Documente Academic
Documente Profesional
Documente Cultură
PHYSICAL LAYER - 2
1
4-2 ANALOG-TO-DIGITAL CONVERSION
4.2
PCM
Digitization- change an analog signal to
digital data
PCM encoder has three processes.
1. The analog signal is sampled.
2. The sampled signal is quantized.
3. The quantized values are encoded as
streams of bits.
sampling is the reduction of a continuous-time
signal to a discrete-time signal
A sample is a value or set of values at a point in
time and/or space.
4.3
Figure 4.21 Components of PCM encoder
4.4
4.5
4.6
Sampling
Analog signal is sampled every TS secs.
Ts is referred to as the sampling interval.
fs = 1/Ts is called the sampling rate or
sampling frequency.
There are 3 sampling methods:
Ideal – pulses from the analog signal are sampled
Natural – A high speed switch is turned on for only
small period of time.
Flattop - sample and hold, like natural but with
single amplitude value
Sampling – pulse amplitude
modulation(PAM)
4.7
Figure 4.22 Three different sampling methods for PCM
4.8
Sampling rate
4.9
Figure 4.23 Nyquist sampling rate for low-pass and bandpass signals
4.10
Example 4.6
4.12
Example 4.7
4.14
Example 4.8
4.15
Example 4.10
Solution
The bandwidth of a low-pass signal is between 0 and f,
where f is the maximum frequency in the signal.
Therefore, we can sample this signal at 2 times the
highest frequency (200 kHz). The sampling rate is
therefore 400,000 samples per second.
4.16
Example 4.11
Solution
We cannot find the minimum sampling rate in this case
because we do not know where the bandwidth starts or
ends. We do not know the maximum frequency in the
signal.
4.17
Quantization
Sampling results in a series of pulses of
varying amplitude values ranging between
two limits: a min and a max.
The amplitude values are infinite between the
two limits.
We need to map the infinite amplitude values
onto a finite set of known values.
4.18
1. The original analog signal has instantaneous amplitudes
between V min and V max.
2. We divide the range into L zones, each of height Δ (delta).
4.19
Quantization Zones
The 8 zones are: -20 to -15, -15 to -10,
-10 to -5, -5 to 0, 0 to +5, +5 to +10,
+10 to +15, +15 to +20
The midpoints are: -17.5, -12.5, -7.5, -
2.5, 2.5, 7.5, 12.5, 17.5
4.20
Assigning Codes to Zones
Each zone is then assigned a binary code.
The 8 zone (or level) codes are therefore:
000, 001, 010, 011, 100, 101, 110, and 111
Assigning codes to zones:
000 will refer to zone -20 to -15
001 to zone -15 to -10, etc.
4.21
Figure 4.26 Quantization and encoding of a sampled signal
4.22
Quantization Levels
Number of levels, depends on the range of the amplitudes of the
analog signal and how accurately we need to recover the signal.
If the amplitude of a signal fluctuates between two values only, we
need only two levels;
if the signal, like voice, has many amplitude values, we need more
quantization levels.
audio digitizing- L is 256;
video - thousands.
Lower values of L increases the quantization error
4.23
Quantization Error
4.24
What is the SNRdB for the following figure?
4.26
UNIFORM VS NON UNIFORM QUANTIZATION
For many applications, distribution of amplitude signals
are not uniform & changes in amplitude frequently occur
on the lower side than higher side.
Use of non uniform quantization by companding and
expanding
Companded at sender and expanded at receiver
Companding – reducing the instantaneous voltage
amplitude for large values.(COMPRESSING HIGHER
AMPLITUDE ANALOG SIGNALS) Thus gives greater weight
to strong signals and less weight to weak signals.
Non uniform quantization reduces SNR .
4.27
ENCODING
4.28
Example 4.14
Solution
The human voice normally contains frequencies from 0
to 4000 Hz. So the sampling rate and bit rate are
calculated as follows:
4.29
PCM Decoder
To recover an analog signal from a digitized signal
we follow the following steps:
Using circuit, convert code words into pulse that holds the
amplitude value of a pulse till the next pulse arrives.
We pass this signal through a low pass filter(to smooth a
staircase signal into analog signal) with a cutoff frequency
that is equal to the same frequency as the original sender.
sampling at Nyquist rate and enough quantization levels
will recreate analog signal.
