46
MTI -UI Ganjil 2009/2010 1 Chapter 2 Data Communications Concepts

Jkkd Mti-ui Ch02

  • Upload
    mgrin30

  • View
    227

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 1/46

MTI - UI Ganjil 2009/2010 1

Chapter 2

Data Communications Concepts

Page 2: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 2/46

MTI - UI Ganjil 2009/2010 2

Data Digitization The process of process of transforming

humanly readable characters into

machine readable code is character encoding. 

Characters are turned into a series of 

ones and zeroes. 

The most commonly used standards are ASCII, EBCDIC, and UNICODE

Page 3: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 3/46

MTI - UI Ganjil 2009/2010 3

7-Bit ASCII Code table

�Ascii encoding is used on most computers today

Page 4: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 4/46

MTI - UI Ganjil 2009/2010 4

EBCDIC Code Table

� EBCDIC is used on IBM Mainframes

Page 5: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 5/46

MTI - UI Ganjil 2009/2010 5

Serial vs. Parallel Data Transmission

Page 6: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 6/46

MTI - UI Ganjil 2009/2010 6

Serial vs. parallel Data Transmission

Transmission

Characteristic

Serial Parallel

Transmission Description One bit after another, one at a

time

 All bits in a single character  

transmitted simultaneously

Comparative Speed Slower Faster  

Distance Limitation Farther Shorter  

Application Between two computers, fromcomputers to external devices,local and wide area networks

Within a computer along thecomputer¶s busses, between adrive controller and a hard drive

Cable Description  All bits travel down a single wire,one bit at a time

Each bit travels down its ownwire simultaneously with other bits.

Page 7: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 7/46

MTI - UI Ganjil 2009/2010 7

Synchronous vs. Asynchronous

transmission

Page 8: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 8/46

MTI - UI Ganjil 2009/2010 8

Modulation vs. demodulation

This process is done by a mo(dulator)dem(odulator)

Page 9: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 9/46

MTI - UI Ganjil 2009/2010 9

Modem based communication channels

The dial-up modem allows connections throughthe phone network

Page 10: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 10/46

MTI - UI Ganjil 2009/2010 10

Half vs. full duplex

Data communications sessions are bi-directional in nature. 

There are two environments available for handling this bi-directional traffic: full and half duplex. 

In a full duplex communications environment

both devices can transmit at the same time.  In a half duplex environment you can only

hear or  talk at any given point in time. 

Given the choice of full or half duplex it is

usually better to choose full duplex.

Page 11: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 11/46

MTI - UI Ganjil 2009/2010 11

Carrier Wave

There are three properties of a wave that canbe modulated or altered:

 Amplitude

Frequency

Phase

Page 12: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 12/46

MTI - UI Ganjil 2009/2010 12

 Amplitude Modulation

Each vertical lines separates opportunities to identifya 1 or 0 from another . 

These timed opportunities are known as signalingevents. 

The proper name for one signaling event is a baud

Page 13: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 13/46

MTI - UI Ganjil 2009/2010 13

Frequency Modulation

f requency shif t keying or FSK

Page 14: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 14/46

MTI - UI Ganjil 2009/2010 14

Phase Modulation

phase shif t keying or PSK

Page 15: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 15/46

MTI - UI Ganjil 2009/2010 15

Detecting Phase Shifting

Quadrature Phase Shift Keying

Page 16: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 16/46

MTI - UI Ganjil 2009/2010 16

Increasing transmission efficiency

There are two ways in which a given

modem can transmit data faster:

increase the signaling events per second,

or baud rate.

find a way for the modem to interpret more

than one bit per baud.

Page 17: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 17/46

MTI - UI Ganjil 2009/2010 17

Differential Quadrature Phase Shift keying

This technique improves transmission rate byincreasing the number of events per baud

Page 18: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 18/46

MTI - UI Ganjil 2009/2010 18

Data Compression

Data compression techniques improvethroughput.

Page 19: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 19/46

MTI - UI Ganjil 2009/2010 19

Data compression The sending device replaces strings of 

repeating character patterns with a

special code that represents the pattern.  The code is significantly smaller than

the pattern it represents. 

This results in the amount of data sentbetween the sending device and the

receiving device to increase.

Page 20: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 20/46

MTI - UI Ganjil 2009/2010 20

Packetization The process of dividing the data steam

flowing between devices into structured

blocks known as packets. 

 A packet is a group of bits organized in

a pre-determined, structured manner 

consisting of a piece of the data streamto which management information is

added.

Page 21: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 21/46

MTI - UI Ganjil 2009/2010 21

Packetization

This data stream is divided into 3 packets

Note the addition of header information to the dataportion

Page 22: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 22/46

MTI - UI Ganjil 2009/2010 22

Packetization The predetermined structure of a

packet is critical.

Through the use of standards, devicesknow the number of bits in eachsection; the header, data portion and

trailer.

Page 23: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 23/46

MTI - UI Ganjil 2009/2010 23

Encapsulation / De-encapsulation

In a layered protocol, each layer adds aheader according to the layers syntax.

