SlideShare a Scribd company logo
1 of 29
TRANSMISSION
Bits per second (bps) aka bit rate
 A measure of transmission speed. The
number of binary digits (0 or 1) which can
be transmitted per second
 Not to be mistaken for Bytes per second
(Bps)
 When converting Bps to bps, remember
that there are 8 bits to a Byte
 Therefore 10MB = 10 x 8 Mb = 80Mb
Baud Rate aka symbol rate
 A measure of how fast a change of state
occurs (i.e. a change from 0 to 1)
 The number of signal events occurring
each second along a communication
channel
 Because a signal can contain more than
one bit of data, the baud rate and the bit
rate may be different. E.g. 1200 baud
might transmit at 4800 bps.
Baud Rate aka symbol rate
 The number of different symbols required
depends on the number of bits used in a
single signal event
 E.g. if there are 4 bits represented in each
baud, there will need to be 16 different
symbols.
Baud Rate aka symbol rate
E.g. 24 = 16
0000 0001 0010 0011
0100 0101 0110 0111
1000 1001 1010 1011
1100 1101 1110 1111
E.g. 22 = 4
00 01 10 11
How baud rate relates to bps
Example
An analogue signal carries 6 bits in each
signal event. If 1000 signal events are sent
per second, what is the baud rate and bit
rate?
Solution:
 Baud rate = 1000 bauds per second
 Bit rate = 1000 x 6 = 6000bps
Modulation
 The process of conveying a message
signal, for example a digital bit stream or
an analogue audio signal, inside another
signal that can be physically transmitted
QAM
 Most current connections to the Internet
use Quadrature Amplitude Modulation
(QAM).
 This system represents different bit
patterns by altering the amplitude and
phase of the wave.
 16QAM uses 16 different symbols to
represent 4 bits/symbol, 32QAM uses 32
different symbols to represent 5
bits/symbol, etc.
Group Task Activity
Calculate the minimum transmission time
required to transfer a 1kB packet at 10Mbps
to a satellite located 40 000km above Earth.
 3 x 108 m/s = 300 000 000 m/s
 Time for the first part of the signal to reach
the satellite will be
40 000 000 ÷ 300 000 000 = 0.1333
seconds
Group Task Activity
 Now we need to calculate the time taken
from when the first part of the signal is
placed on the medium until the last signal
is placed on the medium.
 10Mb (megabits) of data are placed on the
medium in 1 second. We are placing a
1kB (kilobyte) packet on the medium.
 10Mb = ~ 10 000kb
 1 kB = 8kb
∴ 8kb will take 8 ÷ 10 000 = 0.0008 seconds
for the sender to place on the medium.
Group Task Activity
 So the first part of the signal will arrive at
the satellite in 0.1333 seconds; the
remainder of the signal follows during the
next 0.0008 seconds.
 Therefore, the minimum time taken until
the entire message reaches the satellite is
0.1333 + 0.0008 = 0.1341 seconds
Group Task Discussion
Why is the speed of wave propagation
particularly significant over longer distances
when each data packet must be
acknowledged before the next one can be
sent? Discuss
Group Task Activity
 The time taken for the signal to physically
propagate through the medium (signal
latency) adds to the time between a
packet being received by the destination
and acknowledgements being received by
the sender. Furthermore the propagation
time must be added to the time taken for
every packet to reach it’s destination.
Group Task Activity
As CPU speeds increase and motherboards
transfer data faster, will the speed of wave
propagation within and between
motherboard components become
significant? Discuss
 Distances between motherboard
components are miniscule compared to
distances on a global scale.
Group Task Activity
 Consider a distance of 300mm between
motherboard components.
At 2 x 108 m/s the propagation time is just
0.3 ÷ 200 000 000 = 0.0000000015
seconds.
∴ CPU speeds would need to increase
enormously before propagation speeds will
