• No results found

20160404-u4-complete-notes.pdf

N/A
N/A
Protected

Academic year: 2020

Share "20160404-u4-complete-notes.pdf"

Copied!
73
0
0

Loading.... (view fulltext now)

Full text

(1)

Unit 4

Syllabus

Multiplexing

Switching: Circuit switched networks, Data gram networks, Virtual circuit networks

Dial up modems,

DSL

Error Detection and Correction: Block coding, cyclic codes, Linear block codes

(2)

Multiplexing

Needed when bandwidth requirements are more than available bandwidth

Multiplexing is set of techniques that allowsimultaneous

transmission ofmultiple signals acrosssingle data link

(3)

Multiplexing

Input lines are fed toMultiplexer(MUX).

MUX combines multiple input line to single stream of data

At output end, The stream is fed to aDemultiplexer(DEMUX)

(4)

Categories of Multiplexing

(5)

FDM

Analog multiplexing technique

For digital signals, they must be converted to analog signals first

(6)

FDM

Individual signals modulates different carrier frequencies

Each carrier frequency is separated by a guard band (unused bandwidth) to prevent signals from overlapping

In addition, choice of carrier frequencies must ensure that they do not interfere with data being carried

(7)

FDM: Modulation process

(8)

FDM: Demodulation process

(9)

Guard Bands

(10)

Application of FDM

AM broadcasting

AM radio = 530−1700KHz

Each radio station needs 10KHzofbandwidth

Each station uses different carrier frequency i.e. shifting its signal and multiplexes

This combined signals and transmitted Receiver filters the signals as per need

FM broadcasting

88−108MHz

(11)

To Do!

Simple numerical problems at Page 158−159 will give a better

(12)

WDM

WDM and FDM is similar since frequency and wavelength are related by the relation

λ= c

µ

Mostly used for optical fibers

Splitting and combining light sources are done using prisms

(13)

Time Division Multiplexing

Digital Multiplexing technique

Analog data should be digitized prior of TDM

Instead of sharing portion of bandwidth, time is shared

(14)

Synchronous TDM

In synchronous TDM scheme, each input connection has an allotment in the output,even if it is not sending data

Data flow much be chopped into aunit

Unit can be a bit, a character or block of data

(15)

Synchronous TDM example

If the input time slot is T seconds then output time slot is Tn seconds

wheren is number of channels

A round of data from all units is collected as a frame

Data rate of output link must be n times the data rate of input

connections to guarantee the flow of data

(16)

TDM numericals

(17)

Switching

A switched network consists of a series of interlinked nodes called

switches

Switches are devices capable of creating a temporary connection

(18)

Switching

(19)

Methods of switching

(20)

Switching and TCP/IP layers

Physical layer

Circuit switching only

Data-link layer

Packet switching Packet isframes/cells Virtual switching method

Network Layer

Packet Switching

Currently internet uses Datagram methods but its is being moved to Virtual switching method

Application layer

(21)

Circuit switching

(22)

Circuit Switching

(23)

Working of circuit switched network

Case: A→ M communication

Setup phase

A send request of connection to M

Must be accepted by all switches in path and M itself Hence acircuit/path is reserved on each link

Combination of dedicated circuits defines the dedicated transmission path

Data transfer phase

Data is transmitted along the defined circuits

Since transfer is at physical layer, so data is not packeted

No addressing involved during data transfer even though there is an end-to-end addressing for nodes during setup phase

Switches route data based on their occupied band (FDM) or time slot(TDM)

Tear-down phase

(24)

Efficiency

Low efficiency

Resourced are locked for the period of transfer

(25)

Time delay

Minimal Delay

(26)

Delay

Total delay = time for (creating connection + transfer data + disconnect the circuit)

There is no hold-up time at nodes

(27)

Packet Switching

In this technique, data is framed into packetsof fixed orvariable

sizes.

Size of packet is governed by network and governing protocol

No resource allocation for the packet

No reserved bandwidth

No time scheduling for the process

Resources are allocated on demand onfirst-come-first-served basis

When a switch receives a packet, if other apckets are being processed, it must wait.

Two types:

(28)

Datagram Networks

Each packet (=datagram) is treated individual of each other

(29)

Datagram Network

Works atnetwork layer

Switches in datagram network are traditionally calledrouters

As one can see from figure, packets may arrive at destination in

out-of-orderfashion.

