0% found this document useful (0 votes)
10 views

CH 02

Uploaded by

mgrin30
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

CH 02

Uploaded by

mgrin30
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 46

Chapter 2

Data Communications Concepts


Data Digitization
 The process of process of transforming
humanly readable characters into
machine readable code is character
encoding.
 Characters are turned into a series of
ones and zeroes.
 The most commonly used standards are
ASCII, EBCDIC, and UNICODE
7-Bit ASCII Code table

•Ascii encoding is used on most computers today


EBCDIC Code Table

• EBCDIC is used on IBM Mainframes


Serial vs. Parallel Data Transmission
Serial vs. parallel Data Transmission
Transmission Serial Parallel
Characteristic

Transmission Description One bit after another, one at a All bits in a single character
time transmitted simultaneously

Comparative Speed Slower Faster

Distance Limitation Farther Shorter

Application Between two computers, from Within a computer along the


computers to external devices, computer’s busses, between a
local and wide area networks drive controller and a hard drive

Cable Description All bits travel down a single wire, Each bit travels down its own
one bit at a time wire simultaneously with other
bits.
Synchronous vs. Asynchronous
transmission
Modulation vs. demodulation

 This process is done by a mo(dulator)dem(odulator)


Modem based communication channels

 The dial-up modem allows connections through


the phone network
Half vs. full duplex

 Data communications sessions are bi-


directional in nature.
 There are two environments available for
handling this bi-directional traffic: full and half
duplex.
 In a full duplex communications environment
both devices can transmit at the same time.
 In a half duplex environment you can only
hear or talk at any given point in time.
 Given the choice of full or half duplex it is
usually better to choose full duplex.
Carrier Wave

 There are three properties of a wave that can


be modulated or altered:
 Amplitude
 Frequency
 Phase
Amplitude Modulation

 Each vertical lines separates opportunities to identify a 1


or 0 from another.
 These timed opportunities are known as signaling events.
 The proper name for one signaling event is a baud
Frequency Modulation

 frequency shift keying or FSK


Phase Modulation

 phase shift keying or PSK


Detecting Phase Shifting

 Quadrature Phase Shift Keying


Increasing transmission efficiency

 There are two ways in which a given


modem can transmit data faster:
  increase the signaling events per second,
or baud rate.
 find a way for the modem to interpret more
than one bit per baud.
Differential Quadrature Phase Shift keying

 This technique improves transmission rate by


increasing the number of events per baud
Data Compression

 Data compression techniques improve


throughput.
Data compression
 The sending device replaces strings of
repeating character patterns with a
special code that represents the pattern.
 The code is significantly smaller than
the pattern it represents.
 This results in the amount of data sent
between the sending device and the
receiving device to increase.
Packetization
 The process of dividing the data steam
flowing between devices into structured
blocks known as packets.
 A packet is a group of bits organized in
a pre-determined, structured manner
consisting of a piece of the data stream
to which management information is
added.
Packetization

 This data stream is divided into 3 packets


 Note the addition of header information to the data
portion
Packetization
 The predetermined structure of a
packet is critical.
 Through the use of standards, devices
know the number of bits in each
section; the header, data portion and
trailer.
Encapsulation / De-encapsulation
 In a layered protocol, each layer adds a
header according to the layer’s syntax.
 The sending device adds this
information in a process of
encapsulation
 The receiving device reverses the this
process (de-encapsulation)
Encapsulation / De-encapsulation in the OSI model
Multiplexing
Frequency Division Multiplexing
Time Division Multiplexing
Statistical Time Division
Multiplexing
Switching

 Switching allows temporary connections to be


established, maintained and terminated between
sources and destinations
Circuit Switching
 The work to create a signal path is done up
front; a switch fabric creates a direct path
between the source and the destination.
 Communication takes place just as if the
temporary circuit were a permanent direct
connection:
 The switched dedicated circuit makes it
appear to the user of the circuit as if a wire
has been run directly between the
communicating devices.
Packet switching
 In a packet switched network, packets of
data travel one at a time from the message
source to the message destination.
 The physical path taken by one packet may be
different than that taken by other packets in
the data stream.
 The path is unknown to the end user.
 A series of packet switches pass packets
among themselves as they travel from source
to destination
Datagram Delivery
Connectionless vs. Connection-Oriented
Networks
The error detection process
Error detection process
 ·The transmitting and receiving devices agree on how
the error check is to be calculated
 · The transmitting device calculates and transmits the
error check along with the transmitted data
 · The receiving device re-calculates the error check
based on the received data and compares its newly
calculated error check to the error check received
with the data
 ·If the two error checks match, everything is fine. If
they do not match, an error has occurred
Parity Checking

 Simple parity checking


Parity Checking

 Parity checks can miss multiple bit


errors
Alternatives to parity

 LRC improves parity checking at the cost of extra data


transmitted
Error Control Techniques
 Error Prevention
 Error Detection
Error detection techniques
 Parity (VRC)
 Longitudinal Redundancy Checks (LRC)
 Checksums
 Cyclic Redundancy Checks (CRC)
Parity

 Parity, also known as a (Vertical


Redundancy Check or VRC), is the
simplest error detection technique.
 Parity works by adding an error check
bit to each character.
Longitudinal Redundancy
Checks

 Longitudinal Redundancy Checks


(LRC) seek to overcome the weakness
of simple, bit-oriented one directional
parity checking..
 LRC adds a second dimension to parity.
Checksums
 Checksums are also block-oriented error detection
characters added to a block of data characters.
 a checksum is calculated by adding the decimal face
values of all of the characters sent in a given data
block and sending only the least significant byte of
that sum.
 The receiving modem generates its own checksum
and compares the locally calculated checksum with
the transmitted checksum
Error Correction
 The receiving device detects the error
and requests a re-transmission
 The sending device then retransmits the
the portion that contained the error.
Flow Control
 To prevent buffer overflows the receiving
device sends a signal to the sending device
 The flow control software constantly monitors
the amount of free space available in buffer
memory and tells the sending device to stop
sending data when there is insufficient
storage space.
 When the buffer once again has room the
sending device is told to resume transmitting
Copyright 2004 John Wiley &
Sons, Inc.
All rights reserved. Reproduction or translation of this
work beyond that permitted in section 117 of the 1976
United States Copyright Act without express permission
of the copyright owner is unlawful. Request for further
information should be addressed to the Permissions
Department, John Wiley & Sons, Inc. The purchaser
may make back-up copies for his/her own use only and
not for distribution or resale. The Publisher assumes no
responsibility for errors, omissions, or damages caused
by the use of these programs or from the use of the
information herein

You might also like