Chapter Nine: Data Transmission

Slides:



Advertisements
Similar presentations
Data and Computer Communications Digital Data Communications Techniques.
Advertisements

The Transmission of Binary Data in Communication Systems
Chapter 6 Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control.
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economic to transfer all bits of a long message simultaneously.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Chapter 6: Errors, Error Detection, and Error Control
Transmission Characteristics 1. Introduction (Information Interchange codes) 2. Asynchronous and Synchronous Transmissions 3. Error detection (bit errors)
Chapter 6 Errors, Error Detection, and Error Control
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economical to transfer all bits of a long message.
1/26 Chapter 6 Digital Data Communication Techniques.
Chapter 10 Error Detection and Correction
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
Digital Logic Chapter 2 Number Conversions Digital Systems by Tocci.
Binary Codes. Binary Code A binary code is just an assignment of information to bit patterns.
Chapter 2 – Number Systems and Codes Copyright © 2011, 2007, 2004, 2001, 1998 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights.
Core 3: Communication Systems. There are three terms that we will consider in relation to the speed of communication. Bits per second (bps) Baud Rate.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
ECS 152A 4. Communications Techniques. Asynchronous and Synchronous Transmission Timing problems require a mechanism to synchronize the transmitter and.
Data and Computer Communications
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Data Encoding and Decoding Professor: Dr. Miguel Alonso Jr.
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, October 2011.
Errors, Error Detection, and Error Control
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
PREPARED BY: ENGR. JO-ANN C. VIÑAS
FUNDAMENTALS OF NETWORKING
1/30/ :20 PM1 Chapter 6 ─ Digital Data Communication Techniques CSE 3213 Fall 2011.
FIT1005 FIT – Monash University
AGBell – EECT by Andrew G. Bell (260) Lecture 2.
© 2009 Pearson Education, Upper Saddle River, NJ All Rights ReservedFloyd, Digital Fundamentals, 10 th ed Digital Logic Design Dr. Oliver Faust.
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
Data and Computer Communications Digital Data Communications Techniques + Error Control+ Digital Data Communications Techniques + Error Control+Multiplexing.
10.1 Types of Errors 10.2 Detection 10.3 Error Correction.
Binary Codes.
Coding and Error Control
Serial Communications
Error Detection and Correction
Chapter 9: Data Link Control
Data Link Layer.
Input/Output and Communication
Data Transmission Keep errors to an acceptable low probability
Introduction to Chapter 2
The Three Main Sources of Transmission Errors
CIS 321 Data Communications & Networking
Part III Datalink Layer 10.
Data Link Layer.
2 Number Systems and Codes Edited by Jerry Bernardini.
Chapter 1 Number Systems, Number Representations, and Codes
DIGITAL DATA COMMUNICATION TECHNIQUES
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, August 2010.
DIGITAL DATA COMMUNICATION TECHNIQUES
Packetizing Error Detection
Chapter 6.
Packetizing Error Detection
PART III Data Link Layer.
Business Data Communications
Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted during transmission. For.
Chapter 7 Error Detection and Correction
DIGITAL DATA COMMUNICATION TECHNIQUES
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economical to transfer all bits of a long message.
Fundamentals of Data Representation
Transmission Errors Error Detection and Correction
Packetizing Error Detection
Error Detection and Correction
Transmission Errors Error Detection and Correction
Serial Communications
Chapter 9: Data Link Control
Data Link Layer. Position of the data-link layer.
Introduction Communication Modes Transmission Modes
Presentation transcript:

Chapter Nine: Data Transmission

Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances is usually done by serial means

Data Coding Data coding techniques are used to convert alphanumeric characters into binary numbers A data code is a standardized relationship between signaling elements and characters Data codes are also called character sets or character codes

Binary and Text Data Alphanumeric characters are not the only source of data Digitized audio and video signals are examples of binary data that has nothing to do with the alphabet Character codes are not needed for binary data; however, some communication systems divide all data into blocks that typically contain 7 or 8 bits, referred to as characters

Character Codes Baudot code dates from 1874 and is still in use in telex and radioteletype services It is designated as ITA2 by the CCITT Baudot is a five-bit code giving a total of 32 possible combinations. Additional combinations are added by using two characters called LTRS and FIGS LTRS includes only uppercase letters The FIGS character set also includes control characters

