SlideShare ist ein Scribd-Unternehmen logo
1 von 26
DATA COMMUNICATIONS &
          NETWORKING
           LECTURE-08

         Course Instructor : Sehrish Rafiq
         Department Of Computer Science
                  University Of Peshawar
LECTURE OVERVIEW
   Conversion methods
   Line coding
   Characteristics of line coding
   Signal level & Data Level
   Pulse Rate & Bit Rate
   DC Component
   Self Synchronization
   Line coding Schemes
   Unipolar
   Polar
   NRZ
   RZ
   Manchester and Differential Manchester
   Bipolar
CONVERSION METHODS OR ENCODING &
          MODULATION
   How information is transformed depends on its original format and
    on the format used by the communication hardware.
   Conversion methods
   Digital-to-digital conversion or Line coding
   Analog-to-digital conversion or Sampling
   Digital -to- analog modulation
   Analog -to -analog modulation
LINE CODING
 Line coding is the process of converting binary data, a
  sequence of bits to a digital signal.
 In other words, line coding converts a sequence of bits to
  a digital signal.
 At the sender, digital data are encoded in to digital
  signal.
 At the receiver, the digital data are recreated by decoding
  the digital signal back in to digital data.
LINE CODING & DECODING
SIGNAL LEVEL & DATA LEVEL
   The number of values allowed in a particular signal is known
    as the number of signal levels.
   The number of values used to represent data is known as the
    number of data levels.
DATA ELEMENT VERSUS SIGNAL
             ELEMENT
 A data Element is the smallest entity that can
  represent a piece of information this is the bit.
 A signal element is the shortest unit time wise of
  a digital signal.
 In other words data elements are what we need
  to send.
 Signal elements are what we can send.

 Data elements are being carried, signal elements
  are the carriers.
 r is defined as the ratio which is the number of
  data elements carried by each signal element.
DATA ELEMENT VERSUS SIGNAL
         ELEMENT
DATA RATE VERSUS SIGNAL
             RATE
 The data rate is defined as the number of data elements
  sent in one second usually expressed in bps.
 Data rate is also called Bit rate.

 The signal rate is defined as the number of signal
  elements sent in one second.
 A signal rate is also called a pulse rate.

 A signal element is also called a symbol or pulse.

 One pulse or signal element can carry more than one bit.

 When a pulse or signal element carry only one bit then
  the bit rate and pulse rate/signal rate are same.
 The signal rate is sometimes called modulation rate or
  baud rate.
FORMULA FOR BIT RATE



Bit Rate=Pulse Rate x log2 L
Where L is the number of data Levels.
Example 1

A signal has two data levels with a pulse duration of 1
ms. We calculate the pulse rate and bit rate as follows:

Solution
Pulse Rate = 1/ 10-3= 1000 pulses/s
Bit Rate = Pulse Rate x log2 L = 1000 x log2 2 = 1000 bps
Example 2
A signal has four data levels with a pulse duration of 1
ms. We calculate the pulse rate and bit rate as follows:
 Solution
Pulse Rate = = 1000 pulses/s
Bit Rate = Pulse Rate x log2 L = 1000 x log2 4 = 2000 bps
DC COMPONENT
 When the voltage level is constant for a while very low
  frequencies are often created.
 These frequencies around zero are called DC or Direct
  Current components.
 This component is undesirable for two reasons.

 First if a signal has to pass through a system (e.g. a
    telephone line which does not allow frequencies below 200 Hz)
  which does not allow low frequencies to pass the signal
  is distorted and may create errors in the output.
 Second this component is extra energy residing on the
  line and is useless.
DC COMPONENT
SELF-SYNCHRONIZATION
 To correctly interpret the signals received from the
  sender, the receiver’s bit intervals must correspond
  exactly to the sender’s bit intervals.
 If the receiver’s clock is faster or slower, the bit intervals
  are not matched and the receiver might interpret the
  signals differently then the sender intended.
 A self synchronizing digital signal includes timing
  information in the data being transmitted.
 This can be achieved if there are transitions in the signal
  that alert the receiver to the beginning, middle or end of
  the pulse.
 If the receiver clock is out of synchronization, these
  alerting points can reset the clock.
LACK OF SYNCHRONIZATION
Example 3
In a digital transmission, the receiver clock is 0.1 percent
faster than the sender clock. How many extra bits per
second does the receiver receive if the data rate is 1
Kbps? How many if the data rate is 1 Mbps?

