Vous êtes sur la page 1sur 56

CHAPTER SIX (6)

IMPROVING DATA COMMUNICATIONS EFFICIENCY

4/17/2012

TJ 2013 - Data Comm.

Learning Objectives

After completing this chapter you will be able to: Describe the differences between frequency division multiplexing, time division multiplexing, statistical time division multiplexing, and wavelength division multiplexing. Describe the differences between concentrators, frontend-processors and controllers. Define protocol conversion and why it is needed in data communications. Understand local multidrop configuration Understand how and why computer ports is used in data communications. TJ 2013 - Data Comm. 4/17/2012 2

Chapter Outline

Introduction Multiplexers (MUXs) Concentrators Port Concentrators Front-end Processors Controllers Protocol Converters Multidrop Configurations Data Compression Techniques
4/17/2012 TJ 2013 - Data Comm. 3

Introduction

In this chapter we will concentrate on other hardware components that complement the various components described previously (terminals, host computers, modems, cables). The main purpose of these components is to increase performance. These components are multiplexers, concentrators, port concentrators, front-end processors, controllers and protocol converters.
4/17/2012 TJ 2013 - Data Comm. 4

Multiplexers (MUXs)

Multiplexing ~ a technique that allow several computer components to share a single transmission line. The process of combining signals from multiple sources for transmission across a single data link. Multiplexing is done by an electronic device called a multiplexer (MUX). MUX receives input signals from various computer devices, compressed these signals into a single stream of data and transmits it using as single communication line. 2013 - Data Comm. one) (Many to 4/17/2012 TJ 5

Multiplexers (MUXs)
Modem Termi nal Modem Modem Modem FEP Termi nal

Without MUX
Host

Modem Modem Modem

Modem Termi nal

terminal
2400bps

With MUX
9600bps

terminal terminal Pemultipleks


2400bps

Mode m

Mode m

Pemultipleks FP E KomputerHos

terminal

4/17/2012

TJ 2013 - Data Comm.

Demultiplexer (DEMUX)
A device that separates a multiplexed signal into its original components. DEMUX receives a single stream of data from a single communication line, separates it into the original signals and transmits them to various computer devices. (One to many)

4/17/2012

TJ 2013 - Data Comm.

Advantages of Multiplexing
Fewer telephone line and modems are needed Increase efficiency of communication by maximizing information transmitted on a single line. Minimize transmission cost by reducing the cost of using individual lines between the host computer and each terminal.

4/17/2012 TJ 2013 - Data Comm. 8

Types of Multiplexing

There are four types of multiplexing that are commonly used:


Frequency division multiplexing (FDM) Time division multiplexing (TDM) Statistical division multiplexing (STDM) Wavelength division multiplexing (WDM)

4/17/2012

TJ 2013 - Data Comm.

Frequency Division Multiplexing

An analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of the signals to be transmitted. FDM divides the bandwidth of a transmission line into several frequency ranges called channels. It can carry different signals at different channels simultaneously. Some FDM have internal modem that are built in. In this case, modems are not needed because the FDM performs the data conversion automatically and assigns data from each terminal to specify frequency range. i.e. cable TV uses FDM to transmit TV channels over 4/17/2012 TJ 2013 - Data Comm. 10 coaxial cable.

Frequency Division Multiplexing

4/17/2012

TJ 2013 - Data Comm.

11

FDM Process

4/17/2012

TJ 2013 - Data Comm.

12

FDM Process

2400 bps

sebahagian frekuensi perlu menjadi guardband - pemisah antara saluran


saluran 1

terminal terminal terminal


2400 bps

saluran 2

Pemultipleks

saluran 3 Pemultipleks saluran 4

FEP Komputer Hos

terminal

Media Penghantaran

4/17/2012

TJ 2013 - Data Comm.

13

Time Division Multiplexing

A digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate required by the sending and receiving devices. TDM is also called synchronous TDM. Instead of using different frequency ranges to transmit data, TDM divides the transmission line into time segments. It allows several data comm. equipments to share transmission line by allocating fixed time slots to each device. The drawback of TDM is if a terminal has no data to transmit during its fixed time slot, the transmission line remain idle during that time and not fully utilized, because other terminals cannot use time slot.
4/17/2012 TJ 2013 - Data Comm. 14

Time Division Multiplexing

4/17/2012

TJ 2013 - Data Comm.