Amplification to get minimum and maximum values of
original signal.
4.30
Figure 4.27 Components of a PCM decoder
4.31
PCM BANDWIDTH
4.32
Example 4.15
4.33
4-3 TRANSMISSION MODES
4.34
Figure 4.31 Data transmission and modes
4.35
Figure 4.32 Parallel transmission
4.36
Parallel Transmission
Use n wires to send n bits at one time. That way each bit has its own
wire, and all n bits of one group can be transmitted with each clock tick
from one device to another. Fig. shows how parallel transmission works
for n =8. Typically, the eight wires are bundled in a cable with a
connector at each end.
The advantage of parallel transmission is speed. All else being equal,
parallel transmission can increase the transfer speed by a factor of n
over serial transmission.
Disadvantge: Expensive so used only for short distance.
Eg: Computer and a printer
4.37
When is Parallel
Transmission needed?
& Applications?
4.38
Figure 4.33 Serial transmission
4.39
Serial Transmission
In serial transmission one bit follows another,
so we need only one communication channel
rather than n to transmit data between two
communicating devices.
Advantage : Reduces the cost of transmission
over parallel by roughly a factor of n.
4.40
Note
4.41
Figure 4.34 Asynchronous transmission
4.42
• Asynchronous transmission is so named because the timing of a signal is unimportant.
• Information is received and translated by agreed upon patterns.
• Patterns are based on grouping the bit stream into bytes. Each group, usually 8 bits, is sent
along the link as a unit. The sending system handles each group independently, relaying it
to the link whenever ready, without regard to a timer.
• Without synchronization, the receiver cannot use timing to predict when the next group
will arrive. To alert the receiver to the arrival of a new group, therefore, an extra bit is
added to the beginning of each byte. This bit, usually a 0, is called the start bit.
• To let the receiver know that the byte is finished, 1 or more additional bits are appended
to the end of the byte. These bits, usually 1s, are called stop bits.
• By this method, each byte is increased in size to at least 10 bits, of which 8 bits is
information and 2 bits or more are signals to the receiver. In addition, the transmission of
each byte may then be followed by a gap of varying duration. This gap can be
represented either by an idle channel or by a stream of additional stop bits.
• It does not require a clock for synchronization; rather it uses the parity bits to tell the
receiver how to interpret the data.
Note
4.44
Figure 4.35 Synchronous transmission
4.45
• The bit stream is combined into longer
“frames,” which may contain multiple
bytes.
• Data are transmitted as an unbroken
string of 1s and 0s,
• The receiver separates that string into
the bytes, or characters, it needs to
reconstruct the information.
• Timing is very important since accuracy
depends on the ability of receiving
devise to keep a accurate count of bits
4.46
as they come in.
Advantages
Speed, no extra bit, faster than
asynchronous
Eg: high speed application
4.47
4.49
Isochronous
In real-time audio and video, uneven delays not
acceptable.
If each image is sent by using one or more frames,
there should be no delays between frames.
Synchronization between characters is not enough;
The entire stream of bits must be synchronized.
The isochronous transmission guarantees that the
data arrive at a fixed rate.
4.50
DIGITAL-TO-ANALOG CONVERSION
5.51
Digital to Analog Conversion
A sine wave is defined by three
characteristics: amplitude, frequency, and
phase.
By changing one characteristic of a simple
electric signal, we can use it to represent
digital data.
5.52
Figure 5.1 Digital-to-analog conversion
5.53
Figure 5.2 Types of digital-to-analog conversion
5.54
Aspects of Digital to analog signal
4.55
Data elements- the smallest piece of
info(bit)
Signal element- smallest unit of signal
4.56
Note
5.57
Bandwidth
BW proportional to signal rate except for FSK.
Carrier signal
A high-frequency signal produced by sending device that acts as a
base for the information signal.
This base signal is called the carrier signal or carrier frequency.
Digital information then changes the carrier signal by modifying one
or more of its characteristics (amplitude, frequency, or phase).
This kind of modification is called modulation (shift keying).
4.58
Amplitude Shift Keying (ASK)
5.59
Figure 5.3 Binary amplitude shift keying
5.60
Bandwidth of ASK
The bandwidth B of ASK is proportional to the
signal rate S.
