SlideShare ist ein Scribd-Unternehmen logo
1 von 25
CSC339 – NETWORK
FUNDAMENTAL
Jahan University
Computer Science Department
Lecturer: Islahuddin Jalal
Master in Cyber Security
10/16/2015Jahan University 1
Class Policy
 A student must reach the class-room in time. Late comers may join the class
but are not entitled to be marked present.
 Attendance shall be marked at the start of the class and students failing to
secure 75% attendance will not be allowed to sit in final exam.
 The assignment submission deadline must be observed. In case of late
submission, ten percent may be deducted from each day.
 Those who are absent on the announcement date of the assignment/test.
Must get the topic/chapter of test/assignment confirmed through their peers.
 Mobile phones must be switched-off in the class-rooms.
10/16/2015Jahan University 2
Grading Evaluation for Network fundamental
Internal Evaluation
Midterm Exam 20%
Attendance 5%
Assignment/Presentations 5%
Quizzes/Tests 10%
Total Internal Evaluation 40%
Final-term Examination
Final-term Exam 60%
Total Marks 100%
10/16/2015Jahan University 3
Topics to be discussed
 Baseband transmission
 Broadband transmission
 Modes of channel operation
 Attenuation
10/16/2015Jahan University 4
Digital signal vs Analog signal
 Signals can be analog or digital
 Analog signals can have an infinite number of values in a range.
 Digital signals can have only a limited
10/16/2015Jahan University 5
Baseband Transmission
 Baseband transmission
 Digital signals are used
 Time Division Multiplexing is possible
 Baseband is bi-directional transmission
 Short distance signal travelling
 Entire bandwidth of the cable is consumed by a single signal in a baseband
transmission.
 Using dedicated medium
10/16/2015Jahan University 6
Baseband transmission
 In baseband transmission, the required bandwidth is proportional to the bit
rate; if we need to send bits faster, we need more bandwidth.
 Baseband transmission of a digital signal that preserves the shape of the
digital signal is possible only if we have a low pass channel with an infinite or
very wide bandwidth.
10/16/2015Jahan University 7
Baseband transmission
Example of Baseband transmission
 LAN uses a dedicated channel for two stations communicating with each
other.
 In a bus topology LAN with multipoint connections, only two stations can
communicate with each other at each moment in time, the other stations need to
avoid from sending data.
 In a star topology LAN, the entire channel between each station and the hub is
used for communication between these two entities.
 Etc.
10/16/2015Jahan University 9
Broadband transmission
 Broadband:
 Analog signals are used
 Transmission of data is unidirectional
 Signal travelling distance is long
 Frequency division multiplexing is possible
 The signals are sent on multiple frequencies and allow all the multiple signals are
sent simultaneously in broadband transmission.
 Modulator is used
10/16/2015Jahan University 10
Modulation of a digital signal for transmission on a bandpass
channel
Example of Broadband Transmission
 Sending computer data over a telephone line
 Digital Cellular telephone.
 The digital cellular phones convert the analog audio signal to digital and then
convert it again to analog for transmission over a bandpass channel.
10/16/2015Jahan University 12
Attenuation
 Loss of energy
 When a signal travels through a medium, it loses some of its energy due to the
resistance of the medium.
 Some wire or medium carrying electric signals get warm after some time it is
converted into heat
10/16/2015Jahan University 13
Attenuation
Data Transmission Rates
 How fast we can send data
 Bit per second over a channel
10/16/2015Jahan University 15
Data Transmission rate
 Depends of three factors
 The bandwidth available
 The level of the signals
 The quality of the channel (the level of noise)
10/16/2015Jahan University 16
Theoretical formulas for data rate
 There are two formulas for calculating data rate
 Noiseless Channel formula by Nyquist
 BitRate = 2 * bandwidth * log2L
 Noisy Channel formula by Shannon
 Capacity = bandwidth * log2 (1+SNR)
 SNR = signal to noise ratio = average signal power
average noise power
10/16/2015Jahan University 17
Example of Noiseless channel formula
 Consider a noiseless channel with a bandwidth of 3000Hz transmitting a signal
with two signal levels. The maximum bit rate can be calculated as:
 BitRate = 2 * 3000 * Log22
= 6000 * Log22
= 6000 * 1
= 6000 bps
10/16/2015Jahan University 18
Example of noisy channel formula
 We can calculate the theoretical highest bit rate of a regular telephone line.
A telephone line normally has a bandwidth of 3000 Hz (300 to 3300) assigned
for data communications. The signal-to-noise ration is usually 3162. for this
channel the capacity is calculated as:
 C= B log2 (1+SNR)
= 3000 log2 (1+3162)
=3000 log2 (3163)
=3000 * 11.62
=34860bps
10/16/2015Jahan University 19
Modes of Channel Operation
10/16/2015Jahan University 20
 Three types of modes of Channel Operation
 Simplex
 Half duplex
 Full duplex
Simplex
 Data in a simplex channel is always one way. Simplex channels are not often
used because it is not possible to send back error or control signals to the
transmit end.
 E.g Television, radio transmission
10/16/2015Jahan University 21
Half duplex
 A half-duplex channel can send and receive, but not at the same time.
 E.g one-lane bridge, walkie-talkie
 In some aspects, you can think of Internet surfing as being half-duplex, as a
user issues a request for a web document, then that document is downloaded
and displayed before the user issues another request
 In addition, it is possible to perform error detection and request the sender
to retransmit information that arrived corrupted.
10/16/2015Jahan University 22
Half Duplex
10/16/2015Jahan University 23
Full duplex
 Data can travel in both directions simultaneously.
 There is no need to switch from transmit to receive mode like in half duplex.
 Its like a two lane bridge on a two-lane highway.
 E.g Mobile
10/16/2015Jahan University 24
END
Thanks for
hearing…………………….