15

Time Division Multiplexing

Mesej Yang dihantar SEDIA OK SAYA

Anggapkan mesej dihantar bermula dari belakang terminal A

Dari terminal B

Dari terminal A terminal B


A D A Y O I N A K A

terminal C

Pemultipleks Media Penghantaran

Pemultipleks FEP Komputer Hos Dari terminal A semula

SERANGAN terminal D Terminal B sudah tidak ada data

4/17/2012

TJ 2013 - Data Comm.

16

Time Division Multiplexing

4/17/2012

TJ 2013 - Data Comm.

17

Statistical TDM

STDM also known as asynchronous TDM. STDM works similarly like TDM, but it is based on the assumption that not all devices transmit data at the same time. STDM overcome the problem of idle time on the transmission line (by using TDM) by dynamically allocates time slots on demand. STDM is more efficient than TDM in the sense that it makes better use of the bandwidth and making it possible to connect more terminal/devices than the circuit capacity. 4/17/2012 TJ 2013 - Data Comm. 18

Statistical TDM

4/17/2012

TJ 2013 - Data Comm.

19

Statistical TDM
Mesej Yang dihantar SEDIA OK ?

Anggapkan mesej dihantar bermula dari belakang terminal 1 terminal 2 terminal 3 Pemultipleks
N4 E1

Terminal 3 sudah habis data - tempatnya terus diberi kepada terminal 4

Dari terminal 2 Dari terminal 1 - setiap penghantaran menyatakan alamat terminal

G4

D1

A4

O2

I1

N4

?3

K2

A1

Pemultipleks Media Penghantaran Terminal 2 & 3 sudah habis data - tempatnya terus diberi kepada terminal 4 Dari terminal 1 semula FEP Komputer Hos

SERANGAN terminal 4

4/17/2012

TJ 2013 - Data Comm.

20

Wavelength Division Multiplexing

Type of multiplexing developed for used on fiber optic cables. It involves light signals transmitted through fiber optics channels. Each signal is assigned a particular wavelength on an optical fiber communication line. WDM is the optical equivalent of FDM, which assigns signals a specific bandwidth on a wire communication line. Combine multiple light source into one single light at the MUX and splitting of light source at the DEMUX (handled by prism)
4/17/2012 TJ 2013 - Data Comm. 21

Multiplexing Techniques
FDM
Bandwidth

TDM
Data

STDM
Uses

is divided into several channels Limited number of devices can be supported Difficult to add/remove channels (need to reconfigure frequencies) Wasted bandwidth because guardbands must be used Low speed technique
4/17/2012

flow from each device is assigned a specific time slot Wasted time slots if devices do not have data to send Ideal for heavy traffic where there are only a few empty time slots.

statistical method to ensure data flow with maximum efficiency Suitable for environment with variable data flows.

TJ 2013 - Data Comm.

22

Concentrator

It combines data from several terminals onto a single communication line and is used singly, while MUX must be used in pairs. It accepts data from terminals, does some validation of data, stores the data for a short time and then sends the data to the host computer. These tasks are possible because concentrator has a processor and memory. It also allows a terminal to operate even if the communication line connected to the host computer fails due to2013 - Data Comm. 4/17/2012 TJ its separate processor. 23

Concentrator (cont)

Unlike MUX, the number of lines going into the concentrator does not have to match the number of lines coming out of the concentrator. Thus, it can be used to attach multiple terminals to multiple host computers (it acts like a switch) A terminal with data to transmit, specifies to which host computers the data should be sent, and the concentrator routes the information to the correct host. Similarly, the host computer could send data to a certain terminal and route Comm. the exact line. 24 4/17/2012 TJ 2013 - Data it to

MUX vs. Concentrator


MUX
modem modem

MUX

FEP

Processor CONCENTRATOR Memory


4/17/2012 TJ 2013 - Data Comm.

FEP

Host Computer

25

Port Concentrator

Usually used with a multiplexer MUX must have the same number of lines into the host as it has lines to individual terminals. If host computer does not have enough ports available for the lines from the MUX, then a port concentrator is used to combine the data from multiple lines coming from the MUX, to enter the host through a single port thus using only a single communication cable.
4/17/2012 TJ 2013 - Data Comm. 26

Port Concentrator

MUX

modem

modem

MUX

Port Concentrator

Host Comp

4/17/2012

TJ 2013 - Data Comm.