B = (1+d)S
Factor “d” depends on modulation and filtering,
lies between 0 and 1.
where S=Nx1/r bauds
Bandwidth- minimum S and Maximum 2S
Middle of the BW is fc the carrier frequency
Shift bandwidth to match the target in band pass
channel
5.61
Figure 5.4 Implementation of binary ASK
5.62
If digital data are presented as a unipolar
NRZ digital signal with a high voltage of 1 V
and a low voltage of 0 V,
Multiplying the NRZ digital signal by the
carrier signal coming from an oscillator.
When the amplitude of the NRZ signal is 1,
the amplitude of the carrier frequency is
held;
when the amplitude of the NRZ signal is 0,
the amplitude of the carrier frequency is
zero.
4.63
Figure 5.5 Bandwidth of full-duplex ASK used in Example 5.4
5.64
MultiLevel ASK
More than two levels.
Use 4, 8, 16, or more different amplitudes for the signal
and modulate the data using 2, 3, 4, or more bits at a
time.
In these cases, r = 2, r = 3, r = 4, and so on.
not implemented with pure ASK, it is implemented with
QAM
4.65
Frequency Shift Keying
5.66
Figure 5.6 Binary frequency shift keying
5.67
Bandwidth of FSK
5.68
Coherent and Non Coherent BFSK
frequencies.
In coherent FSK, phase continues through the boundary
5.69
Figure 5.7 Bandwidth of MFSK used in Example 5.6
5.70
Multi level FSK
Similarly to ASK, FSK can use multiple bits per signal
element.
That means we need to provision for multiple frequencies,
each one to represent a group of data bits.
f1 to f4 can be used to send 2 bits at a time
f1 to f8 can be used to send 3 bits at a time
5.71
Phase Shift Keyeing
5.73
Figure 5.10 Implementation of BASK
5.74
Quadrature PSK
5.75
Figure 5.11 QPSK and its implementation
5.76
Constellation Diagrams
5.77
Figure 5.12 Concept of a constellation diagram
5.78
Figure 5.13 Three constellation diagrams
5.79
Quadrature amplitude modulation
5.80
Figure 5.14 Constellation diagrams for some QAMs
4.82
Chapter 6: Outline
6.1 MULTIPLEXING
6.84
Figure 6.1: Dividing a link into channels
6.86
6.6.1 Frequency-Division Multiplexing
6.87
Carrier frequencies are separated by
sufficient bandwidth to accommodate the
modulated signal.
Channels can separated by strips of
unsused BW- guard band to prevent
signals from overlapping
Carrier frequencies must not interfere with
original data frequency
6.88
Figure 6.3: Frequency-division multiplexing
6.89
Figure 6.4: FDM Process
6.90
Figure 6.5: FDM demultiplexing example
6.91
Figure 6.9: Analog hierarchy
6.92
4.93
Other applications of FDM
AM and FM radio broadcasting.
530 to 1700kHz- AM radio. All radio station share
this band.
Each AM station needs 10KHz
FM- wider band of 88 to 108MHz.
Each station -200kHz.
Television broadcasting. Each channel has 6MHz
bandwidth.
6.94
Implementation
Implemented very easily
In case of radio and TV, No need for a physical multiplexer
and demultiplexer.
As long as the stations agree to send their broadcasts to the
air using different carrier frequencies, multiplexing is
achieved.
In other cases, such as the cellular telephone system, a
base station needs to assign a carrier frequency to the
telephone user.
There is not enough bandwidth in a cell to permanently
assign a bandwidth range to every telephone user.
When a user hangs up, her or his bandwidth is assigned to
another caller.
6.95
First generation cellular telephones.
Each user- two 30kHz channels, one for sending
voice and other for receiving
Voice signal has a BW of 3KHz is modulated by
using FM.
FM signal has a BW 10 times that of modulating
signal, So each channel has 30kHz of BW
Each user- 60kHz
6.96
Example 6.1
Assume that a voice channel occupies a bandwidth of 4 kHz. We need to combine three
voice channels into a link with a bandwidth of 12 kHz, from 20 to 32 kHz. Show the
configuration, using the frequency domain. Assume there are no guard bands.
Solution
We shift (modulate) each of the three voice channels to a different bandwidth, as shown in
Figure 6.6.
