Friday, September 19, 2014

Periodic and Non-Periodic Signal


A signal which repeats itself after a specific interval of time is called periodic signal. A signal which does not repeat itself after a specific interval of time is called aperiodic signal.

A signals that repeats its pattern over a period is called periodic signal, 


A signal that does not repeats its pattern over a period is called aperiodic signal or non periodic. 


Continuous time signals are said to be periodic.Get over in limited time called aperiodic or non periodic...

Both the Analog and Digital can be periodic or aperiodic. but in data communication periodic analog sigals and aperiodic digital signals are used.




Tuesday, September 16, 2014

Data Transmission Modes

The term Transmission Mode defines the direction of the flow of information between two communication devices i.e. it tells the direction of signal flow between the two devices.

There are three ways or modes of data transmission:


Simplex :

  • Half duplex (HDX)
  •  Full duplex (FDX)

Simplex: In Communication Networks, Communication can take place in one direction connected to such a circuit are either a send only or receive only device. There is no mechanism for information to be transmitted back to the sender. Communication is unidirectional. TV broadcasting is an example. Simplex transmission generally involves dedicated circuits. Simplex circuits are analogous to escalators, doorbells, fire alarms and security systems:

Examples of Simplex mode:

  1. Communication between a computer and a keyboard involves simplex duplex transmission. A television broadcast is an example of simplex duplex transmission.
2. Another example of simplex transmission is loudspeaker system. An announcer speaks into a microphone and his/her voice is sent through an amplifier and then to all the speakers.
3. Many fire alarm systems work the same way.
                              Simple Transmission
Half Duplex: A half duplex system can transmit data in both directions, but only in one direction at a time that mean half duplex modes support two-way traffic but in only one direction at a time. The interactive transmission of data within a time sharing system may be best suited to half-duplex lines. Both the connected devices can transmit and receive but not simultaneously. When one device is sending the other can only receive and vice-versa. Data is transmitted in one direction at.a time, for example. a walkie-talkie.
This is generally used for relatively low-speed transmission, usually involving two-wire, analog circuits. Due to switching of communication direction, data transmission in this mode requires more time and processes than under full duplex mode. Examples of half duplex application include line printers, polling of buffers, and modem commuriications (many modems can support full duplex also).
                          Half Duplex Mode
Example of half duplex mode:

A walkie-talkie operates in half duplex mode. It can only send or receive a transmission at any given time. It cannot do both at the same time.

As shown in fig. computer A sends information to computer B. At the end of transmission, computer B sends information to computer A. Computer A cannot send any information to computer B, while computer B is transmitting data.

Full Duplex: A full duplex system can transmit data simultaneously in both directions on transmission path. Full-duplex method is used to transmit the data over a serial communication link. Two wires needed to send data over a serial communication link layer. Full-duplex transmission, the channel capacity is shared by both communicating devices at all times.
Both the connected devices can transmit and receive at the same time. Therefore it represents truly bi-directional system. The link may contain two separate transmission paths one for sending and another for receiving.

Example of Full duplex mode:

Telephone networks operate in full duplex mode when two persons talk on telephone line, both can listen and speak simultaneously.
                            Full Duplex Mode

Introduction Of OSI Model

OSI (Open Systems Interconnection) is reference model for how messages should be transmitted between any two points in a telecommunication network. A reference model is a framework for understanding relationships. Open System Interconnection, model defines a networking framework to implement protocols in seven layers. The purpose of the OSI reference model is to guide vendors and developers so that the digital communication products and software programs they create will interoperate. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. The OSI reference model defines seven layers of functions that take place at each end of a communication. Developed by representatives of major computer and telecommunication companies beginning in 1983, OSI was officially adopted as an international standard by the International Organization of Standards (ISO).