Solution
At 1 Kbps:
1000 bits sent 1001 bits received1 extra bps
At 1 Mbps:
1,000,000 bits sent 1,001,000 bits received1000 extra bps
LINE CODING SCHEMES
UNIPOLAR SCHEME
 Digital transmission systems work by sending voltage
  pulses along a medium link, usually a wire or cable.
 In many types of encoding, one voltage level stands for
  binary 0,another level stands for binary 1.
 The polarity of a pulse refers to whether it is positive or
  negative.
 Unipolar encoding is so named because it uses only one
  polarity.
 The polarity is assigned to one of the two binary states,
  usually the 1.
 The other state usually 0 is represented by zero voltage.
UNIPOLAR SCHEME
PROBLEMS USING UNI POLAR
             SCHEME
   DC Component
   The average amplitude of a unipolar encoded signal is non
    zero.
   This creates a DC component.

   Lack of synchronization
   If the data contain a long sequence of 0’s and 1’s there is no
    change in the signal during this duration that can alert the
    receiver to potential synchronization problems.
POLAR ENCODING SCHEMES
 Polar encoding uses two voltage levels, one positive and
  one negative.
 By using the two Levels, in most polar encoding
  methods the average voltage level on the line is reduced
  and the dc component problem seen in unipolar encoding
  is alleviated.
NRZ(NON RETURN TO ZERO)
           SCHEMES
 In NRZ encoding the value of the signal is always
  positive or negative.
 Two popular forms of NRZ are:

 NRZ-L(Non Return to Zero-Level)

 In NRZ-L the level of the signal depends on the type of
  bit that it represent.
 The positive voltage usually means a 0 while a negative
  voltage means the bit is a 1.
 Problem: Long stream of 0’s or 1’s may create
  synchronization problem.
NRZ(NON RETURN TO ZERO)
              SCHEMES
   NRZ-I(NRZ-Invert)
   In NRZ-I ,an inversion of the voltage level represents a 1 bit.
   It is the transition between a positive and negative voltage, not the
    voltage itself, that represents a 1 bit.
   A 0 bit is represented by no change.
   NRZ-I is superior to NRZ-L due to the synchronization provided by
    the signal change each time a 1 bit is encountered.
   The existence of 1’s in the data stream allows the receiver to
    synchronize its timer to the actual arrival of transmission.
   A string of 0’s can still cause problems but because they are not as
    Likely,they are less of a problem.
NRZ(NON RETURN TO ZERO)
       SCHEMES
THANKS!!   !

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Ethernet
EthernetEthernet
Ethernet
 
Pulse Modulation ppt
Pulse Modulation pptPulse Modulation ppt
Pulse Modulation ppt
 
Combinational circuits
Combinational circuits Combinational circuits
Combinational circuits
 
Lecture 09
Lecture 09Lecture 09
Lecture 09
 
Ipv6
Ipv6Ipv6
Ipv6
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Keypad Interfacing with 8051 Microcontroller
Keypad Interfacing with 8051 MicrocontrollerKeypad Interfacing with 8051 Microcontroller
Keypad Interfacing with 8051 Microcontroller
 
QUADRATURE AMPLITUDE MODULATION
QUADRATURE AMPLITUDE MODULATIONQUADRATURE AMPLITUDE MODULATION
QUADRATURE AMPLITUDE MODULATION
 
Ch 03
Ch 03Ch 03
Ch 03
 
Digital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesDigital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling Techniques
 
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
 
Delta Modulation
Delta ModulationDelta Modulation
Delta Modulation
 
Internal architecture-of-8086
Internal architecture-of-8086Internal architecture-of-8086
Internal architecture-of-8086
 