6.97
Figure 6.6: Example 6.1
6.98
Example 6.2
Five channels, each with a 100-kHz bandwidth, are to be multiplexed together. What is the
minimum bandwidth of the link if there is a need for a guard band of 10 kHz between the
channels to prevent interference?
Solution
For five channels, we need at least four guard bands. This means that the required
bandwidth is at least 5 × 100 + 4 × 10 = 540 kHz, as shown in Figure 6.7.
6.99
Figure 6.7: Example 6.2
6.100
Example 6.4
The Advanced Mobile Phone System (AMPS) uses two bands. The first band of 824 to
849 MHz is used for sending, and 869 to 894 MHz is used for receiving. Each user has a
bandwidth of 30 kHz in each direction. The 3-kHz voice is modulated using FM, creating
30 kHz of modulated signal. How many people can use their cellular phones
simultaneously?.
Solution
Each band is 25 MHz. If we divide 25 MHz by 30 kHz, we get 833.33. In reality, the band
is divided into 832 channels. Of these, 42 channels are used for control, which means only
790 channels are available for cellular phone users.
6.101
6.6.2 Wavelength-Division Multiplexing
6.102
Same as FDM
Optical signals transmitted through fiber optic
channels
Combining different signals of Diff frequencies
The frequencies are very high.
Very Narrow bands of light from different
sources are combined to make a wider band of
light
At the receiver , signals are separated by
demux.
6.103
Figure 6.10: Wavelength-division multiplexing
6.104
Figure 6.11: Prisms in wave-length division multiplexing
6.105
Implementation
The combining and splitting of light sources are easily handled by a
prism.
A prism bends a beam of light based on the angle of incidence and
the frequency.
Using this technique, a multiplexer can be made to combine several
input beams of light, each containing a narrow band of frequencies,
into one output beam of a wider band of frequencies.
Applications: SONET
Dense WDM can multiplex a very large number of channels by
spacing channels very close to each other.
6.106
Additional Info - WDM
It uses light of different colours to create a number of signal paths.
It uses Optical prisms to separate the different colours at the
receiving end and optical prisms does not require power source.
These systems used temperature stabilized lasers to provide the
needed channels count
WDM operates with 8 channels (i.e., 8 fiber optic cables) DWDM
with 40 channels
4.107
Time-Division Multiplexing
6.108
Figure 6.12: TDM
6.109
Digital multiplexing technique for
combining several low rate channels into
one high rate one.
Two schemes
Synchronous TDM
Statistical TDM
6.110
Synchronous TDM
4.111
Time slots and frames
6.112
If an input time slot is T s, the output time
slot is T/n s, where n is the number of
connections.
A unit in the output connection has a
shorter duration; it travels faster.
The data rate of the link is n times
faster and the unit duration is n
times shorter.
6.113
Figure 6.13: Synchronous time-division multiplexing
6.114
Data units from each input connection is
collected into a frame.
The duration of input unit T
The duration of each slot T/n
The duration of each frame is T
4.115
Figure 6.15: Interleaving
6.116
Interleaving
4.117
Empty Slots
4.118
Figure 6.18: Empty slots
6.119
Data rate management
4.120
Figure 6.19: Multilevel multiplexing
6.121
Multilevel Multiplexing
4.122
Figure 6.20: Multiple-slot multiplexing
6.123
Multiple slot allocation
4.124
Figure 6.21: Pulse stuffing
6.125
Pulse stuffing
4.126
Frame synchronization
4.127
Figure 6.22: Framing bits
6.128
Example 6.5
In Figure 6.13, the data rate for each input connection is 1 kbps. If 1 bit at a
time is multiplexed (a unit is 1 bit), what is the duration of
1. each input slot,
2. each output slot, and
3. each frame?
6.129
Duration of Input slot = 1/input.data rate
Duration of output slot = input time slot/n
Duration of frame is as same as input time
slot.
Duration of output slot = 1/output.data rate
4.130
Example 6.5 (continued)
Solution
We can answer the questions as follows:
1.The data rate of each input connection is 1 kbps. This means that the
bit duration is 1/1000 s or 1 ms. The duration of the input time slot is 1
ms (same as bit duration).
2. The duration of each output time slot is one-third of the input time
slot. This means that the duration of the output time slot is 1/3 ms.