27

Front-End Processor

A special purpose computer It can perform most standard computer functions. It performs specialized pre-programmed control and functions. FEP is placed at the same location as the host computer, while concentrator is employed at the remote end. It performs all of the functions of a concentrator, as well as taking over many of the network mgt tasks of the host computer.
4/17/2012 TJ 2013 - Data Comm. 28

Front-End Processor (cont)


FEP helps host computer by relieving host computers burden so that it can be dedicated to processing data. FEP concentrates on doing communication jobs, so that host computer can focus on data processing. There are two types of FEP.

Nonprogrammable Programmable
4/17/2012 TJ 2013 - Data Comm. 29

Front-End Processor (cont)


The non-programmable FEP is a device permanently programmed or hard wired to handle certain communication functions. Programmable FEP has an operating system and a communication control program that can be changed and reloaded to reflect changes in the network configuration.

4/17/2012 TJ 2013 - Data Comm. 30

FEP Functions

Assembly and disassembly of synchronous and asynchronous transmission Compile statistics on a communication network Conversion of data codes from various types of terminals Provide protocol support for different types of terminals Polling of terminals to determine if they have data to transmit Formatting data so it is more easily used by the host computer Flow control to prevent overloading a terminal at the receiving end Error detection, correction, and retransmission of data if required.
4/17/2012 TJ 2013 - Data Comm. 31

Controller

It is a scaled down version of FEP It can connect up to 32 terminals, PCs, fax machines, printers or other computer-related devices to a single communication line and transmit data to an FEP connected at the receiving end. Can be located at a remote side or near the host computer. 3 types of controllers:
Cluster controller Remote controller Local controller
4/17/2012 TJ 2013 - Data Comm. 32

Cluster Controller

Developed specifically for IBM mainframe computers. Also called communication controller or a 3174 or a 3274 cluster controller. Each of these controllers can provides connectivity for up to 32 terminals and printers.

4/17/2012

TJ 2013 - Data Comm.

33

Remote Controller

It can handle 8, 16, 24 or up to 32 terminals depending on the model used. Its main advantage is, simultaneous data transmission on both directions is allowed between the FEP and the remote controllers. Located remotely near terminals.

4/17/2012

TJ 2013 - Data Comm.

34

Local Controller

Located near the host computer. Connected directly to the host computer. It can handle up to 32 transmission lines, thus, the single connection to the FEP now can use data from 32 different devices. The terminals can be placed locally which means that they are connected by coaxial cable, or remotely, by using a pair of modem
4/17/2012 TJ 2013 - Data Comm. 35

Protocol Converter

Protocol is a rule that defines how two devices talk to each other. If 2 or more devices are using different protocols, then communication is established using a protocol converter that acts as an interpreter. 3 types of protocol converters:
Hardware converter Software converter Gateway
4/17/2012 TJ 2013 - Data Comm. 36

Hardware Converter
Can be located either locally (near the host computer) or remotely. They do all the processing for the protocol conversion.

4/17/2012

TJ 2013 - Data Comm.

37

Software Converter
A software package for protocol converter, which is installed on the host computer or on the PC. It requires the host or PC to do some processing for the protocol conversion.

4/17/2012

TJ 2013 - Data Comm.

38

Gateway
Is used to connect dissimilar networks by providing a conversion from one network protocol to another. An example is an e-mail gateway that allows two people who use different e-mail software (with different protocols) exchanging e-mail messages.

4/17/2012 TJ 2013 - Data Comm. 39

Line Configuration

Refers to the way two or more communication devices attach to a link. A link is the physical communication pathway that transfers data from one device to another. For communication to occur, two devices must be connected in some way to the same link at the same time: There are two possible line configurations:
Point-to-point Multipoint (multidrop)
4/17/2012 TJ 2013 - Data Comm. 40

Point-to-Point VS Multidrop

4/17/2012

TJ 2013 - Data Comm.

41

Point-to-point
It provides a dedicated link between two devices. The entire capacity of the channel is reserved for transmission between those two devices.

4/17/2012

TJ 2013 - Data Comm.

42

Multidrop / Multipoint
Is one in which more than two specific devices share a single link. Some host computers can directly accommodate several terminals by having a single computer or front-end port. This is done by connecting a cable into the first terminal, then from the first terminal to the second, and so on.