ASCII Code The American Standard Code for Information Interchange (ASCII) is the most common code for communications between microcomputers ASCII is a seven-bit code, allowing for 128 possible combinations without shifting. Sometimes an eighth bit is added to allow for the transmission of graphic characters, mathematical symbols, and foreign language characters ASCII has certain regularities that make programming easier; for example, bit 6 switches between upper- and lowercase letters and numbers are represented by their BCD (binary-coded decimal) equivalents

Asynchronous Transmission Digital transmission formats must have the following elements: Standard voltage ranges Standard clock speeds Transmitter and receiver clocks must be synchronized Framing is necessary to determine the first bit of a character or PCM sample Asynchronous systems use free-running clocks on the transmitting and receiving sides A start bit is transmitted at the beginning of each character and at least one stop bit at the end of the character

Asynchronous Communication

Parallel-to-Serial Conversion Internally, computers use parallel communication sending at least eight and usually 16 or 32 bits along on a bus Most data communication over longer distances uses serial techniques Therefore, a device is needed to convert parallel signals/data into serial signals/data Typically, this device is an IC called a UART (universal asynchronous receiver-transmitter)

UART

Synchronous Transmission In synchronous systems, the receive and transmitter clocks are synchronized to the same clock frequency Synchronous communication is more efficient than asynchronous because start and stop bits are not necessary Data is sent in blocks of specific data segments and have an initial identifying sequence that allows proper framing and often identifies the content of the block as well

Clock Recovery Asynchronous digital systems can function with a receiver clock whose speed is only approximately the same as the transmitter clock because the clock is reset at the start of each character The most economical way for the receiver to get clock-synchronizing information from the incoming data stream

Framing Framing is necessary in data communications in order to determine which bit is the start bit of a character In asynchronous systems, the use of a start and a stop bit solves this problem In synchronous communications, it is only necessary to determine the start of a block of data

Synchronous Data-Link Protocols Synchronous communication protocols are either bit- or character-oriented, with character-oriented protocols becoming obsolete One of the most common protocols is the BISYNC protocol from IBM These protocols use at least two synchronizing characters at the beginning of a block

Error Detection and Correction Errors will occur with data whether sent by analog or digital means. Some method must be used to detect and correct these errors Errors may be caused by: High data rates Thermal noise RF interference There are two stages in the control of errors: Error detection Error correction

Techniques for Detection and Correction of Errors Some systems rely on the receiver being able to correct errors from redundant information This technique is called forward error correction (FEC) Systems that are full- or half-duplex that request the transmitter to repeat any data blocks that have errors are called automatic request for retransmission (ARQ) schemes

Parity Parity is a simple means of error detection by using the addition of one extra bit to the bits that encode a character The parity bit is set to make the transmitted character have either an even number or an odd number of ones The parity is checked by the receiver and a request is made to retransmit the character

Longitudinal Redundancy Check The longitudinal redundancy check (LRC) is an extension of the parity check that can provide some correction as well as detection A parity character is made up from the block of data By checking the parity of each character, the receiver can go to the LRC character to determine which bit is in error, allowing the correction of single-bit errors

Checksums Another method for error detection is the use of checksums Checksums are developed by adding all the data words in a block and then dividing by some fixed number The remainder that results is transmitted at the end of the block; the receiver performs the same division, and if the numbers are different, an error has occurred XMODEM is one data-transfer method that uses this method

Cyclic Redundancy Checking Cyclic redundancy checking (CRC) codes are used in many sophisticated digital systems such as the compact disk This error-detecting and correcting scheme uses a form of feedback in which the state of each message bit depends on the state of the previous blocks in the message CRC codes are generated by computing a polynomial from the message bits

Data Compression and Encryption Data Compression can be done in several ways, depending upon the type of data to be processed Huffman coding uses strings of from 4 to 11 bits to encode the alphabet instead of 7 or 8 bits for every character Another important compression technique is called run-length encoding, taking advantage of the fact that information bits are often repeated

Encryption Encryption is used to provide security for data transmissions Two main types of encryption are: Private key - a long binary number is combined with the message data according to an algorithm that is built into the system. At the receiver, the same key is used to decode the information Public key - anyone can encode messages using a public key, but a private key is necessary to decode the information