT_grt.pptx engineering criteria grt for accrediation
PPT_grt.pptx engineering criteria  grt for accrediationPPT_grt.pptx engineering criteria  grt for accrediation
PPT_grt.pptx engineering criteria grt for accrediation
 
Online airline reservation system project report.pdf
Online airline reservation system project report.pdfOnline airline reservation system project report.pdf
Online airline reservation system project report.pdf
 

digital datacomm

  • 1. Data and ComputerData and Computer CommunicationsCommunications Eighth EditionEighth Edition by William Stallingsby William Stallings Lecture slides by Lawrie BrownLecture slides by Lawrie Brown Chapter 6 – Digital DataChapter 6 – Digital Data Communications TechniquesCommunications Techniques
  • 2. Digital Data CommunicationsDigital Data Communications TechniquesTechniques  A conversation forms a two-way communication link; there is a measure of symmetry between the two parties, and messages pass to and fro. There is a continual stimulus-response, cyclic action; remarks call up other remarks, and the behavior of the two individuals becomes concerted, co-operative, and directed toward some goal. This is true communication. —On Human Communication, Colin Cherry
  • 3. Asynchronous andAsynchronous and Synchronous TransmissionSynchronous Transmission  timing problems require a mechanism totiming problems require a mechanism to synchronize the transmitter and receiversynchronize the transmitter and receiver  receiver samples stream at bit intervalsreceiver samples stream at bit intervals  if clocks not aligned and drifting will sample atif clocks not aligned and drifting will sample at wrong time after sufficient bits are sentwrong time after sufficient bits are sent  two solutions to synchronizing clockstwo solutions to synchronizing clocks  asynchronous transmissionasynchronous transmission  synchronous transmissionsynchronous transmission
  • 5. Asynchronous - BehaviorAsynchronous - Behavior  simplesimple  cheapcheap  overhead of 2 or 3 bits per char (~20%)overhead of 2 or 3 bits per char (~20%)  good for data with large gaps (keyboard)good for data with large gaps (keyboard)
  • 6. Synchronous TransmissionSynchronous Transmission  block of data transmitted sent as a frameblock of data transmitted sent as a frame  clocks must be synchronizedclocks must be synchronized  can use separate clock linecan use separate clock line  or embed clock signal in dataor embed clock signal in data  need to indicate start and end of blockneed to indicate start and end of block  use preamble and postambleuse preamble and postamble  more efficient (lower overhead) than asyncmore efficient (lower overhead) than async
  • 7. Types of ErrorTypes of Error  an error occurs when a bit is altered betweenan error occurs when a bit is altered between transmission and receptiontransmission and reception  single bit errorssingle bit errors  only one bit alteredonly one bit altered  caused by white noisecaused by white noise  burst errorsburst errors  contiguous sequence ofcontiguous sequence of BB bits in which first last andbits in which first last and any number of intermediate bits in errorany number of intermediate bits in error  caused by impulse noise or by fading in wirelesscaused by impulse noise or by fading in wireless  effect greater at higher data rateseffect greater at higher data rates
  • 8. Error DetectionError Detection  will have errorswill have errors  detect using error-detecting codedetect using error-detecting code  added by transmitteradded by transmitter  recalculated and checked by receiverrecalculated and checked by receiver  still chance of undetected errorstill chance of undetected error  parityparity  parity bit set so character has even (evenparity bit set so character has even (even parity) or odd (odd parity) number of onesparity) or odd (odd parity) number of ones  even number of bit errors goes undetectedeven number of bit errors goes undetected
  • 9. Error Detection ProcessError Detection Process
  • 10. Cyclic Redundancy CheckCyclic Redundancy Check  one of most common and powerful checksone of most common and powerful checks  for block offor block of kk bits transmitter generates anbits transmitter generates an nn bit frame check sequence (FCS)bit frame check sequence (FCS)  transmitstransmits k+nk+n bits which is exactly divisiblebits which is exactly divisible by some numberby some number  receiver divides frame by that numberreceiver divides frame by that number  if no remainder, assume no errorif no remainder, assume no error  for math, see Stallings chapter 6for math, see Stallings chapter 6