become a significant motherboard issue.
Bandwidth
 Not to be confused with speed or bps
 The range of frequencies used by a
transmission channel (the difference
between the highest and lowest)
 Expressed in hertz (Hz)
 E.g. Standard telephone equipment used
for voice operates within a frequency
range from about 200Hz to 3400Hz, so
the available bandwidth is 3200Hz
(3.2KHz).
Example
A fibre-optic cable has a high bandwidth.
When cable television is transmitted through
fibre-optic cable, many different channels
can be transmitted at the same time.
Group Task Activity
Calculate the time taken to transfer a 2MB file
over each of the below communication
methods.
 First we need to convert all numbers to bits
 2MB = 2 000 000 Bytes
 2 000 000 Bytes = 16 000 000 bits
1. 56kbps = 56 000bps. Time = 16 000 000 ÷
56 000
= 286 seconds
Group Task Activity
2. 10 Mbps
16 000 000 ÷ 10 000 000 = 1.6 seconds
3. 100Mbps
16 000 000 ÷ 100 000 000 = 0.16 seconds
4. 1000Mbps
16 000 000 ÷ 1 000 000 000 = 0.016
seconds
Group Task Activity
5. 1.5Mbps
16 000 000 ÷ 1 500 000 = 10.7 seconds
6. 64QAM uses 64 symbols to represent 6
bits/symbol. Therefore 4Msym/s is
equivalent to
4 x 6 = 24Mbps = 24 000 000bps
16 000 000 ÷ 24 000 000 = 0.67 seconds
Group Task Activity
Identify and discuss reasons why it is unlikely
that the minimum times calculated above would
be realised in reality.
 Errors including the time taken to resend
faulty packets.
 Other simultaneous transmissions occurring.
 Protocol headers/trailers and time waiting for
acknowledgements
 Time to pass through other components such
as NICs, routers, etc.
Error Checking Methods
When an error is detected the receiver can
respond in various ways depending on the
rules of the particular protocol.
 Parity bit check
 Check sum
 Cycle redundancy check (CRC)
Parity bit check
 The simplest form of error detection involves
adding a parity bit to the data bits
 The sender computes an additional bit based
on the given data bits
 The receiver performs the same computation
and verifies that the parity bits agree
 The computation is chosen so that a one-bit
alteration can be detected
 Parity can be even or odd, this is established
during handshaking
 E.g. For even parity, the sender sets the
parity bit so that the total number of 1 bits is
even
Parity bit check
Checksums
 All the 1s and 0s in a block of data are
summed to make a total and the receiver
calculates a checksum value. If the sent
value does not agree, then an error is
detected. If the count matches, it is
assumed that a complete transmission
was received.
 The position of the error is unknown
Group Task Discussion Activity
IP datagrams include a 16-bit checksum
calculated using just their header whilst TCP
segments include a 16-bit checksum
calculated using the entire message.
Discuss possible reasons for this difference
and describe likely differences between the
accuracy of IP and TCP checksums.
Group Task Discussion Activity
 IP aims to route messages and isn’t
concerned with guaranteeing delivery. The
header contains all the data needed for
routing
 TCP acknowledges each segment,
therefore it checks the accuracy of the
entire segment
 IP checksums are calculated over a
smaller number of bytes compare to TCP
checksums, this tend to be more accurate.
Cyclic Redundancy Check (CRC)
 The most accurate error check
 Calculated using division rather than addition
 The data is divided into predetermined
lengths and divided by a fixed number. The
remainder of the calculation is attached and
sent with the data.
 When the data is received, the remainder is
recalculated. If the remainders do not match,
an error in transmission has occurred.
 There are a number of different standards for
CRC. A 32-bit CRC achieves a 99.99%
detection of all possible errors.

