Académique Documents
Professionnel Documents
Culture Documents
AHMED THAKUR
Data Transmission
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 1
AHMED THAKUR
Bandwidth Bottleneck
Let's consider an everyday situation - viewing a web page. What is the bandwidth of this
communication path?
The illustration below shows the various communication channels between your computer and the
web server
You can see that the fastest link is within the telecom network itself at 10 Giga bits per second.
However, the slowest link is the low bandwidth link between the local ISP and the home router. This
has typically a 13Mbps bandwidth for data downstream (fiber to box link) and an even lower 3 Mbps
for upstream data. If you have a standard copper wire link to the exchange, then it is probably even
lower.
Therefore the bandwidth of this network is effectively only 13 Mbps and the bottleneck is the link
between the home router and the ISP.
Bandwidth and uses
The reason that bandwidth is so important is that it determines what you can do in terms of real-time
services.
If you only want to send text-only email then a very slow link is fine. For example a 56 Kbps dial-up
modem is more than adequate. Indeed, before broadband became prevalent that is all people
had available. The internet was very much a text-based experience.
If you want to receive a large file such as a high quality 10 Megabyte image, then 56kbps is far too
slow. It would take 1428 seconds or 23 minutes to download (10 million x 8) / 56000
A copper-wire based broadband link is typically around 7 Mbps therefore the same picture file would
only take about 20 seconds to download. Having a high bandwidth link makes it possible to use
multimedia services such as
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 2
AHMED THAKUR
If the bandwidth is too low for such services, then the only option is to download the complete audio
or video file then play it back offline.
Baud Rate
The rate that voltage changes is called the baud. In the simple case described above, if the voltage
changes 10 times every second the baud is said to be 10.
Bit Rate
The bit rate is the term given to the rate that bits are transmitted. In the simple case described above
the bit rate is the same as the baud. If we could generate four voltages, instead of two, we could
use each change in signal to represent two bits.
TYPES OF NETWORK CABLES
Copper Cable
One of the key things that determines bandwidth is the physical nature of the cable being used.
A signal becomes weaker the longer it travels along a cable, eventually becoming so weak that it is
no longer detectable above natural noise. Therefore the length of cable determines the bandwidth
of the link.
For instance the bandwidth of broadband to the home is determined by the length of copper cable
between the house and the nearest telephone exchange. This is the so called 'last-mile' bottleneck.
Coaxial cable
This consists of a solid copper core surrounded by insulation which is then surrounded by a copper
shielding and finally covered with a plastic sheath. Coaxial cable is widely used for television wiring
as it has enough bandwidth to handle a television signal over a typical run from antenna to
television.
Early computer networks also used coaxial cable with a bandwidth of 10Mbps. But for high speed
networks (100 Mbps and above) coax cable is no longer sufficient
Twisted Pair
In order to gain enough bandwidth another form of copper cable is used. Namely twisted pair cable
There are 8 colour-coded wires with each related pair twisted around one another. Twisting it in this
way reduces signal loss over any given length of cable.
Twisted pair cable is widely used in 100 Mbps and 1 Gbps networks. In order to guarantee the
performance of the cable, standards have been created such as CAT 5e and CAT 6. A 'Cat 5e' UTP
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 3
AHMED THAKUR
cable is sufficient for bandwidths up to 1 Gbps for reasonable run lengths. For networks needing to
run up to 10 Gbps then a Cat 6 cable should be used. Of course, this is more expensive so cable
selection should be based on what bandwidth is actually required.
Shielded Twisted Pair Cable
In order to improve performance even more, shielded twisted pair cable (STP) has copper shielding
wrapped around each twisted pair and another shield wrapped around the whole cable.
This reduces electrical interference and so allows the bandwidth to be higher for any given length.
Fibre-optic Cable
Copper cable is adequate for network cable runs for up to a 100 metres, but above that the signal
becomes too weak, therefore an alternative technology is needed.
Fibre-optic cable has an astounding bandwidth, it is limited more by the electronics either side of
the cable than the bandwidth of the cable itself. For instance in recent experiment, a 160 km length
of high performance fibre-optic cable carried up to 14 Tera bits per second!
Fibre optic cable uses light to transmit information rather than electrical signals. Unlike copper cable
it is not prone to electrical interference.
Fibre optic cable works by a light signal being 'launched' at one end of the glass thread core. The
light is reflected internally down the fibre until it reaches the other end. Light sensitive electronics
then pick up the signal.
The downside of fibre is the cost - it is more expensive that ordinary UTP network cable therefore it is
only cost-effective if there is a very high bandwidth requirement or if the network has very long cable
runs.