  • 11. Error CorrectionError Correction  correction of detected errors usually requirescorrection of detected errors usually requires data block to be retransmitteddata block to be retransmitted  not appropriate for wireless applicationsnot appropriate for wireless applications  bit error rate is high causing lots of retransmissionsbit error rate is high causing lots of retransmissions  when propagation delay long (satellite) compared withwhen propagation delay long (satellite) compared with frame transmission time, resulting in retransmission offrame transmission time, resulting in retransmission of frame in error plus many subsequent framesframe in error plus many subsequent frames  instead need to correct errors on basis of bitsinstead need to correct errors on basis of bits receivedreceived  error correction provides thiserror correction provides this
  • 12. Error Correction ProcessError Correction Process
  • 13. How Error Correction WorksHow Error Correction Works  adds redundancy to transmitted messageadds redundancy to transmitted message  can deduce original despite some errorscan deduce original despite some errors  eg. block error correction codeeg. block error correction code  mapmap kk bit input onto anbit input onto an nn bit codewordbit codeword  each distinctly differenteach distinctly different  if get error assume codeword sent wasif get error assume codeword sent was closest to that receivedclosest to that received  for math, see Stallings chapter 6for math, see Stallings chapter 6  means have reduced effective data ratemeans have reduced effective data rate
  • 14. Line Configuration - TopologyLine Configuration - Topology  physical arrangement of stations onphysical arrangement of stations on mediummedium  point to point - two stationspoint to point - two stations • such as between two routers / computerssuch as between two routers / computers  multi point - multiple stationsmulti point - multiple stations • traditionally mainframe computer and terminalstraditionally mainframe computer and terminals • now typically a local area network (LAN)now typically a local area network (LAN)
  • 15. Line Configuration - TopologyLine Configuration - Topology
  • 16. Line Configuration - DuplexLine Configuration - Duplex  classify data exchange as half or full duplexclassify data exchange as half or full duplex  half duplex (two-way alternate)half duplex (two-way alternate)  only one station may transmit at a timeonly one station may transmit at a time  requires one data pathrequires one data path  full duplex (two-way simultaneous)full duplex (two-way simultaneous)  simultaneous transmission and reception betweensimultaneous transmission and reception between two stationstwo stations  requires two data pathsrequires two data paths • separate media or frequencies used for each directionseparate media or frequencies used for each direction  or echo cancelingor echo canceling
  • 17. SummarySummary  asynchronous verses synchronousasynchronous verses synchronous transmissiontransmission  error detection and correctionerror detection and correction  line configuration issuesline configuration issues

Editor's Notes

  1. Lecture slides prepared by Dr Lawrie Brown (UNSW@ADFA) for “Data and Computer Communications”, 8/e, by William Stallings, Chapter 6 “Digital Data Communications Techniques”.
  2. This quote from the start of Stallings DCC8e Ch6 points to the process used to exchange data. The preceding three chapters have been concerned primarily with the attributes of data transmission. In this chapter, we shift our emphasis from data transmission to data communications.
  3. The transmission of a stream of bits from one device to another across a transmission link involves a great deal of cooperation and agreement between the two sides. One of the most fundamental requirements is synchronization. The receiver must know the rate at which bits are being received so that it can sample the line at appropriate intervals to determine the value of each received bit. Two techniques are in common use for this purpose —asynchronous and synchronous transmission. Recall from Ch 3 that the reception of digital data involves sampling the incoming signal once per bit time to determine the binary value. This is compounded by a timing difficulty: In order for the receiver to sample the incoming bits properly, it must know the arrival time and duration of each bit that it receives. Typically, the receiver will attempt to sample the medium at the center of each bit time, at intervals of one bit time. If the receiver times its samples based on its own clock, then there will be a problem if the transmitter&amp;apos;s and receiver&amp;apos;s clocks are not precisely aligned. If there is a drift in the receiver&amp;apos;s clock, then after enough samples, the receiver may be in error because it is sampling in the wrong bit time For smaller timing differences, the error would occur later, but eventually the receiver will be out of step with the transmitter if the transmitter sends a sufficiently long stream of bits and if no steps are taken to synchronize the transmitter and receiver.