More Related Content

What's hot

Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layerDeepak John
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJASOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJAvtunotesbysree
 
Computer network transmission channel & topology
Computer network transmission channel & topologyComputer network transmission channel & topology
Computer network transmission channel & topologySweta Kumari Barnwal
 
Computer networks and internet www.it-workss.com
Computer networks and internet   www.it-workss.comComputer networks and internet   www.it-workss.com
Computer networks and internet www.it-workss.comVarunraj Kalse
 
Data Communication & Networks
Data Communication & NetworksData Communication & Networks
Data Communication & NetworksMiXvideos
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks IntroductionDr.Florence Dayana
 

What's hot (20)

Switching
SwitchingSwitching
Switching
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layer
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJASOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Computer network physical layer
Computer network  physical layerComputer network  physical layer
Computer network physical layer
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 
PPT of Communications Systems
PPT of Communications SystemsPPT of Communications Systems
PPT of Communications Systems
 
Computer network transmission channel & topology
Computer network transmission channel & topologyComputer network transmission channel & topology
Computer network transmission channel & topology
 
Computer networks and internet www.it-workss.com
Computer networks and internet   www.it-workss.comComputer networks and internet   www.it-workss.com
Computer networks and internet www.it-workss.com
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Data Communication & Networks
Data Communication & NetworksData Communication & Networks
Data Communication & Networks
 
Unit 4
Unit 4Unit 4
Unit 4
 
Digital network lecturer3
Digital network  lecturer3Digital network  lecturer3
Digital network lecturer3
 
06 digital datacomm
06 digital datacomm06 digital datacomm
06 digital datacomm
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
 
Networking
NetworkingNetworking
Networking
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 

Similar to Transmission

Example problems
Example problemsExample problems
Example problemsdeepakps22
 
Lecture7 encodingmodulation
Lecture7 encodingmodulationLecture7 encodingmodulation
Lecture7 encodingmodulationH K
 
Availability Computer Communication Network .pdf
Availability Computer Communication Network .pdfAvailability Computer Communication Network .pdf
Availability Computer Communication Network .pdfYashShirude1
 
Switching Problems.pdf
Switching Problems.pdfSwitching Problems.pdf
Switching Problems.pdfSenthil Vit
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONDeepak kango
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communicationswatihalunde
 
Fundamental of computer network
Fundamental of computer networkFundamental of computer network
Fundamental of computer networkpavanRaikar3
 
Ch6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kuraleCh6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kuraleNeha Kurale
 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).pptBezaAlem2
 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.pptKumarVaibhav100
 
Text book 2 computer networks_a systems approach_peterson solution manual
Text book 2 computer networks_a systems approach_peterson solution manualText book 2 computer networks_a systems approach_peterson solution manual
Text book 2 computer networks_a systems approach_peterson solution manualgopivrajan
 
MAT 510 – Homework AssignmentHomework Assignment 6 Due.docx
MAT 510 – Homework AssignmentHomework Assignment 6 Due.docxMAT 510 – Homework AssignmentHomework Assignment 6 Due.docx
MAT 510 – Homework AssignmentHomework Assignment 6 Due.docxjessiehampson
 
9-Lect_9-2.pptx DataLink Layer DataLink Layer
9-Lect_9-2.pptx DataLink Layer DataLink Layer9-Lect_9-2.pptx DataLink Layer DataLink Layer
9-Lect_9-2.pptx DataLink Layer DataLink LayerZahouAmel1
 

Similar to Transmission (20)

Unit_I - 3
Unit_I - 3Unit_I - 3
Unit_I - 3
 
Example problems
Example problemsExample problems
Example problems
 
Week-3.pptx
Week-3.pptxWeek-3.pptx
Week-3.pptx
 
communication networks
communication networkscommunication networks
communication networks
 
Lecture7 encodingmodulation
Lecture7 encodingmodulationLecture7 encodingmodulation
Lecture7 encodingmodulation
 
Availability Computer Communication Network .pdf
Availability Computer Communication Network .pdfAvailability Computer Communication Network .pdf
Availability Computer Communication Network .pdf
 
Data and signals
Data and signalsData and signals
Data and signals
 
Switching Problems.pdf
Switching Problems.pdfSwitching Problems.pdf
Switching Problems.pdf
 
ANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATIONANALOG DIGITAL HYBRID MODULATION
ANALOG DIGITAL HYBRID MODULATION
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
5 digital datacomm
5 digital datacomm5 digital datacomm
5 digital datacomm
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
 
Fundamental of computer network
Fundamental of computer networkFundamental of computer network
Fundamental of computer network
 
Ch6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kuraleCh6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kurale
 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt
 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.ppt
 
Text book 2 computer networks_a systems approach_peterson solution manual
Text book 2 computer networks_a systems approach_peterson solution manualText book 2 computer networks_a systems approach_peterson solution manual
Text book 2 computer networks_a systems approach_peterson solution manual
 
