Notes 1
Notes 1
GMRIT/ADM/F-44
Rajam, AP
REV.: 00
(An Autonomous Institution Affiliated to JNTUGV, AP)
1. Objective
• Understand Fundamentals: The course aims to provide students with a solid understanding
of the fundamental concepts, principles, and models of data communication.
3. 2D Mapping of ILOs with Knowledge Dimension and Cognitive Learning Levels of RBT
Teaching Methodology
4. Deliverables
In data communication, Data can take many forms and represent various types of
information, including text, numbers, images, audio, and videos etc. between different
users, computers, or devices.
1. Message
2. Sender
3. Receiver
4. Transmission Medium (Channel)
5. Protocol (set of rules)
Types of Standards
De Facto Standard: The meaning of the work “De Facto” is “By Fact”. These are the
standards that have not been approved by any Organization.
E.g., Apple & Google are two companies which established their own rules on their
products which are different. Also, they use some same standard rules for manufacturing
for their products.
De Jure Standard: The meaning of the word “De Jure” is “By Law”. These are the standards
that have been approved by officially recognized body like ANSI, ISO, IEEE etc. These are
the standard which are important to follow if it is required or needed.
E.g., All the data communication standard protocols like SMTP, TCP, IP, UDP etc. are
important to follow the same when we needed them
• The World Wide Web Consortium (W3C) – The World Wide Web Consortium,
commonly known as W3C, is an international consortium or organization dedicated
to developing and maintaining standards and specifications for the World Wide
Web.
What is Network?
What is Internet?
• The Internet, often simply referred to as "the Internet," is a vast global network of
interconnected computer networks.
• An intranet is a private, internal network within an organization that uses the same
technologies and protocols as the Internet but is limited to internal use.
The OSI (Open Systems Interconnection) Reference Model is composed of seven layers, each
specifying particular network functions. The process of breaking up the functions or tasks of
networking into layers reduces complexity. Each layer provides a service to the layer above it
in the protocol specification. Each layer communicates with the same layer’s software or
hardware on other computers. The lower 4 layers (transport, network, data link and physical
— Layers 4, 3, 2, and 1) are concerned with the flow of data from end to end through the
network.
The upper four layers of the OSI model (application, presentation and session — Layers 7, 6
and 5) are orientated more toward services to the applications. Data is Encapsulated with the
necessary protocol information as it moves down the layers before network transit.
Layer 1 (Physical Layer) - The Physical layer is responsible for MOVEMENTS OF INDIVIDUAL
BITS from one node to the next.
Layer 3 (Network Layer) - The network is responsible for the delivery of INDIVIDUAL
PACKETS from the source host to the destination host.
⎯ Whereas the data link layer oversees the delivery of the packet between two systems on
the same network (links), the network layer ensures that each packet gets from its point
of origin to its final destination.
⎯ Logical addressing
⎯ Routing
⎯ IP protocol service
Layer 6 (Presentation Layer) - The presentation layer is concerned with the SYNTAX AND
SEMANTICS OF THE INFORMATION exchanged between two systems.
⎯ Data Compression
⎯ Data Conversion
⎯ Data Encryption and Decryption
Layer 7 (Application Layer) - The application layer enables the user, whether human or
software, to access the network.
⎯ File Transfer, Access and management
⎯ Mail Services
⎯ Directory Services
⎯ It works with set of protocols like FTP, HTTP, SMTP, TELNET, DNS, WWW etc.,
• Data is transferred in the form of bits between two or more digital devices.
• There are two methods used to transmit data between digital devices: serial
transmission and parallel transmission.
• Serial data transmission sends data bits one after another over a single channel.
• Parallel data transmission sends multiple data bits at the same time over multiple
channels.
• When data is sent or received using serial data transmission, the data bits are organized
in a specific order, since they can only be sent one after another.
• The order of the data bits is important as it dictates how the transmission is organized
when it is received.
• It is viewed as a reliable data transmission method because a data bit is only sent if the
previous data bit has already been received.
Asynchronous Serial Transmission - Data bits can be sent at any point in time.
• Stop bits and start bits are used between data bytes to synchronize the transmitter and
receiver and to ensure that the data is transmitted correctly.
• The time between sending and receiving data bits is not constant, so gaps are used to
provide time between transmissions.
• The advantage of using the asynchronous method is that no synchronization is required
between the transmitter and receiver devices.
• It is also a more cost-effective method. A disadvantage is that data transmission can be
slower, but this is not always the case.
Synchronous Serial Transmission – Data bits are transmitted as a continuous stream in time
with a master clock.
• The data transmitter and receiver both operate using a synchronized clock frequency;
therefore, start bits, stop bits, and gaps are not used.
• This means that data moves faster and timing errors are less frequent because the
transmitter and receiver time is synced.
• However, data accuracy is highly dependent on timing being synced correctly between
devices.
• In comparison with asynchronous serial transmission, this method is usually more
expensive.
• When data is sent using parallel data transmission, multiple data bits are transmitted
over multiple channels at the same time.
• This means that data can be sent much faster than using serial transmission methods.
• Given that multiple bits are sent over multiple channels at the same time, the order in
which a bit string is received can depend on various conditions, such as proximity to the
data source, user location, and bandwidth availability. Two examples of parallel
interfaces can be seen below.
• In the first parallel interface, the data is sent and received in the correct order.
• In the second parallel interface, the data is sent in the correct order, but some bits were
received faster than others.
• It is easier to program;
• Data is sent faster.