If fibre-optic could be laid from the telephone exchange right up to the house then broadband
bandwidth of 100 Mbps is quite possible. A number of countries have now invested to make this a
reality. Perhaps the UK may one day have fibre to every house as well. At the moment fibre-tocabinet is the norm in the UK, where it is fibre from the exchange to the nearest junction box, then
normal copper cable to the home.
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 4
AHMED THAKUR
Wireless Network
An alternative to setting up a network with copper or fibre cable is Wireless. Connection between
computer and router is achieved using radio waves.
This has the strong advantage of not requiring cables to be laid through a building. On the other
hand radio is very prone to being weakened by walls and other objects.
The bandwidth of a wireless network is lower than a physical network.
For example the 802.11g wireless standard states a theoretical bandwidth of 54 Mbits/s. In practice
the available bandwidth is much lower than this because of a weakened signal - expect about 12
Mbits/s in a typical installation covering up to 50 yards away from the wireless access point.
As I write this, my wireless connection is 13 Mbit/s and the WAP is only 20 yards away but there are
walls in the way.
However, 13 Mbit/s is fine for most purposes except for high bandwidth applications such as
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 5
AHMED THAKUR
Data Transmission
Data transmission refers to the movement of data in form of bits between two or more digital devices.
This transfer of data takes place via some form of transmission media (for example, coaxial cable,
fiber optics etc.)
1. Parallel transmission
Definition: Within a computing or communication device, the distances between different
subunits are too short. Thus, it is normal practice to transfer data between subunits using a
separate wire to carry each bit of data. There are multiple wires connecting each sub-unit and
data is exchanged using a parallel transfer mode. This mode of operation results in minimal
delays in transferring each word.
In parallel transmission, all the bits of data are transmitted simultaneously on separate
communication lines.
In order to transmit n bits, n wires or lines are used. Thus each bit has its own line.
All n bits of one group are transmitted with each clock pulse from one device to
another i.e. multiple bits are sent with each clock pulse.
Parallel transmission is used for short distance communication.
As shown in the fig, eight separate wires are used to transmit 8 bit data from sender to
receiver.
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 6
AHMED THAKUR
In serial transmission, the various bits of data are transmitted serially one after the other.
It requires only one communication line rather than n lines to transmit data from sender to
receiver.
Thus all the bits of data are transmitted on single line in serial fashion.
In serial transmission, only single bit is sent with each clock pulse.
As shown in fig., suppose an 8-bit data 11001010 is to be sent from source to destination. Then
least significant bit (LSB) i,e. 0 will be transmitted first followed by other bits. The most significant
bit (MSB) i.e. 1 will be transmitted in the end via single communication line.
The internal circuitry of computer transmits data in parallel fashion. So in order to change this
parallel data into serial data, conversion devices are used.
These conversion devices convert the parallel data into serial data at the sender side so that
it can be transmitted over single line.
On receiver side, serial data received is again converted to parallel form so that the interval
circuitry of computer can accept it
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 7
AHMED THAKUR
Asynchronous transmission sends only one character at a time where a character is either a
letter of the alphabet or number or control character i.e. it sends one byte of data at a time.
Bit synchronization between two devices is made possible using start bit and stop bit.
Start bit indicates the beginning of data i.e. alerts the receiver to the arrival of new group of
bits. A start bit usually 0 is added to the beginning of each byte.
Stop bit indicates the end of data i.e. to let the receiver know that byte is finished, one or
more additional bits are appended to the end of the byte. These bits, usually 1s are called
stop bits.
Addition of start and stop increase the number of data bits. Hence more bandwidth is
consumed in asynchronous transmission.
There is idle time between the transmissions of different data bytes. This idle time is also known
as Gap
The gap or idle time can be of varying intervals. This mechanism is called Asynchronous,
because at byte level sender and receiver need not to be synchronized. But within each
byte, receiver must be synchronized with the incoming bit stream.
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 8
AHMED THAKUR
In the absence of start & stop bits, bit synchronization is established between sender &
receiver by 'timing' the transmission of each bit.
Since the various bytes are placed on the link without any gap, it is the responsibility of
receiver to separate the bit stream into bytes so as to reconstruct the original information.
In order to receive the data error free, the receiver and sender operates at the same clock
frequency.
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 9
AHMED THAKUR
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 10
AHMED THAKUR
Simplex is one direction. A good example would be your keyboard to your CPU. The CPU never needs
to send characters to the keyboard but the keyboard always sends characters to the CPU. In many
cases, Computers almost always send characters to printers, but printers usually never send
characters to computers (there are exceptions, some printers do talk back). Simplex requires only
one lane (in the case of serial).