8086 micro processor
8086 micro processor8086 micro processor
8086 micro processor
 
K - Map
  K - Map    K - Map
K - Map
 
Line coding
Line codingLine coding
Line coding
 
ASk,FSK,PSK
ASk,FSK,PSKASk,FSK,PSK
ASk,FSK,PSK
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Transmission Modes in Computer Networks
Transmission Modes in Computer Networks Transmission Modes in Computer Networks
Transmission Modes in Computer Networks
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
 

Andere mochten auch (20)

05 signal encoding
05 signal encoding05 signal encoding
05 signal encoding
 
Line coding
Line codingLine coding
Line coding
 
Lecture 05
Lecture 05Lecture 05
Lecture 05
 
Line codes
Line codesLine codes
Line codes
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 
Chap 5
Chap 5Chap 5
Chap 5
 
Lecture 02
Lecture 02Lecture 02
Lecture 02
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
 
line coding | Communication Systems
line coding | Communication Systemsline coding | Communication Systems
line coding | Communication Systems
 
Line Coding in OFC
Line Coding in OFCLine Coding in OFC
Line Coding in OFC
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
3.3. line coding (encoding)
3.3. line coding (encoding)3.3. line coding (encoding)
3.3. line coding (encoding)
 
Encoding Techniques
Encoding TechniquesEncoding Techniques
Encoding Techniques
 
Ch 04
Ch 04Ch 04
Ch 04
 
EEP306: Line coding
EEP306: Line codingEEP306: Line coding
EEP306: Line coding
 
Line coding
Line codingLine coding
Line coding
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Digital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shapingDigital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shaping
 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methods
 
Line coding
Line coding Line coding
Line coding
 

Ähnlich wie Lecture 08

Ch4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleCh4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleNeha Kurale
 
Chapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptChapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptfaisalahmed441
 
digital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdfdigital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdfKiranG731731
 
Data communications 4 1
Data communications 4 1Data communications 4 1
Data communications 4 1Raymond Pidor
 
line coding techniques, block coding and all type of coding
line coding techniques, block coding and all type of codingline coding techniques, block coding and all type of coding
line coding techniques, block coding and all type of codingDrZMaryLivinsaProfEC
 
CCN
CCNCCN
CCNNICE
 
Data Communication And Networking - DIGITAL TRANSMISSION
Data Communication And Networking - DIGITAL TRANSMISSIONData Communication And Networking - DIGITAL TRANSMISSION
Data Communication And Networking - DIGITAL TRANSMISSIONAvijeet Negel
 
Binary to digital encoding tbs 301
Binary to digital encoding tbs 301Binary to digital encoding tbs 301
Binary to digital encoding tbs 301Bhupesh Rawat
 
Data Encoding
Data EncodingData Encoding
Data EncodingLuka M G
 
base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptAbyThomas54
 
DCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdfDCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdfBilal Munir Mughal
 
Signal encoding techniques
Signal encoding techniquesSignal encoding techniques
Signal encoding techniquesSyed Zaid Irshad
 
Data Communication & Computer Networks:Digital Signal Encoding
Data Communication & Computer Networks:Digital Signal EncodingData Communication & Computer Networks:Digital Signal Encoding
Data Communication & Computer Networks:Digital Signal EncodingDr Rajiv Srivastava
 
ch04-digital-transmission.ppt
ch04-digital-transmission.pptch04-digital-transmission.ppt
ch04-digital-transmission.pptCDSukte
 

Ähnlich wie Lecture 08 (20)

Ch4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleCh4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kurale
 
Chapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptChapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.ppt
 
digital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdfdigital-analog_22222222222222222222222.pdf
digital-analog_22222222222222222222222.pdf
 
Lecture 08
Lecture 08Lecture 08
Lecture 08
 
Data communications 4 1
Data communications 4 1Data communications 4 1
Data communications 4 1
 
line coding techniques, block coding and all type of coding
line coding techniques, block coding and all type of codingline coding techniques, block coding and all type of coding
line coding techniques, block coding and all type of coding
 