Weitere ähnliche Inhalte

Was ist angesagt?

5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
Khan Rahimeen
 

Was ist angesagt? (20)

Different types of network topologies
Different types of network topologiesDifferent types of network topologies
Different types of network topologies
 
Cables
CablesCables
Cables
 
Videotext
VideotextVideotext
Videotext
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical Segmentation
 
Chapter7
Chapter7Chapter7
Chapter7
 
802.15.5 mesh topology
802.15.5  mesh topology802.15.5  mesh topology
802.15.5 mesh topology
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
Unit 1 ethernet vsd
Unit 1 ethernet vsdUnit 1 ethernet vsd
Unit 1 ethernet vsd
 
Networking Ethernet
Networking EthernetNetworking Ethernet
Networking Ethernet
 
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
 
DATA COMMUNICATION SYSTEMS
DATA COMMUNICATION SYSTEMSDATA COMMUNICATION SYSTEMS
DATA COMMUNICATION SYSTEMS
 
Medium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networksMedium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networks
 
fiber optic communication connectors
fiber optic communication connectors fiber optic communication connectors
fiber optic communication connectors
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
 
Datacom module 3: Data Communications Circuits, Arrangements, and Networks
Datacom module 3:  Data Communications Circuits, Arrangements, and NetworksDatacom module 3:  Data Communications Circuits, Arrangements, and Networks
Datacom module 3: Data Communications Circuits, Arrangements, and Networks
 
OSI Model
OSI ModelOSI Model
OSI Model
 

Andere mochten auch

Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
CAVC
 

Andere mochten auch (18)

Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521
 
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview. BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
 
Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
HCI-Lecture-1
HCI-Lecture-1HCI-Lecture-1
HCI-Lecture-1
 
Ch 03
Ch 03Ch 03
Ch 03
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
Chapter 2 point-to-point protocol (ppp)
Chapter 2   point-to-point protocol (ppp)Chapter 2   point-to-point protocol (ppp)
Chapter 2 point-to-point protocol (ppp)
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2
 

Ähnlich wie Csc339 – lecture 2a network fundamental

Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
Beneyam Haile
 
Mobile Communication MDM College
Mobile Communication MDM CollegeMobile Communication MDM College
Mobile Communication MDM College
gueste2620035
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
IMRAN KHAN
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
ijwmn
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig bee
Gregorio Toro Rivera
 

Ähnlich wie Csc339 – lecture 2a network fundamental (20)

Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Performance improvement of mimo mc cdma system using relay and itbf
Performance improvement of mimo mc  cdma system using relay and itbfPerformance improvement of mimo mc  cdma system using relay and itbf
Performance improvement of mimo mc cdma system using relay and itbf
 
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
 
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
Coordinated Multipoint (CoMP) Transmission for LTE-Advanced Networks in Dense...
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
 
Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...Improving data transmission in the vanet using multi criteria decision making...
Improving data transmission in the vanet using multi criteria decision making...
 
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
 
Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
 
B011120510
B011120510B011120510
B011120510
 
40120140501003
4012014050100340120140501003
40120140501003
 
Massive mimo
Massive mimoMassive mimo
Massive mimo
 
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
 
Mobile Communication MDM College
Mobile Communication MDM CollegeMobile Communication MDM College
Mobile Communication MDM College
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
 
Notes on Class 4
Notes on Class 4Notes on Class 4
Notes on Class 4
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig bee
 

Mehr von Kabul Education University

Mehr von Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Csc339 – lecture 2a network fundamental