Packets may also be lost of dropped because of a lack of resource

Connectionless network

Router does not keep information about their connection state There is no set-up and tear-down phase

(30)

Routing table

Each router has a routing table dynamic and updated periodically

(31)
(32)

Destination address

Every datagram contain header

header contains destination address

routers examines it and consults routing table to find appropriate port for forwarding

Destination address remains same all through the journey

(33)

Efficiency and Delay

Efficiency

Efficiency is better than circuit switched network as resources are allocated only on-demand

Delay

Although there are no set-up and tear-down phases, packets may experience long delay periods for availability of resources

(34)

Delay in datagram network

(35)

Virtual Switched Networks

Cross between circuit switched network and datagram network

Set-up, transfer and tear-down phase exist

Resources can be allocated either during setup phase (similar to circuit-switched) or on-demand (datagram).

Data is packeted carrying address in header Two types of addressing

Local addressing= local jurisdiction

Global addressing= end-to-end jurisdiction

Address has local jurisdiction only i.e. it just has information about next switch and port

All packets follow the same path established during connection (same as circuit switched network)

(36)

Virtual Switched Networks

(37)

Virtual Switched Identifier

Unlike global address, VCI is just a small number used by a frame between two switches

At arrival and during departure, VCI’s are different

(38)

Three phases

Set-up phase

Data transfer phase

(39)

Source to destination data transfer

(40)

Source to destination data transfer

Suppose end-to-end transmission isA→B

Two steps:

Setup request Acknowledgment

Set-up request

Source A sends a setup frame to switch 1 Switch 1 receives frame and analyzes

Frame is goingA→B through port 3

Switch creates an entry in its table for virtual circuit and fills three of four data points:

Incoming port (1)

Chooses available incoming VCI outgoing port (3)

Frame is forwarded to switch 2 through port 3 and it repeats the steps

Acknowledgement

(41)

Process of setup phase

(42)

Process of setup phase

(43)

Process of data transfer

(44)

Tear-down phase

After sending all frames, Source A sends a special frame called a

tear-down request

Destination B responds with a tear-down confirmation frame

(45)

Delay and efficiency

(46)

MODEMS

MODEM stands for Modulator-Demodulator

A modulator creates a bandpass analog signal from binary data

(47)

Dial-up MODEMS

Telephone lines can carry voice data for frequencies between

300−3300Hz, thus a bandwidth of 3000Hz

600−3000Hz i.e a bandwidth of 2400Hz can be used for data

MODEMS are used to transmit digital data over telephone lines

(48)

MODEM usage in communication

Input computer sendsdigital data to modulator in MODEM which

converts it inanalogform

Analog data is communicated using telephone line.

Output MODEM demodulates this analog data todigital data nd

feeds it to output computer

Communication can be bi-directional

(49)

DSL

When MODEM based communication reached its peak data rate, telephone companies devised new technology termed DSL (Digital Subscriber Line)

DSL is a set of technologies like ADSL, VDSL, HDSL and SDSL.

ADSL = Asymmetric DSL

The term asymmetric essentially indicates that data rate in

downstream is more than data rate for upsteam direction of data flow. It uses existing local loop (existing telephone lines)

(50)

ADSL

Twisted pair cables used in telephone lines are capable of 1.104MHz

Filters are usually installed limiting the bandwidth to 4KHz which is

sufficient for voice communication

These filters are removed in this case

1.104 is subdivided into 3 channels as follows:

0−4Kz = voice communication 26−108KHz Upstream

138−1104KHz Downstream

(51)

ADSL channels

(52)

ADSL

(53)

ADSL

(54)

Error Detection and correction

Errors are changes in bit patterns at generation, during transmission and/or during interpretation

Two types:

Single-bit error

Only one bit of a given data (byte, character or packet) is corrupted where 0 and 1 gets interchanged

Burst error

2 or more bits change their bit values

Redundancy

Some extra bits are added by sender and removed by receiver Redundant bits are added within data bits according to a rule This rule is shared between sender and receiver

(55)

Types of errors

(56)

Error Coding

Redundancy is achieved via various coding schemes Coding schemes are broadly divided in two categories:

Block coding Convolution coding

(57)

Block Coding

Message is divided into blocks (of say k bits)

k bit long blocks are called datawords

r redundant bits are added to dataword to make its lengthn=k+r

(58)