Line Coding.pptx
Line Coding.pptxLine Coding.pptx
Line Coding.pptx
 
CCN
CCNCCN
CCN
 
lec5_13.pptx
lec5_13.pptxlec5_13.pptx
lec5_13.pptx
 
Ch4 1 v1
Ch4 1 v1Ch4 1 v1
Ch4 1 v1
 
Data Communication And Networking - DIGITAL TRANSMISSION
Data Communication And Networking - DIGITAL TRANSMISSIONData Communication And Networking - DIGITAL TRANSMISSION
Data Communication And Networking - DIGITAL TRANSMISSION
 
Binary to digital encoding tbs 301
Binary to digital encoding tbs 301Binary to digital encoding tbs 301
Binary to digital encoding tbs 301
 
Data Encoding
Data EncodingData Encoding
Data Encoding
 
base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.ppt
 
DCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdfDCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdf
 
Signal encoding techniques
Signal encoding techniquesSignal encoding techniques
Signal encoding techniques
 
Data Communication & Computer Networks:Digital Signal Encoding
Data Communication & Computer Networks:Digital Signal EncodingData Communication & Computer Networks:Digital Signal Encoding
Data Communication & Computer Networks:Digital Signal Encoding
 
ch04-digital-transmission.ppt
ch04-digital-transmission.pptch04-digital-transmission.ppt
ch04-digital-transmission.ppt
 
Multi level multi transition
Multi level multi transitionMulti level multi transition
Multi level multi transition
 
Unit 4
Unit 4Unit 4
Unit 4
 

Mehr von Sehrish Rafiq

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Sehrish Rafiq
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 