  • 1. CSC339 – NETWORK FUNDAMENTAL Jahan University Computer Science Department Lecturer: Islahuddin Jalal Master in Cyber Security 10/16/2015Jahan University 1
  • 2. Class Policy  A student must reach the class-room in time. Late comers may join the class but are not entitled to be marked present.  Attendance shall be marked at the start of the class and students failing to secure 75% attendance will not be allowed to sit in final exam.  The assignment submission deadline must be observed. In case of late submission, ten percent may be deducted from each day.  Those who are absent on the announcement date of the assignment/test. Must get the topic/chapter of test/assignment confirmed through their peers.  Mobile phones must be switched-off in the class-rooms. 10/16/2015Jahan University 2
  • 3. Grading Evaluation for Network fundamental Internal Evaluation Midterm Exam 20% Attendance 5% Assignment/Presentations 5% Quizzes/Tests 10% Total Internal Evaluation 40% Final-term Examination Final-term Exam 60% Total Marks 100% 10/16/2015Jahan University 3
  • 4. Topics to be discussed  Baseband transmission  Broadband transmission  Modes of channel operation  Attenuation 10/16/2015Jahan University 4
  • 5. Digital signal vs Analog signal  Signals can be analog or digital  Analog signals can have an infinite number of values in a range.  Digital signals can have only a limited 10/16/2015Jahan University 5
  • 6. Baseband Transmission  Baseband transmission  Digital signals are used  Time Division Multiplexing is possible  Baseband is bi-directional transmission  Short distance signal travelling  Entire bandwidth of the cable is consumed by a single signal in a baseband transmission.  Using dedicated medium 10/16/2015Jahan University 6
  • 7. Baseband transmission  In baseband transmission, the required bandwidth is proportional to the bit rate; if we need to send bits faster, we need more bandwidth.  Baseband transmission of a digital signal that preserves the shape of the digital signal is possible only if we have a low pass channel with an infinite or very wide bandwidth. 10/16/2015Jahan University 7
  • 9. Example of Baseband transmission  LAN uses a dedicated channel for two stations communicating with each other.  In a bus topology LAN with multipoint connections, only two stations can communicate with each other at each moment in time, the other stations need to avoid from sending data.  In a star topology LAN, the entire channel between each station and the hub is used for communication between these two entities.  Etc. 10/16/2015Jahan University 9
  • 10. Broadband transmission  Broadband:  Analog signals are used  Transmission of data is unidirectional  Signal travelling distance is long  Frequency division multiplexing is possible  The signals are sent on multiple frequencies and allow all the multiple signals are sent simultaneously in broadband transmission.  Modulator is used 10/16/2015Jahan University 10
  • 11. Modulation of a digital signal for transmission on a bandpass channel
  • 12. Example of Broadband Transmission  Sending computer data over a telephone line  Digital Cellular telephone.  The digital cellular phones convert the analog audio signal to digital and then convert it again to analog for transmission over a bandpass channel. 10/16/2015Jahan University 12
  • 13. Attenuation  Loss of energy  When a signal travels through a medium, it loses some of its energy due to the resistance of the medium.  Some wire or medium carrying electric signals get warm after some time it is converted into heat 10/16/2015Jahan University 13
  • 15. Data Transmission Rates  How fast we can send data  Bit per second over a channel 10/16/2015Jahan University 15
  • 16. Data Transmission rate  Depends of three factors  The bandwidth available  The level of the signals  The quality of the channel (the level of noise) 10/16/2015Jahan University 16
  • 17. Theoretical formulas for data rate  There are two formulas for calculating data rate  Noiseless Channel formula by Nyquist  BitRate = 2 * bandwidth * log2L  Noisy Channel formula by Shannon  Capacity = bandwidth * log2 (1+SNR)  SNR = signal to noise ratio = average signal power average noise power 10/16/2015Jahan University 17
  • 18. Example of Noiseless channel formula  Consider a noiseless channel with a bandwidth of 3000Hz transmitting a signal with two signal levels. The maximum bit rate can be calculated as:  BitRate = 2 * 3000 * Log22 = 6000 * Log22 = 6000 * 1 = 6000 bps 10/16/2015Jahan University 18
  • 19. Example of noisy channel formula  We can calculate the theoretical highest bit rate of a regular telephone line. A telephone line normally has a bandwidth of 3000 Hz (300 to 3300) assigned for data communications. The signal-to-noise ration is usually 3162. for this channel the capacity is calculated as:  C= B log2 (1+SNR) = 3000 log2 (1+3162) =3000 log2 (3163) =3000 * 11.62 =34860bps 10/16/2015Jahan University 19
  • 20. Modes of Channel Operation 10/16/2015Jahan University 20  Three types of modes of Channel Operation  Simplex  Half duplex  Full duplex
  • 21. Simplex  Data in a simplex channel is always one way. Simplex channels are not often used because it is not possible to send back error or control signals to the transmit end.  E.g Television, radio transmission 10/16/2015Jahan University 21
  • 22. Half duplex  A half-duplex channel can send and receive, but not at the same time.  E.g one-lane bridge, walkie-talkie  In some aspects, you can think of Internet surfing as being half-duplex, as a user issues a request for a web document, then that document is downloaded and displayed before the user issues another request  In addition, it is possible to perform error detection and request the sender to retransmit information that arrived corrupted. 10/16/2015Jahan University 22
  • 24. Full duplex  Data can travel in both directions simultaneously.  There is no need to switch from transmit to receive mode like in half duplex.  Its like a two lane bridge on a two-lane highway.  E.g Mobile 10/16/2015Jahan University 24