The OSI model divides telecommunication into seven layers. The layers are in two groups. The upper four layers are used whenever a message passes from or to a user. The lower three layers (up to the network layer) are used when any message passes through the host computer. Messages intended for this computer pass to the upper layers. Messages destined for some other host are not passed up to the upper layers but are forwarded to another host. The seven layers of OSI are:

Physical (Layer 1)

This layer conveys the bit stream through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier network.
The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. It describes the electrical/optical, mechanical, and functional interfaces to the physical medium, and carries the signals for all of the higher layers. It provides:


·Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to better accommodate the characteristics of the physical medium, and to aid in bit and frame synchronization. It determines:
·Transmission technique: determines whether the encoded bits will be transmitted by baseband (digital) or broadband (analog) signaling.
·Physical medium transmission: transmits bits as electrical or optical signals appropriate for the physical medium


 Data Link (Layer 2)

At this layer, data packets are encoded and decoded into bits. This layer provides synchronization for the physical level. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. This layer responsible for moving frames from one node to another. Header defines the sender and receiver information of the frame.It also uses a mechanism to recognise duplicate data frames. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

·Link establishment and termination: establishes and terminates the logical link between two nodes.
·Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are available.
·Frame sequencing: transmits/receives frames sequentially.
·Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers from errors that occur in the physical layer by re-transmitting non-acknowledged frames and handling duplicate frame receipt.
·Frame delimiting: creates and recognizes frame boundaries.
·Frame error checking: checks received frames for integrity.
·Media access management: determines when the node "has the right" to use the physical medium.


Network (Layer 3)


This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.

The network layer controls the operation of the subnet, deciding which physical path the data should take based on network conditions, priority of service, and other factors. It provides:

·Routing: routes frames among networks.
·Subnet traffic control: routers (network layer intermediate systems) can instruct a sending station to "throttle back" its frame transmission when the router's buffer fills up.
·Frame fragmentation: if it determines that a downstream router's maximum transmission unit (MTU) size is less than the frame size, a router can fragment a frame for transmission and re-assembly at the destination station.
·Logical-physical address mapping: translates logical addresses, or names, into physical addresses.
·Subnet usage accounting: has accounting functions to keep track of frames forwarded by subnet intermediate systems, to produce billing information.


Transport (Layer 4)

This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or duplications. It relieves the higher layer protocols from any concern with the transfer of data between them and their peers.

The size and complexity of a transport protocol depends on the type of service it can get from the network layer. For a reliable network layer with virtual circuit capability, a minimal transport layer is required. If the network layer is unreliable and/or only supports datagrams, the transport protocol should include extensive error detection and recovery.

The transport layer provides:

·Message segmentation: accepts a message from the (session) layer above it, splits the message into smaller units (if not already small enough), and passes the smaller units down to the network layer. The transport layer at the destination station reassembles the message.
·Message acknowledgment: provides reliable end-to-end message delivery with acknowledgments.
· Message traffic control: tells the transmitting station to "back-off" when no message buffers are available.

Typically, the transport layer can accept relatively large messages, but there are strict message size limits imposed by the network (or lower) layer. Consequently, the transport layer must break up the messages into smaller units, or frames, prepending a header to each frame.

The transport layer header information must then include control information, such as message start and message end flags, to enable the transport layer on the other end to recognize message boundaries. In addition, if the lower layers do not maintain sequence, the transport header must contain sequence information to enable the transport layer on the receiving end to get the pieces back together in the right order before handing the received message up to the layer above.



Session (Layer 5)


The session layer allows session establishment between processes running on different stations. It provides:

·Session establishment, maintenance and termination: allows two application processes on different machines to establish, use and terminate a connection, called a session.
·Session support: performs the functions that allow these processes to communicate over the network, performing security, name recognition, logging, and so on.


Presentation (Layer 6)


The presentation layer formats the data to be presented to the application layer. It can be viewed as the translator for the network. This layer may translate data from a format used by the application layer into a common format at the sending station, then translate the common format to a format known to the application layer at the receiving station.

The presentation layer provides:

·Character code translation: for example, ASCII to EBCDIC.
·Data conversion: bit order, CR-CR/LF, integer-floating point, and so on.
·Data compression: reduces the number of bits that need to be transmitted on the network.
·Data encryption: encrypt data for security purposes. For example, password encryption.


Application (Layer 7)

This layer supports application and end-user processes. The application layer serves as the window for users and application processes to access network services. This layer contains a variety of commonly needed functions:

·Resource sharing and device redirection
·Provides UI
·Remote file access
·Remote printer access
·Inter-process communication
·Network management
·Directory services
·Electronic messaging (such as mail)
·Network virtual terminals