A Data Communication circuit can be described in terms of circuit configuration and transmission
mode. Circuit Configurations Data Communication networks can be generally categorized into two
ways.
1. Point-to-Point configuration - This circuit involves the transfer of digital information between
a mainframe computer and a personal computer, two mainframe computers or two Data
Communication networks.
2. Multipoint configuration - A multi-point network is generally used to interconnect a single
mainframe computer (host) to many personal computers or to interconnect many personal
computers and capacity of the channel is either Spatially shared: Devices can use the link
simultaneously or Timeshare: Users take turns
Transmission Modes:
3. Full-duplex mode (FDX), both stations can transmit and receive simultaneously. One
common example of full-duplex communication is the telephone network. The full-duplex
mode is used when communication in both directions is required all the time. The capacity of
the channel must be divided between the two directions.
What is Signal?
A signal is an electrical or electromagnetic current that is used for carrying data from one device or
network to another.
• Communication
• Computing
• Networking
• Electronic devices
For example, the Human voice can be considered an analog signal because the signal of the human
voice flows in a continuous manner.
Digital Signal: It is a physical signal that is represented by two discrete values “0” & “1”, these
discrete values are known as bitstream. In simple words, we can say that the binary signals are known
as “Digital signals” where the signals are converted into a small bit form which is represented by a
series of “0” & “1”.
Signal Analysis: Signal Analysis involves the ability to collect and understand sensitive
information sent via various signals. This analysis is critical to ensure the reliable transmission
of data and to detect and correct any errors or disturbances that may occur during
transmission.
Electrical Noise: Noise is an unwanted signal which interferes with the original message signal
and corrupts the parameters of the message signal. This alteration in the communication
process makes the message to get altered after reaching. It is most likely to be entered at the
channel or the receiver.
Types of Noise: The classification of noise is done depending upon the type of source, the
effect it shows or the relation it has with the receiver etc.
There are two main ways of which noise gets produced. One is through some external source
while the other is created by the internal source, within the receiver section.
External Source - This noise is produced by the external sources which may occur in the
medium or channel of communication, usually. This noise can’t be completely eliminated. The
best way is to avoid the noise from affecting the signal.
Internal Source - This noise is produced by the receiver components while functioning. The
components in the circuits, due to continuous functioning, may produce a few types of noise.
This noise is assessable. A proper receiver design may lower the effect of this internal noise.
Examples - Thermal agitation noise; Shot noise (due to the random movement of electrons and
holes); Transit-time noise (during the transition); Miscellaneous noise is another type of noise
which includes flicker, resistance effect, and mixer generated noise, etc.
Information Capacity:
Baud rate: Baud rate is the rate at which the number of signal elements or changes to the signal
occurs per second when it passes through a transmission medium. The higher a baud rate is the
faster the data is sent/received.
M-ary Encoding:
For example, a digital signal with four possible conditions (amplitude, frequency, phase, and so
on) is an M-ary system where M = 4. If there are eight possible conditions, M = 8 and etc.
Where,
Analog and digital modulation are techniques used in communication systems to transmit information
over a channel by varying certain characteristics of a carrier signal. These modulation techniques are
fundamental to both analog and digital communication.
Analog Modulation: Analog modulation involves varying the amplitude, frequency, or phase of a carrier
signal in proportion to an analog signal (continuous waveform) to convey information. Here are the
three main types of analog modulation:
• Amplitude Modulation (AM): In AM, the amplitude of the carrier signal is modulated to
represent the information signal. The amplitude of the carrier varies in accordance with the
instantaneous amplitude of the input signal.
E.g., AM is commonly used in amplitude-modulated radio broadcasting.
• Frequency Modulation (FM): In FM, the frequency of the carrier signal is modulated to
represent the information signal. The frequency of the carrier varies in response to the
instantaneous frequency of the input signal.
E.g., FM is used in FM radio broadcasting and analog television.
• Phase Modulation (PM): In PM, the phase of the carrier signal is modulated by the information
signal. Changes in the phase of the carrier signal correspond to variations in the input signal's
phase.
E.g., It was used in some sort of analog communication
Analog modulation is often used for transmitting analog signals, such as voice or music, over
communication channels. However, it is susceptible to noise and interference and has limited capacity
for data compression and error correction.
Digital Modulation: Digital modulation involves converting digital data (discrete, binary values) into a
format suitable for transmission over a communication channel. Digital modulation schemes are
designed to efficiently represent digital information using specific modulation techniques.
• Binary Phase-Shift Keying (BPSK): BPSK modulates the phase of the carrier signal to
represent binary data (0s and 1s). It is widely used in digital communication systems.
• Quadrature Phase-Shift Keying (QPSK): QPSK extends BPSK by encoding two bits per symbol
using four phase angles. Each symbol represents two bits.
• Quadrature Amplitude Modulation (QAM): QAM combines both amplitude and phase
modulation to represent multiple bits per symbol. Common variants include 16-QAM and 64-
QAM.
• Frequency-Shift Keying (FSK): FSK modulates the carrier signal's frequency to represent
binary data.
• Amplitude-Shift Keying (ASK): ASK modulates the carrier signal's amplitude to represent
binary data.
5. Keywords
Remember:
Understand:
1. How can you justify whether signals transmission is adopted for data
communication in real world application
8. Mind Map
9. Student Summary
At the end of this session, the facilitator (Teacher) shall randomly pick-up few students to
summarize the deliverables. We need to taught how IoT is useful for future real
applications and how it reduces the human involvement in data transmission.
Till this is useful for getting basic knowledge of data communication that how data was
transmitted in the channel