  4. In asynchronous transmission, each character of data is treated independently. The strategy with this scheme is to avoid the timing problem by not sending long, uninterrupted streams of bits. Instead, data are transmitted one character at a time. Each character begins with a start bit that alerts the receiver that a character is arriving. The receiver samples each bit in the character and then looks for the beginning of the next character. This technique would not work well for long blocks of data because the receiver&amp;apos;s clock might eventually drift out of synchronization with the transmitter&amp;apos;s clock. Stallings DCC8e figure 6.1 illustrates this technique. When no character is being transmitted, the line between transmitter and receiver is in an idle state (binary 1 level). The beginning of a character is signaled by a start bit with a value of binary 0. This is followed by the 5 to 8 bits that actually make up the character. The bits of the character are transmitted beginning with the least significant bit. Then the data bits are usually followed by a parity bit, set by the transmitter such that the total number of ones in the character, including the parity bit, is even (even parity) or odd (odd parity). The receiver uses this bit for error detection, as discussed in Section 6.3. The final element is a stop element, which is a binary 1. A minimum length for the stop element is specified, and this is usually 1, 1.5, or 2 times the duration of an ordinary bit. No maximum value is specified. Because the stop element is the same as the idle state, the transmitter will continue to transmit the stop element until it is ready to send the next character. The timing requirements for this scheme are modest. Stallings DCC8e figure 6.1c shows the effects of a timing error of sufficient magnitude to cause an error in reception. Assume that the receiver is fast by 6%,. Thus, the receiver samples the incoming character every 94 µs (based on the transmitter&amp;apos;s clock). As can be seen, the last sample is erroneous.
  5. Asynchronous transmission is simple and cheap but requires an overhead of two to three bits per character. For example, for an 8-bit character with no parity bit, using a 1-bit-long stop element, two out of every ten bits convey no information but are there merely for synchronization; thus the overhead is 20%. Of course, the percentage overhead could be reduced by sending larger blocks of bits between the start bit and stop element. However, as Stallings DCC8e figure 6.1c indicates, the larger the block of bits, the greater the cumulative timing error. To achieve greater efficiency, a different form of synchronization, known as synchronous transmission, is used.
  6. For large blocks, synchronous transmission is used. Each block of data is formatted as a frame that includes a starting and an ending flag, and is transmitted in a steady stream without start and stop codes. The block may be many bits in length. To prevent timing drift between transmitter and receiver, their clocks must somehow be synchronized. One possibility is to provide a separate clock line between transmitter and receiver. The other alternative is to embed the clocking information in the data signal. For digital signals, this can be accomplished with Manchester or differential Manchester encoding. For analog signals, a number of techniques can be used; for example, the carrier frequency itself can be used to synchronize the receiver based on the phase of the carrier. With synchronous transmission, there is another level of synchronization required, to allow the receiver to determine the beginning and end of a block of data. To achieve this, each block begins with a preamble bit pattern and generally ends with a postamble bit pattern. The data plus preamble, postamble, and control information are called a frame. The exact format of the frame depends on which data link control procedure is being used. Stallings DCC8e figure 6.2 shows a typical frame format for synchronous transmission. It starts with a preamble called a flag, which is 8 bits long. The same flag is used as a postamble. This is followed by some number of control fields (containing data link control protocol information), then a data field (variable length for most protocols), more control fields, and finally the flag is repeated. For sizable blocks of data, synchronous transmission is far more efficient than asynchronous. Asynchronous transmission requires 20% or more overhead. The control information, preamble, and postamble in synchronous transmission are typically less than 100 bits.