Half-Duplex
Full-Duplex is like the ordinary two-lane highway. In some cases, where traffic is heavy enough, a
railroad will decide to lay a double track to allow trains to pass in both directions. In communications,
this is most common with networking. Our fiber optic hubs have two connectors on each port, one
for each lane of a two-lane roadway. Full-Duplex fiber is two cables bundled or tied together to form
the two-lane roadway. In 100Base-TX, the two lanes are housed in the same jacket. RS232 was also
designed to handle Full-Duplex but some of our short haul modems and converters give the user the
option to go Half-Duplex or Simplex to reduce the number of conductors needed to connect
between them.
Understanding of the need to check for errors
Error detection
It is the detection of errors caused by noise or other impairments during transmission from the
transmitter to the receiver.
Error correction
It is the detection of errors and reconstruction of the original, error-free data.
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 11
AHMED THAKUR
Transmission Errors
Transposition Errors: Errors occurred due to the misplacement of characters of a data item.
Transcription Errors: Errors occurred while typing the data / data entry / copying data from source
document into computer.
Omission Errors: Errors occurred due to the loss of character(s) or data item while transferring data
from source to computer.
Addition Errors: Errors occurred when some character(s) that is not in the actual data/source
document is added by mistake during transferring data into the computer.
Random Errors: When the characters/units of the data item are misplaced from their actual place.
Causes of Transmission Errors
thermal noise
Impulse noise (e.g., arcing relays)
signal distortion during transmission (attenuation)
crosstalk
voice amplitude signal compression (companding)
quantization noise (PCM)
jitter (variations in signal timings)
Receiver and transmitter out of synch.
Another secure-computing need is to ensure that the data has not been corrupted during
transmission or encryption. There are a couple of popular ways to do this:
Error detection
Error detection is most commonly realized using a suitable hash function (or checksum algorithm). A
hash function adds a fixed-length tag to a message, which enables receivers to verify the delivered
message by recomputing the tag and comparing it with the one provided.
There exists a vast variety of different hash function designs. However, some are of particularly
widespread use because of either their simplicity or their suitability for detecting certain kinds of errors
(e.g., the cyclic redundancy check's performance in detecting burst errors).
Checksum
Probably one of the oldest methods of ensuring that data is correct, checksums also provide a form
of authentication because an invalid checksum suggests that the data has been compromised in
some fashion. A checksum is determined in one of two ways. Let's say the checksum of a packet is
1 byte long. A byte is made up of 8 bits, and each bit can be in one of two states, leading to a total
of 256 (28) possible combinations. Since the first combination equals zero, a byte can have a
maximum value of 255.
1. If the sum of the other bytes in the packet is 255 or less, then the checksum contains that exact
value.
2. If the sum of the other bytes is more than 255, then the checksum is the remainder of the total
value after it has been divided by 256.
Let's look at a checksum example:
Bytes total 1,151
1,151 / 256 = 4.496 (round to 4)
4 x 256 = 1,024
1,151 - 1,024 = 127 checksum
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 12
AHMED THAKUR
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 13
AHMED THAKUR
Error correction
Automatic repeat request (ARQ)
Automatic Repeat reQuest (ARQ) is an error control method for data transmission that makes use of
error-detection codes, acknowledgment and/or negative acknowledgment messages, and
timeouts to achieve reliable data transmission. An acknowledgment is a message sent by the
receiver to indicate that it has correctly received a data frame.
Usually, when the transmitter does not receive the acknowledgment before the timeout occurs (i.e.,
within a reasonable amount of time after sending the data frame), it retransmits the frame until it is
either correctly received or the error persists beyond a predetermined number of retransmissions.
Three types of ARQ protocols are:
Stop-and-wait ARQ,
Go-Back-N ARQ,
Selective Repeat ARQ.
ARQ is appropriate if the communication channel has varying or unknown capacity, such as is the
case on the Internet. However, ARQ requires the availability of a back channel, results in possibly
increased latency due to retransmissions, and requires the maintenance of buffers and timers for
retransmissions, which in the case of network congestion can put a strain on the server and overall
network capacity.
For example, ARQ is used on shortwave radio data links in the form of ARQ-E, or combined with
multiplexing as ARQ-M.
Error-correcting code
An error-correcting code (ECC) or forward error correction (FEC) code is a system of adding
redundant data, or parity data, to a message, such that it can be recovered by a receiver even
when a number of errors (up to the capability of the code being used) were introduced, either
during the process of transmission, or on storage. Since the receiver does not have to ask the sender
for retransmission of the data, a back-channel is not required in forward error correction, and it is
therefore suitable for simplex communication such as broadcasting. Error-correcting codes are
frequently used in lower-layer communication, as well as for reliable storage in media such as CDs,
DVDs, hard disks, and RAM.
Understanding of the use of serial and parallel data transmission, in Universal Serial Bus (USB)
and Integrated Circuit (IC)
I / O ports are ports and INPUT / OUTPUT devices that enable computers to connect with various
external devices through the purpose-built port-connector interfaces or devices within the casing
system are complimented on the motherboard or on a card that is inserted the slot.