4/17/2012 TJ 2013 - Data Comm. 43

Multidrop

Local multidrop configurations are advantageous when terminals are located near each other, and the FEP is located in another room. Rather than running long cables from each terminal to the FEP, only one long cable and several short ones are needed. The key to multidrop operations is that each terminal must have a unique address and each terminal must be able to determine which messages are destined for it.
4/17/2012 TJ 2013 - Data Comm. 44

Multidrop

Remote multidrop configurations can also be cost effective. i.e. A company with location in Phnom Penh, Siem Reap, Banteay Meanchey needs a communication circuit between the northern part and southern part of Cambodia. If we used 2 telephone lines (from PP to SR and from PP to BM) and 2 pairs of modems, the telephone bill for company will be higher. A message from PP bound for BM is routed through SR. Since the address of the message is BM, it will not displayed on other terminal in SR.
4/17/2012 TJ 2013 - Data Comm. 45

Multidrop
Some host computers can directly accommodate several terminals by having a single computer or front-end port. This is done by connecting a cable into the first terminal, then from the first terminal to the second, and so on.

4/17/2012

TJ 2013 - Data Comm.

46

Multidrop
The drawback of multidrop configuration involves security risk. Using the above example, a determined person in SR could use special monitoring devices to eavesdrop on all the communications to and from BM. The advantage is clearly, the long-distance communications costs are reduced.

4/17/2012 TJ 2013 - Data Comm. 47

Data Compression

The reduction of the amount of data to be transmitted without significant loss of information. It reduces the number of bits sent. It becomes important when we send data that are not pure text such as audio and video. Two methods are used to compress data: Lossless Lossy

4/17/2012

TJ 2013 - Data Comm.

48

Lossless Compression

The compressing and decompressign algorithms are usually the inverse of each other. After decompressing, we will get the exact data as they were before compressing Nothing is lose. Some of the techniques used in lossless compression:
Run-Length Encoding Statistical Compression
4/17/2012 TJ 2013 - Data Comm. 49

Run-Length Encoding

When data contain strings of repeated symbols (such as bits or character), the strings can be replaced by a special marker, followed by the repeated symbol, followed by the number of occurrences.

4/17/2012

TJ 2013 - Data Comm.

50

Statistical Compression

It uses short codes for frequent symbols and long codes for infrequent symbols. In this way, the length of the total data is reduced tremendously. The three common encoding systems using this principle are: Morse code Huffman encoding Lempel-Ziv-Welch Encoding
4/17/2012 TJ 2013 - Data Comm. 51

Morse Code

It uses variable length combinations of mark (dash) and space (dot) encode data. One symbol codes represent the most frequent characters and five-symbol codes represent the least frequent characters. I.e. dot (.) represents the character E and four dashes and a a dot (--.--) represent the character Q.

4/17/2012

TJ 2013 - Data Comm.

52

Huffman Encoding

It uses variable-length codes ( astrings of 0s and 1s) to encode a set of symbols. It assigns shorter codes to characters that occur more frequently and longer codes to those that occur less frequently. I.e. E and T, the two characters that occur most frequently in English language, are assigned one bit each. A, I, M, N which also occur frequently but less frequently than E and T, are assigned two bits each. C,G,K,R,S,U, W are the next most frequent and are assigned three bits each. E: 0 T:1 A:00 I:01 M:10 N:11 C:000 D:001 G:010 K:011 O:100 R:101 S:110
4/17/2012 TJ 2013 - Data Comm. 53

Lempel-Ziv-Welch Encoding

It looks for repeated strings or words and stores them in variables. It then replaces occurences of that string with a pointer to that variable. I.e. the words the, then, and and some strings such as in and tion are often repeated many times. Each of these words or strings can be stored in separate variables and then pointers can point to them. A pointer (address) requires only a few bits, while a word may need tens of bits. This method is used in UNIX.
4/17/2012 TJ 2013 - Data Comm. 54

Lossy Compression

It can be used if the decompressed information need not be an exact replica of the original information but something very close. We will lose some of the original data in the process. Appropriate to compress voice, pictures, images, audio, video. Methods that have been developed using lossy compression techniques: Joint photographics experts group (JPEG) ~ pictures & graphics Motion picture experts group (MPEG) ~ video.
4/17/2012 TJ 2013 - Data Comm. 55

Chapter Outline

Characteristics Multiplexers (MUXs) Concentrators Port Concentrators Front-end Processors Controllers Protocol Converters Multidrop Configurations Data Compression Techniques
4/17/2012 TJ 2013 - Data Comm. 56

Vous aimerez peut-être aussi