  7. In digital transmission systems, an error occurs when a bit is altered between transmission and reception; that is, a binary 1 is transmitted and a binary 0 is received, or a binary 0 is transmitted and a binary 1 is received. Two general types of errors can occur: single-bit errors and burst errors. A single-bit error is an isolated error condition that alters one bit but does not affect nearby bits. A single-bit error can occur in the presence of white noise, when a slight random deterioration of the signal-to-noise ratio is sufficient to confuse the receiver&amp;apos;s decision of a single bit. A burst error of length B is a contiguous sequence of B bits in which the first and last bits and any number of intermediate bits are received in error. Burst errors are more common and more difficult to deal with. Burst errors can be caused by impulse noise, and by fading in a mobile wireless environment. Note that the effects of burst errors are greater at higher data rates.
  8. Regardless of the design of the transmission system, there will be errors, resulting in the change of one or more bits in a transmitted frame. Error detection is performed by calculating an error-detecting code that is a function of the bits being transmitted. The code is appended to the transmitted bits. The receiver calculates the code based on the incoming bits and compares it to the incoming code to check for errors. A detected error occurs if and only if there is a mismatch. There is a probability that a frame contains errors and that the error-detecting scheme will detect that fact. Also have a residual error rate, being the probability that an error will be undetected despite the use of an error-detecting scheme. The simplest error-detecting scheme is to append a parity bit to the end of a block of data. The value of this bit is selected so that the character has an even number of 1s (even parity) or an odd number of 1s (odd parity). Note, however, that if two (or any even number) of bits are inverted due to error, an undetected error occurs. Typically, even parity is used for synchronous transmission and odd parity for asynchronous transmission. The use of the parity bit is not foolproof, as noise impulses are often long enough to destroy more than one bit, particularly at high data rates.
  9. Stallings DCC8e figure 6.3 illustrates the error detection process. For a given frame of bits, additional bits that constitute an error-detecting code are added by the transmitter. This code is calculated as a function of the other transmitted bits. Typically, for a data block of k bits, the error-detecting algorithm yields an error-detecting code of n – k bits, where (n – k) &amp;lt; k. The error-detecting code, also referred to as the check bits, is appended to the data block to produce a frame of n bits, which is then transmitted. The receiver separates the incoming frame into the k bits of data and (n – k) bits of the error-detecting code. The receiver performs the same error-detecting calculation on the data bits and compares this value with the value of the incoming error-detecting code. A detected error occurs if and only if there is a mismatch.
  10. One of the most common, and one of the most powerful, error-detecting codes is the cyclic redundancy check (CRC), which can be described as follows. Given a k-bit block of bits, or message, the transmitter generates an (n – k)-bit sequence, known as a frame check sequence (FCS), such that the resulting frame, consisting of n bits, is exactly divisible by some predetermined number. The receiver then divides the incoming frame by that number and, if there is no remainder, assumes there was no error. Can state this procedure in three equivalent ways: modulo 2 arithmetic, polynomials, and digital logic, as detailed in Stallings DCC8e chapter 6.3. Comes down to working out what remainder exists when divide data by desired number, and using that as the FCS value appended tot eh data to form the block.
  11. Error detection is a useful technique, found in data link control protocols, such as HDLC, and in transport protocols, such as TCP. However, correction of errors using an error-detecting code, requires that block of data be retransmitted. For wireless applications this approach is inadequate for two reasons: 1.The bit error rate on a wireless link can be quite high, which would result in a large number of retransmissions. 2.In some cases, especially satellite links, the propagation delay is very long compared to the transmission time of a single frame. With a long data link, an error in a single frame necessitates retransmitting many frames. Instead, it would be desirable to enable the receiver to correct errors in an incoming transmission on the basis of the bits in that transmission. Error correction operates in a fashion similar to error detection but is capable of correcting certain errors in a transmitted bit stream.