3. Each frame carries three output time slots. So the duration of a
frame is 3 × (1/3) ms, or 1 ms. The duration of a frame is the same as
the duration of an input unit.
6.131
Example 6.6
Figure 6.14 shows synchronous TDM with a data stream for each input and one data
stream for the output. The unit of data is 1 bit. Find (a) the input bit duration, (b) the output
bit duration, (c) the output bit rate, and (d) the output frame rate.
6.132
Example 6.7
Four 1-kbps connections are multiplexed together. A unit is 1 bit. Find (1) the duration of 1
bit before multiplexing, (2) the transmission rate of the link, (3) the duration of a time slot,
and (4) the duration of a frame.
6.133
Example 6.8
Four channels are multiplexed using TDM. If each channel sends 100 bytes/s and we
multiplex 1 byte per channel, show the frame traveling on the link, the size of the frame,
the duration of a frame, the frame rate, and the bit rate for the link.
Solution
The multiplexer is shown in Figure 6.16. Each frame carries 1 byte from each channel; the
size of each frame, therefore, is 4 bytes, or 32 bits. The frame rate is 100 frames per
second. The duration of a frame is therefore 1/100 s. The link is carrying 100 frames per
second, and since each frame contains 32 bits, the bit rate is 100 × 32, or 3200 bps.
6.134
Figure 6.16: Example 6.8
6.135
Example 6.9
A multiplexer combines four 100-kbps channels using a time slot of 2 bits. Show the
output with four arbitrary inputs. What is the frame rate? What is the frame duration? What
is the bit rate? What is the bit duration?
Solution
Figure 6.17 shows the output for four arbitrary inputs. The link carries 50,000 frames per
second since each frame contains 2 bits per channel. The frame duration is therefore
1/50,000 s or 20 μs. The frame rate is 50,000 frames per second, and each frame carries 8
bits; the bit rate is 50,000 ×
8 = 400,000 bits or 400 kbps. The bit duration is 1/400,000 s, or 2.5 μs.
6.136
Figure 6.17: Example 6.9
6.137
Example 6.10
We have four sources, each creating 250 characters per second. If the
interleaved unit is a character and 1 synchronizing bit is added to each
frame, find (1) the data rate of each source, (2) the duration of each
character in each source, (3) the frame rate, (4) the duration of each
frame, (5) the number of bits in each frame, and (6) the data rate of the
link.
Solution
1. The data rate of each source is 250 × 8 = 2000 bps = 2
kbps.
2. Each source sends 250 characters per second; therefore,
the duration of a character is 1/250 s, or 4 ms.
6.138
Example 6.10 (Continued)
6. The link sends 250 frames per second, and each frame
contains 33 bits. This means that the data rate of the link
is 250 × 33, or 8250 bps.
6.139
Example 6.11
Two channels, one with a bit rate of 100 kbps and another with a bit rate of 200 kbps, are
to be multiplexed. How this can be achieved? What is the frame rate? What is the frame
duration? What is the bit rate of the link?.
Solution
We can allocate one slot to the first channel and two slots to the second channel. Each
frame carries 3 bits. The frame rate is 100,000 frames per second because it carries 1 bit
from the first channel. The frame duration is 1/100,000 s, or 10 ms. The bit rate is 100,000
frames/s × 3 bits per
frame, or 300 kbps.
6.140
Example 6.11 (Continued)
6. The link sends 250 frames per second, and each frame
contains 33 bits. This means that the data rate of the link
is 250 × 33, or 8250 bps.
6.141
Digital Signal Service
4.142
Figure 6.23: Digital hierarchy
6.143
Table 6.1: DS and T line rates
6.144
DS-0, DS-1 are names of services. To
implement those services, the telephone
companies use T lines.
The T1 line is used to implement DS-1.
T2 is used to implement DS-2
4.145
T lines for Analog transmission
4.146
Vintage Telephone exchange
4.147
Figure 6.24: T-1 line
6.148
The T1 Frame
DS-1 requires 8 kbps of overhead.
The frame used on a T-1 line is usually 193 bits
divided into 24 slots of 8 bits each plus 1 extra
bit for synchronization (24 × 8 + 1 = 193)
24 segments are interleaved in one frame.