MAT 510 – Homework AssignmentHomework Assignment 6 Due.docx
MAT 510 – Homework AssignmentHomework Assignment 6 Due.docxMAT 510 – Homework AssignmentHomework Assignment 6 Due.docx
MAT 510 – Homework AssignmentHomework Assignment 6 Due.docx
 
9-Lect_9-2.pptx DataLink Layer DataLink Layer
9-Lect_9-2.pptx DataLink Layer DataLink Layer9-Lect_9-2.pptx DataLink Layer DataLink Layer
9-Lect_9-2.pptx DataLink Layer DataLink Layer
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Transmission

  • 2. Bits per second (bps) aka bit rate  A measure of transmission speed. The number of binary digits (0 or 1) which can be transmitted per second  Not to be mistaken for Bytes per second (Bps)  When converting Bps to bps, remember that there are 8 bits to a Byte  Therefore 10MB = 10 x 8 Mb = 80Mb
  • 3. Baud Rate aka symbol rate  A measure of how fast a change of state occurs (i.e. a change from 0 to 1)  The number of signal events occurring each second along a communication channel  Because a signal can contain more than one bit of data, the baud rate and the bit rate may be different. E.g. 1200 baud might transmit at 4800 bps.
  • 4. Baud Rate aka symbol rate  The number of different symbols required depends on the number of bits used in a single signal event  E.g. if there are 4 bits represented in each baud, there will need to be 16 different symbols.
  • 5. Baud Rate aka symbol rate E.g. 24 = 16 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 E.g. 22 = 4 00 01 10 11
  • 6. How baud rate relates to bps
  • 7. Example An analogue signal carries 6 bits in each signal event. If 1000 signal events are sent per second, what is the baud rate and bit rate? Solution:  Baud rate = 1000 bauds per second  Bit rate = 1000 x 6 = 6000bps
  • 8. Modulation  The process of conveying a message signal, for example a digital bit stream or an analogue audio signal, inside another signal that can be physically transmitted
  • 9. QAM  Most current connections to the Internet use Quadrature Amplitude Modulation (QAM).  This system represents different bit patterns by altering the amplitude and phase of the wave.  16QAM uses 16 different symbols to represent 4 bits/symbol, 32QAM uses 32 different symbols to represent 5 bits/symbol, etc.
  • 10. Group Task Activity Calculate the minimum transmission time required to transfer a 1kB packet at 10Mbps to a satellite located 40 000km above Earth.  3 x 108 m/s = 300 000 000 m/s  Time for the first part of the signal to reach the satellite will be 40 000 000 ÷ 300 000 000 = 0.1333 seconds
  • 11. Group Task Activity  Now we need to calculate the time taken from when the first part of the signal is placed on the medium until the last signal is placed on the medium.  10Mb (megabits) of data are placed on the medium in 1 second. We are placing a 1kB (kilobyte) packet on the medium.  10Mb = ~ 10 000kb  1 kB = 8kb ∴ 8kb will take 8 ÷ 10 000 = 0.0008 seconds for the sender to place on the medium.
  • 12. Group Task Activity  So the first part of the signal will arrive at the satellite in 0.1333 seconds; the remainder of the signal follows during the next 0.0008 seconds.  Therefore, the minimum time taken until the entire message reaches the satellite is 0.1333 + 0.0008 = 0.1341 seconds
  • 13. Group Task Discussion Why is the speed of wave propagation particularly significant over longer distances when each data packet must be acknowledged before the next one can be sent? Discuss
  • 14. Group Task Activity  The time taken for the signal to physically propagate through the medium (signal latency) adds to the time between a packet being received by the destination and acknowledgements being received by the sender. Furthermore the propagation time must be added to the time taken for every packet to reach it’s destination.
  • 15. Group Task Activity As CPU speeds increase and motherboards transfer data faster, will the speed of wave propagation within and between motherboard components become significant? Discuss  Distances between motherboard components are miniscule compared to distances on a global scale.
  • 16. Group Task Activity  Consider a distance of 300mm between motherboard components. At 2 x 108 m/s the propagation time is just 0.3 ÷ 200 000 000 = 0.0000000015 seconds. ∴ CPU speeds would need to increase enormously before propagation speeds will become a significant motherboard issue.