Block Coding

Basic idea:

k bit dataword makes 2k dataword combinations

n bit codeword makes 2n codeword combinations

n>k ⇒number of possible codewords are more than number of

possible datawords

Block coding process isone-to-onei.esame dataword is always

encoded as same codeword

2n−2k codewords are never used

These codewords are called invalidsor illegal

Error detection includes:

(59)

Block coding

(60)

Block coding

(61)

Hamming distance

Hamming distance between two wordsof same size is the number of

differences between corresponding bits

It is written as d(x,y)

It can be found by applying XOR operator ⊕

Examples:

d(111,100) = 111⊕100 = 011 so hamming distance is 2 (number of

1’s)

(62)

Hamming distance and error detection

Hamming distance gives an idea about number of corrupted bits within transmission

In a set of codewords, dmin represents the minimum hamming

distance between all possible pair of codes

Lets say we can detect upto s errors

Ifs errors occurred during transmission,dmin=s

If our system detects upto s errors, minimum distance between valid

codewords must be s+ 1 so that they do not match with valid

codewords

Rephrasing, if the minimum distance between all valid codewords is

s+ 1, the received codeword cannot be erroneously mistaken for

(63)

Linear block code

A linear block code is one in which the XOR (addition modulo-2) of two valid codeword creates another codeword

Example

S. No. Dataword Codeword

1 00 000

2 01 011

3 10 101

4 11 110

Table: Linear coding scheme where similar Dataword bits adds 0 and dis-similar Data word bits adds 1

(64)

Linear block code

dmin is number of 1’s in the nonzero valid codeword with smallest

number of 1’s

(65)

Parity Check

It is a linear block code

If dataword isk bit thenn =k+ 1

Parity bit is added tomake the total number of 1’s even

(66)

Parity Check Example

S. No. Dataword Codeword

1 0000 00000

2 0001 00011

3 0010 00101

4 0011 00110

... ... ...

16 1111 11110

Table:Parity Check example

(67)

Graphical representation

(68)

Generation of parity bit

Generator takes a copy of 4 bit dataword ((a0,a1,a2,a3))

Generates a parity bitr by adding (modulo-2) them

r =a3+a2+a1+a0

r is zero if number of 1’s are even and 0 otherwise

At reception, same procedure is performed on 5 bits

The result is calledSyndrome

s0 =b3+b2+b1+b0+q0

s0 = 0 when number of 1’s in received codeword is even and 1

otherwise

s0 is passed to decision logic analyzer. If s0 ⇒No detectable error

(69)

Cyclic codes

Cyclic codes are linear codes with an extra feature: if a codeword is cyclically shifted then it results in another codeword

Ex: If 1011000 is cyclically shifted then it results in 0110001 which is also a codeword

If first word is a0 to a6 and second word isb0 to b6 then shifting means:

b1=a0

b2=a1

b3=a2

b4=a3 b5=a4

b6=a5

(70)
(71)

Division in CRC encoder

(72)

CRC

(73)

Checksum

Its an error detecting technique which can be applied to a message of any length

Its used by network and transport layers rather than data-link layer Method:

Message of divided intom-bit units

Generator produces extram-bit unit calledchecksum

Receiver creates a new checksum

If the new checksum is all 0’s, message is accepted and discarded otherwise

Practically, checksum need not be added at the end of message, it can be inserted in between too.

References

Related documents

Одредити интензитет вектора положаја материјалне тачке чије су координате (1,4,-8). Израчунати пређени пут и средњу брзину аутомобила.. Аутомобил

Field of Study: Student enrolled in any distance education course at Newman Theological College. Eligibility: Full or part-time student living in a Northern

Still thinking of the last full week of work, record the total number of two-way trips (leaving work and then returning) that you made during work hours which were at least

The multi-borehole analysis endorses the findings made from the single-borehole heat exchanger analyses relating to the import- ance of gaining a thorough understanding the

The proposed l 1 -POFR algorithm integrates (i) the model regressor selection based on minimizing the LOOMSE; (ii) regularization parameter optimization also based on minimizing

Type of contact Cable length Voltage drop U at.. Imax DC switching

Comparisons with Binary Images: As the original spatial pooling algorithm (BSP) was unable to converge on the greyscale images, we ran a separate ex- periment using the same set

Na tentativa de conservar o maior número de plantas com importância forrageira respeitando a forma de manejo utilizada pelos produtores rurais da região do Alto Camaquã, foi