If a T-1 line carries 8000 frames, the data rate is
1.544 Mbps (193 × 8000 = 1.544 Mbps)—the
capacity of the line.
4.149
Figure 6.25: T-1 line frame structure
4.151
More synchronous TDM
Applications
Some second-generation cellular telephone
companies use synchronous TDM.
Available bandwidth is divided into bands and for
each band FDM is applied so that 6 users can
utilize.
Using TDM, the number of telephone users in each
area is now 6 times greater.
4.152
Statistical Time division Multiplexing
6.154
Addressing
Synchronous TDM
occupied by data; no addressing
In statistical TDM
carry data as well as the address of the destination.
no fixed relationship
no preassigned or reserved slots.
include the address of the receiver inside each slot.
n bits to define N different output lines with n = log2N.
eight different output lines, we need a 3-bit address
Slot Size
4.156
No synchronization bit
The frames in statistical TDM need not be synchronize.
Do not need synchronization bits.
Bandwidth
The capacity of the link is normally less than the sum of
the capacities of each channel.
capacity is defined based on the load of channel.
In peak time, some slots need to wait.
4.157
6-2 SPREAD SPECTRUM
6.158
Add redundancy; Spread the original spectrum needed
for each station.
If the required bandwidth for each station is B, spread
spectrum expands it to Bss, such that Bss >> B.
The expanded bandwidth allows the source to wrap its
message in a protective envelope for a more secure
transmission.
An analogy sending of a delicate, expensive gift.
4.159
Spread spectrum achieves its goals through
two principles:
1. The bandwidth allocated to each station
needs to be, by far, larger than what is needed.
This allows redundancy.
2.The expanding of the original bandwidth B to
the bandwidth Bss must be done by a process
that is independent of the original signal.
The spreading process occurs after the signal is
created by the source.
4.160
Figure 6.27: Spread spectrum
6.161
6.2.1 FHHS- Frequency Hopping Spread spectrum
6.162
pseudorandom code generator
pseudorandom noise (PN)
PN creates a k-bit pattern for every hopping period Th.
The frequency table uses the pattern to find the
frequency to be used for this hopping period and passes
it to the frequency synthesizer.
The frequency synthesizer creates a carrier signal of that
frequency, and the source signal modulates the carrier
signal.
4.163
M is 8 and k is 3.
The pseudorandom code generator will create
eight different 3-bit patterns.
These are mapped to eight different frequencies
in the frequency table.
After eight hoppings, the pattern repeats,
starting from 101 again.
Signals hops around from carrier to
carrier.
Assume the required bandwidth of the original
signal is 100 kHz.
4.164
Figure 6.28: Frequency hopping spread spectrum (FHSS)
6.165
Figure 6.29: Frequency selection in FHSS
6.166
A sender and receiver can have privacy.
If an intruder tries to intercept the
transmitted signal, she can only access a
small piece of data.
Because she does not know the spreading
sequence to quickly adapt herself to the
next hop.
4.167
Figure 6.30: FHSS cycles
6.168
Figure 6.31: Bandwidth sharing
6.169
6.2.2 DSSS- direct sequence spread spectrum
6.170
The sequence used in a wireless LAN, the
famous Barker sequence, where n is 11.
Original signal and the chips in the chip
generator use polar NRZ encoding.
spreading code is 11 chips having the pattern
10110111000.
If the original signal rate is N, the rate of the
spread signal is 11N.
4.171
The required bandwidth for the spread
signal is 11 times larger than the
bandwidth of the original signal.
provide privacy if the intruder does not
know the code.
It can also provide immunity against
interference if each station uses a
different code
4.172
Figure 6.32: DSSS
6.173
Figure 6.32: DSSS example
6.174
Bandwidth Sharing
4.175
8-1 SWITCHING - INTRODUCTION
8.177
Creating temporary connections.
Some connected to end systems.
routing
4.178
8.8.1 Three Methods of Switching
8.179
8.8.2 Switching and TCP/IP Layers
8.180
Figure 8.2: Taxonomy of switched networks
8.181
8-2 CIRCUIT-SWITCHED NETWORKS
8.183
Fig 8.3 -circuit-switched network with four
switches and four links.
Each link is divided into n channels by using
FDM or TDM.
When end system A needs to communicate with
end system M.