  • 17. Bandwidth  Not to be confused with speed or bps  The range of frequencies used by a transmission channel (the difference between the highest and lowest)  Expressed in hertz (Hz)  E.g. Standard telephone equipment used for voice operates within a frequency range from about 200Hz to 3400Hz, so the available bandwidth is 3200Hz (3.2KHz).
  • 18. Example A fibre-optic cable has a high bandwidth. When cable television is transmitted through fibre-optic cable, many different channels can be transmitted at the same time.
  • 19. Group Task Activity Calculate the time taken to transfer a 2MB file over each of the below communication methods.  First we need to convert all numbers to bits  2MB = 2 000 000 Bytes  2 000 000 Bytes = 16 000 000 bits 1. 56kbps = 56 000bps. Time = 16 000 000 ÷ 56 000 = 286 seconds
  • 20. Group Task Activity 2. 10 Mbps 16 000 000 ÷ 10 000 000 = 1.6 seconds 3. 100Mbps 16 000 000 ÷ 100 000 000 = 0.16 seconds 4. 1000Mbps 16 000 000 ÷ 1 000 000 000 = 0.016 seconds
  • 21. Group Task Activity 5. 1.5Mbps 16 000 000 ÷ 1 500 000 = 10.7 seconds 6. 64QAM uses 64 symbols to represent 6 bits/symbol. Therefore 4Msym/s is equivalent to 4 x 6 = 24Mbps = 24 000 000bps 16 000 000 ÷ 24 000 000 = 0.67 seconds
  • 22. Group Task Activity Identify and discuss reasons why it is unlikely that the minimum times calculated above would be realised in reality.  Errors including the time taken to resend faulty packets.  Other simultaneous transmissions occurring.  Protocol headers/trailers and time waiting for acknowledgements  Time to pass through other components such as NICs, routers, etc.
  • 23. Error Checking Methods When an error is detected the receiver can respond in various ways depending on the rules of the particular protocol.  Parity bit check  Check sum  Cycle redundancy check (CRC)
  • 24. Parity bit check  The simplest form of error detection involves adding a parity bit to the data bits  The sender computes an additional bit based on the given data bits  The receiver performs the same computation and verifies that the parity bits agree  The computation is chosen so that a one-bit alteration can be detected  Parity can be even or odd, this is established during handshaking  E.g. For even parity, the sender sets the parity bit so that the total number of 1 bits is even
  • 26. Checksums  All the 1s and 0s in a block of data are summed to make a total and the receiver calculates a checksum value. If the sent value does not agree, then an error is detected. If the count matches, it is assumed that a complete transmission was received.  The position of the error is unknown
  • 27. Group Task Discussion Activity IP datagrams include a 16-bit checksum calculated using just their header whilst TCP segments include a 16-bit checksum calculated using the entire message. Discuss possible reasons for this difference and describe likely differences between the accuracy of IP and TCP checksums.
  • 28. Group Task Discussion Activity  IP aims to route messages and isn’t concerned with guaranteeing delivery. The header contains all the data needed for routing  TCP acknowledges each segment, therefore it checks the accuracy of the entire segment  IP checksums are calculated over a smaller number of bytes compare to TCP checksums, this tend to be more accurate.
  • 29. Cyclic Redundancy Check (CRC)  The most accurate error check  Calculated using division rather than addition  The data is divided into predetermined lengths and divided by a fixed number. The remainder of the calculation is attached and sent with the data.  When the data is received, the remainder is recalculated. If the remainders do not match, an error in transmission has occurred.  There are a number of different standards for CRC. A 32-bit CRC achieves a 99.99% detection of all possible errors.

Editor's Notes

  1. This value is known as the signal’s latency and remains constant regardless of the size of the packet.
  2. Systems such as TCP’s sliding window allow some packets to continue to be sent without sequentially waiting for each acknowledgement, hence there is less waiting and the signal’s latency although still significant is less critical.
  3. In reality there are 1024 bytes in a kilobyte, but for our purpose we simplify the math and use 1000.
  4. For odd parity, the sender sets the parity bit so that the total number of 1 bits is odd
  5. The fixed number is called a generator polynomial.