The sending device adds thisinformation in a process of encapsulation

The receiving device reverses the thisprocess (de-encapsulation)

Page 24: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 24/46

MTI - UI Ganjil 2009/2010 24

Encapsulation / De-encapsulation in the OSI model

Page 25: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 25/46

MTI - UI Ganjil 2009/2010 25

Multiplexing

Page 26: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 26/46

MTI - UI Ganjil 2009/2010 26

Frequency Division Multiplexing

Page 27: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 27/46

MTI - UI Ganjil 2009/2010 27

Time Division Multiplexing

Page 28: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 28/46

MTI - UI Ganjil 2009/2010 28

Statistical Time Division

Multiplexing

Page 29: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 29/46

MTI - UI Ganjil 2009/2010 29

Switching

Switching allows temporary connections to beestablished, maintained and terminatedbetween sources and destinations

Page 30: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 30/46

MTI - UI Ganjil 2009/2010 30

Circuit Switching The work to create a signal path is done up

front; a switch fabric creates a direct path

between the source and the destination. Communication takes place just as if the

temporary circuit were a permanent direct connection:

The switched dedicated circuit makes it appear to the user of the circuit as if a wirehas been run directly between thecommunicating devices.

Page 31: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 31/46

MTI - UI Ganjil 2009/2010 31

Packet switching In a packet switched network, packets of 

data travel one at a time from the message

source to the message destination. The physical path taken by one packet may

be different than that taken by other packetsin the data stream.

The path is unknown to the end user.  A series of packet switches pass packets

among themselves as they travel from sourceto destination

Page 32: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 32/46

MTI - UI Ganjil 2009/2010 32

Datagram Delivery

Page 33: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 33/46

MTI - UI Ganjil 2009/2010 33

Connectionless vs. Connection-Oriented

Networks

Page 34: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 34/46

MTI - UI Ganjil 2009/2010 34

The error detection process

Page 35: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 35/46

MTI - UI Ganjil 2009/2010 35

Error detection process ·The transmitting and receiving devices agree on how

the error check is to be calculated

· The transmitting device calculates and transmits theerror check along with the transmitted data

· The receiving device re-calculates the error check

based on the received data and compares its newly

calculated error check to the error check received

with the data

·If the two error checks match, everything is fine. If 

they do not match, an error has occurred

Page 36: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 36/46

MTI - UI Ganjil 2009/2010 36

Parity Checking

Simple parity checking

Page 37: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 37/46

MTI - UI Ganjil 2009/2010 37

Parity Checking

Parity checks can miss multiple bit errors

Page 38: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 38/46

MTI - UI Ganjil 2009/2010 38

 Alternatives to parity

LRC improves parity checking at the cost of extra data transmitted

Page 39: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 39/46

MTI - UI Ganjil 2009/2010 39

Error Control Techniques Error Prevention

Error Detection

Page 40: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 40/46

MTI - UI Ganjil 2009/2010 40

Error detection techniques yParity (VRC)

yLongitudinal Redundancy Checks (LRC)

yChecksums

yCyclic Redundancy Checks (CRC)

Page 41: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 41/46

MTI - UI Ganjil 2009/2010 41

Parity

Parity, also known as a (VerticalRedundancy Check or  VRC), is thesimplest error detection technique.

Parity works by adding an error check

bit to each character.

Page 42: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 42/46

MTI - UI Ganjil 2009/2010 42

Longitudinal Redundancy

Checks

Longitudinal Redundancy Checks(LRC) seek to overcome the weaknessof simple, bit-oriented one directionalparity checking..

LRC adds a second dimension to parity.

Page 43: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 43/46

MTI - UI Ganjil 2009/2010 43

Checksums Checksums are also block-oriented error detection

characters added to a block of data characters. 

a checksum is calculated by adding the decimal facevalues of all of the characters sent in a given data

block and sending only the least significant byte of 

that sum. 

The receiving modem generates its own checksum

and compares the locally calculated checksum withthe transmitted checksum

Page 44: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 44/46

MTI - UI Ganjil 2009/2010 44

Error Correction The receiving device detects the error 

and requests a re-transmission

The sending device then retransmits the

the portion that contained the error .

Page 45: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 45/46

MTI - UI Ganjil 2009/2010 45

Flow Control To prevent buffer overflows the receiving

device sends a signal to the sending device

The flow control software constantly monitorsthe amount of free space available in buffer 

memory and tells the sending device to stop

sending data when there is insufficient

storage space. 

When the buffer once again has room the

sending device is told to resume transmitting

Page 46: Jkkd Mti-ui Ch02

8/6/2019 Jkkd Mti-ui Ch02

http://slidepdf.com/reader/full/jkkd-mti-ui-ch02 46/46

MTI - UI Ganjil 2009/2010 46

Copyright 2004 John Wiley &

Sons, Inc. All rights reserved. Reproduction or translation of this

work beyond that permitted in section 117 of the 1976

United States Copyright Act without express permission

of the copyright owner is unlawful. Request for further information should be addressed to the Permissions

Department, John Wiley & Sons, Inc. The purchaser 

may make back-up copies for his/her own use only and

not for distribution or resale. The Publisher assumes no

responsibility for errors, omissions, or damages causedby the use of these programs or from the use of the

information herein