  12. Stallings DCC8e figure 6.7 shows in general how this is done. On the transmission end, each k-bit block of data is mapped into an n-bit block (n &amp;gt; k) called a codeword, using an FEC (forward error correction) encoder. The codeword is then transmitted. During transmission, the signal is subject to impairments, which may produce bit errors in the signal. At the receiver, the incoming signal is demodulated to produce a bit string that is similar to the original codeword but may contain errors. This block is passed through an FEC decoder, with one of four possible outcomes: 1.If there are no bit errors, the input to the FEC decoder is identical to the original codeword, and the decoder produces the original data block as output. 2.For certain error patterns, it is possible for the decoder to detect and correct those errors, the FEC decoder is able to map this block into the original data block. 3.For certain error patterns, the decoder can detect but not correct the errors, the decoder simply reports an uncorrectable error. For certain, typically rare, error patterns, the decoder does not detect that any errors have occurred and maps the incoming data block into a block different from the original.
  13. In essence, error correction works by adding redundancy to the transmitted message. The redundancy makes it possible for the receiver to deduce what the original message was, even in the face of a certain level of error rate. In this section we look at a widely used form of error-correcting code known as a block error-correcting code. If wish to transmit blocks of data of length k bits, so map each k-bit sequence into a unique n-bit codeword, which differ significantly from each other. Typically, each valid codeword reproduces the original k data bits and adds to them (n – k) check bits to form the n-bit codeword. Then if an invalid codeword is received, assume the valid codeword is the one that is closest to it, and use the input bit sequence associated with it. The ratio of redundant bits to data bits, (n – k)/k, is called the redundancy of the code, and the ratio of data bits to total bits, k/n, is called the code rate. The code rate is a measure of how much additional bandwidth is required to carry data at the same data rate as without the code. For example, a code rate of 1/2 requires double the transmission capacity of an uncoded system to maintain the same data rate.
  14. Two characteristics that distinguish various data link configurations are topology and whether the link is half duplex or full duplex. The topology of a data link refers to the physical arrangement of stations on a transmission medium. If there are only two stations (e.g., a terminal and a computer or two computers), the link is point to point. If there are more than two stations, then it is a multipoint topology. Traditionally, a multipoint link has been used in the case of a computer (primary station) and a set of terminals (secondary stations). In today&amp;apos;s environments, the multipoint topology is found in local area networks.
  15. Stallings DCC8e figure 6.9 illustrates the advantages of the multipoint configuration. If each terminal has a point-to-point link to its computer, then the computer must have one I/O port for each terminal. Also there is a separate transmission line from the computer to each terminal. In a multipoint configuration, the computer needs only a single I/O port and a single transmission line, which saves costs. Traditional multipoint topologies are made possible when the terminals are only transmitting a fraction of the time.
  16. Data exchanges over a transmission line can be classified as full duplex or half duplex. With half-duplex transmission, only one of two stations on a point-to-point link may transmit at a time. This mode is also referred to as two-way alternate, suggestive of the fact that two stations must alternate in transmitting, and can be compared to a one-lane, two-way bridge. This form of transmission is often used for terminal-to-computer interaction. While a user is entering and transmitting data, the computer is prevented from sending data to the terminal, which would appear on the terminal screen and cause confusion. For full-duplex transmission, two stations can simultaneously send and receive data from each other. Thus, this mode is known as two-way simultaneous and may be compared to a two-lane, two-way bridge. For computer-to-computer data exchange, this form of transmission is more efficient than half-duplex transmission. With digital signaling, which requires guided transmission, full-duplex operation usually requires two separate transmission paths (e.g., two twisted pairs), while half duplex requires only one. For analog signaling, it depends on frequency: If a station transmits and receives on the same frequency, it must operate in half-duplex mode for wireless transmission, although it may operate in full-duplex mode for guided transmission using two separate transmission lines. If a station transmits on one frequency and receives on another, it may operate in full-duplex mode for wireless transmission and in full-duplex mode with a single line for guided transmission. It is also possible to transmit digital signals simultaneously in both directions on a single transmission line using a signal processing technique called echo cancellation.
  17. Stallings DCC8e Chapter 6 summary.