Most newer motherboards have extra connectors that allow them to connect to external connectors
mounted on sheet metal brackets on the back of the computer or with special performances of
facades physical size FDD or CD player, which is installed in front of the computer case, which include
connectors for connecting USB devices , microphones, headphones, slots for inserting memory cards
and similar devices, or for an entirely different purpose, such as the regulation of rotation of the CPU
fan heatsink.
Each device communicates with the computer via electronic logic circuits that connect the device
to one of the bus system, and about the way of communication taking care program routines
incorporated as an integral part of the BIOS and the available options chipsets and motherboards
that uses the records in the BIOS , and in the end, the possibilities of your operating system.
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 14
AHMED THAKUR
There are three basic ways to transfer data through the I/O ports:
1. PARALLEL PIO
(Programmed Input/Output)
2. SERIAL UART
(Universal Asynchronous Receiver Transmitter)
3. SERIAL USB
(Universal Serial Bus)
USB (Universal Serial Bus)
It is an advanced technological solution for connecting external devices to your computer. USB
technology is the goal of streamlining the bus master computer of the special expansion cards, as
well as to facilitate insertion and disconnecting external devices, and their automatic recognition
(plug-and-play) without the need to restart (reboot). Serial data is exchanged, and during the
development of the next version accepted:
USB is asymmetric design, and consists of a multi-server and multiple units that include the server as
a branch through special devices (hub) and thus generate the trees are rooted form. When USB is
possible to have 5 levels of branching for each controller server, you can connect 127 devices less
the number of hub-ins that are attached to the same USB server. Currently there are two standard
USB connectors:
The theoretical maximum data rate in USB 2.0 is 480 Mbit/s (60 MB/s) per controller and is shared
amongst all attached devices.
For USB 3.0, typical write speed is 7090 MB/s, while read speed is 90110 MB/s.
Integrated Circuit
Communications between devices such as computers and printers and across networks is
performed adequately with serial lines. Data transmission over much shorter distances inside
integrated circuits (ICs) is best done using parallel channels. ICs employ three buses for
communication:
Data bus: carries data between memory and processor and also between ports and other parts e.g.
sound card, graphics card, have own processors and memory and some data are moved to
processor and main memory; bi-directional, data flow to processor and back to memory.
Address bus: carries address from processor to location in main memory (some ports may be
memory-mapped so have addresses too); unidirectional, no need for an address to flow back to
processor.
Control bus: carries signals from processor to parts of CPU and system to activate something e.g. to
read or write data to a memory location or I/O device.
These buses use parallel channels rather than single, serial ones. Speed and throughput of data are
of prime concern in IC design so it makes sense to maximise this with as many lines as possible.
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 15
AHMED THAKUR
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 16
AHMED THAKUR
16.
17.
18.
19.
20.
21.
22.
Not Used
Not Used
Not Used: Receive Current Loop Data (+)
Not Used
Data Terminal Ready - Computer tells the modem that it is ready to talk.
Not Used
Ring Indicator - Once a call has been placed, computer acknowledges signal (sent from
modem) that a ring is detected.
23. Not Used
24. Not Used
25. Not Used: Receive Current Loop Return (-)
Voltage sent over the pins can be in one of two states, On or Off. On (binary value "1") means that
the pin is transmitting a signal between -3 and -25 volts, while Off (binary value "0") means that it is
transmitting a signal between +3 and +25 volts...
How USB Ports Work
The goal of USB is to end all of these headaches. The Universal Serial Bus gives you a single,
standardized, easy-to-use way to connect up to 127 devices to a computer.
Just about every peripheral made now comes in a USB version. A sample list of USB devices that you
can buy today includes:
Printers
Scanners
Mice
Joysticks
Flight yokes
Digital cameras
Webcams
Scientific data acquisition devices
Modems
Speakers
Telephones
Video phones
Storage devices
Network connections
USB Cables and Connectors
Connecting a USB device to a computer is simple -- you find the USB connector on the back of your
machine and plug the USB connector into it.
If it's a new device, the operating system auto-detects it and asks for the driver disk. If the device has
already been installed, the computer activates it and starts talking to it. USB devices can be
connected and disconnected at any time.
A typical USB connector, called an "A" connection
Many USB devices come with their own built-in cable, and the cable has an "A" connection on it. If
not, then the device has a socket on it that accepts a USB "B" connector.
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 17
AHMED THAKUR
By using different connectors on the upstream and downstream end, it's impossible to ever get
confused -- if you connect any USB cable's "B" connector into a device, you know that it'll work.
Similarly, you can plug any "A" connector into any "A" socket and know that it'll work.
COMPUTER SCIENCE
2210
https://www.facebook.com/groups/OAComputers/
ahmed_thakur@hotmail.com, 0300-8268885
Page 18