Mehr von Sehrish Rafiq (20)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 

Kürzlich hochgeladen

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Lecture 08

  • 1. DATA COMMUNICATIONS & NETWORKING LECTURE-08 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. LECTURE OVERVIEW  Conversion methods  Line coding  Characteristics of line coding  Signal level & Data Level  Pulse Rate & Bit Rate  DC Component  Self Synchronization  Line coding Schemes  Unipolar  Polar  NRZ  RZ  Manchester and Differential Manchester  Bipolar
  • 3. CONVERSION METHODS OR ENCODING & MODULATION  How information is transformed depends on its original format and on the format used by the communication hardware.  Conversion methods  Digital-to-digital conversion or Line coding  Analog-to-digital conversion or Sampling  Digital -to- analog modulation  Analog -to -analog modulation
  • 4. LINE CODING  Line coding is the process of converting binary data, a sequence of bits to a digital signal.  In other words, line coding converts a sequence of bits to a digital signal.  At the sender, digital data are encoded in to digital signal.  At the receiver, the digital data are recreated by decoding the digital signal back in to digital data.
  • 5. LINE CODING & DECODING
  • 6. SIGNAL LEVEL & DATA LEVEL  The number of values allowed in a particular signal is known as the number of signal levels.  The number of values used to represent data is known as the number of data levels.
  • 7. DATA ELEMENT VERSUS SIGNAL ELEMENT  A data Element is the smallest entity that can represent a piece of information this is the bit.  A signal element is the shortest unit time wise of a digital signal.  In other words data elements are what we need to send.  Signal elements are what we can send.  Data elements are being carried, signal elements are the carriers.  r is defined as the ratio which is the number of data elements carried by each signal element.
  • 8. DATA ELEMENT VERSUS SIGNAL ELEMENT
  • 9. DATA RATE VERSUS SIGNAL RATE  The data rate is defined as the number of data elements sent in one second usually expressed in bps.  Data rate is also called Bit rate.  The signal rate is defined as the number of signal elements sent in one second.  A signal rate is also called a pulse rate.  A signal element is also called a symbol or pulse.  One pulse or signal element can carry more than one bit.  When a pulse or signal element carry only one bit then the bit rate and pulse rate/signal rate are same.  The signal rate is sometimes called modulation rate or baud rate.
  • 10. FORMULA FOR BIT RATE Bit Rate=Pulse Rate x log2 L Where L is the number of data Levels.
  • 11. Example 1 A signal has two data levels with a pulse duration of 1 ms. We calculate the pulse rate and bit rate as follows: Solution Pulse Rate = 1/ 10-3= 1000 pulses/s Bit Rate = Pulse Rate x log2 L = 1000 x log2 2 = 1000 bps
  • 12. Example 2 A signal has four data levels with a pulse duration of 1 ms. We calculate the pulse rate and bit rate as follows: Solution Pulse Rate = = 1000 pulses/s Bit Rate = Pulse Rate x log2 L = 1000 x log2 4 = 2000 bps
  • 13. DC COMPONENT  When the voltage level is constant for a while very low frequencies are often created.  These frequencies around zero are called DC or Direct Current components.  This component is undesirable for two reasons.  First if a signal has to pass through a system (e.g. a telephone line which does not allow frequencies below 200 Hz) which does not allow low frequencies to pass the signal is distorted and may create errors in the output.  Second this component is extra energy residing on the line and is useless.
  • 15. SELF-SYNCHRONIZATION  To correctly interpret the signals received from the sender, the receiver’s bit intervals must correspond exactly to the sender’s bit intervals.  If the receiver’s clock is faster or slower, the bit intervals are not matched and the receiver might interpret the signals differently then the sender intended.  A self synchronizing digital signal includes timing information in the data being transmitted.  This can be achieved if there are transitions in the signal that alert the receiver to the beginning, middle or end of the pulse.  If the receiver clock is out of synchronization, these alerting points can reset the clock.
  • 17. Example 3 In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Kbps? How many if the data rate is 1 Mbps? Solution At 1 Kbps: 1000 bits sent 1001 bits received1 extra bps At 1 Mbps: 1,000,000 bits sent 1,001,000 bits received1000 extra bps
  • 19. UNIPOLAR SCHEME  Digital transmission systems work by sending voltage pulses along a medium link, usually a wire or cable.  In many types of encoding, one voltage level stands for binary 0,another level stands for binary 1.  The polarity of a pulse refers to whether it is positive or negative.  Unipolar encoding is so named because it uses only one polarity.  The polarity is assigned to one of the two binary states, usually the 1.  The other state usually 0 is represented by zero voltage.
  • 21. PROBLEMS USING UNI POLAR SCHEME  DC Component  The average amplitude of a unipolar encoded signal is non zero.  This creates a DC component.  Lack of synchronization  If the data contain a long sequence of 0’s and 1’s there is no change in the signal during this duration that can alert the receiver to potential synchronization problems.
  • 22. POLAR ENCODING SCHEMES  Polar encoding uses two voltage levels, one positive and one negative.  By using the two Levels, in most polar encoding methods the average voltage level on the line is reduced and the dc component problem seen in unipolar encoding is alleviated.
  • 23. NRZ(NON RETURN TO ZERO) SCHEMES  In NRZ encoding the value of the signal is always positive or negative.  Two popular forms of NRZ are:  NRZ-L(Non Return to Zero-Level)  In NRZ-L the level of the signal depends on the type of bit that it represent.  The positive voltage usually means a 0 while a negative voltage means the bit is a 1.  Problem: Long stream of 0’s or 1’s may create synchronization problem.
  • 24. NRZ(NON RETURN TO ZERO) SCHEMES  NRZ-I(NRZ-Invert)  In NRZ-I ,an inversion of the voltage level represents a 1 bit.  It is the transition between a positive and negative voltage, not the voltage itself, that represents a 1 bit.  A 0 bit is represented by no change.  NRZ-I is superior to NRZ-L due to the synchronization provided by the signal change each time a 1 bit is encountered.  The existence of 1’s in the data stream allows the receiver to synchronize its timer to the actual arrival of transmission.  A string of 0’s can still cause problems but because they are not as Likely,they are less of a problem.
  • 25. NRZ(NON RETURN TO ZERO) SCHEMES
  • 26. THANKS!! !