System A needs to request a connection to M
that must be accepted by all switches as well as
by M itself. This is called the setup phase;
a circuit (channel) is reserved on each link,
circuits or channels defines the dedicated path.
4.184
The data-transfer phase can take place.
After all data have been transferred, the
circuits are torn down.
4.185
Circuit switching takes place at the
physical layer.
A station -a reservation for the resources
to be used during the communication.
Resources, such as channels (bandwidth in
FDM and time slots in TDM), switch buffers,
switch processing time, and switch
input/output ports, must remain dedicated
continuous flow.
No addressing
4.186
Example 8.1
8.187
Example 8.2
8.188
Figure 8.4: Circuit-switched network used in Example 8.1
8.189
Figure 8.5: Circuit-switched network used in Example 8.2
8.190
8.2.1 Three Phases
• connection setup,
• data transfer,
• connection teardown.
8.191
A dedicated circuit (combination of channels in
links) needs to be established.
For eg, when system A needs to connect to
system M, it sends a setup request that includes
the address of system M, to switch I.
Switch I finds a channel between itself and
switch IV that can be dedicated for this purpose.
Switch I then sends the request to switch IV,
which finds a dedicated channel between itself
and switch III.
Switch III informs system M of system A’s
intention at this time.
4.192
ACK-in the opposite direction
Data-Transfer Phase
After the establishment of the dedicated
circuit (channels), the two parties can
transfer data.
Teardown Phase
When one of the parties needs to
disconnect, a signal is sent to each switch
to release the resources.
4.193
8.2.2 Efficiency
8.194
8.2.3 Delay
• Low efficiency,
• The delay is minimal.
• During data transfer the data are not delayed at
each switch.
• The resources are allocated for the duration of
the connection.
• Figure 8.6 shows the idea of delay in a circuit-
switched network when only two switches are
involved.
8.195
Figure 8.6: Delay in a circuit-switched network
Data transfer
8.196
No waiting time at each switch.
The total delay=the time needed to create
the connection+ transfer data +
disconnect the circuit.
4.197
The delay caused by the setup is the sum
of four parts:
The propagation time of the source computer
request (slope of the first gray box)
the request signal transfer time (height of the
first gray box)
The propagation time of the acknowledgment
from the destination computer (slope of the
second gray box)
The signal transfer time of the acknowledgment
(height of the second gray box).
4.198
The delay due to data transfer is the sum of
two parts:
the propagation time (slope of the colored
box)
Data transfer time (height of the colored
8.200
The allocation - a first come, first-served
basis.
When a switch receives a packet, no
matter what the source or destination is,
the packet must wait if there are other
packets being processed.
4.201
8.3.1 Datagram Networks(connectionless)
8.202
Figure 8.7: A Datagram network with four
switches (routers)
3 1
4 3 2 1
4
1
2 3
1
4
2 2 3 4 1
8.203
Datagram switching -done at the network
layer.
Figure 8.7 shows how the datagram
approach is used to deliver four packets
from station A to station X.
The switches - routers.
All four packets (or datagrams) belong to
the same message, but may travel
different paths to reach their destination.
Do not have the necessary bandwidth
available to carry all the packets from A to
X.
4.204
out of order with different delays
between the packets.
Packets lost or dropped because of a
lack of resources.
responsibility of an upper-layer protocol
to reorder the datagrams or ask for lost
datagrams before passing them on to the
application.
4.205
Connectionless networks.
Connectionless -the switch (packet switch)
does not keep information about the
connection state.
There are no setup or teardown phases.
Each packet is treated the same by a
switch regardless of its source or
destination.
4.206
Figure 8.8: Routing table in a datagram
network
8.207
Routing Table
Each switch (or packet switch) has a routing
table which is based on the destination
address.
The routing tables are dynamic and are updated
periodically.
The destination addresses and the
corresponding forwarding output ports are
recorded in the tables.
Circuit switched - each entry is created when the
setup phase is completed and deleted when the
teardown phase is over.
4.208
Destination Address
Every packet carries a header that contains, the
destination address.
Destination address is examined; the routing
table is consulted to find the corresponding port
through which the packet should be forwarded.
This address remains the same during the entire
journey of the packet.
4.209
Efficiency
4.210
Delay
4.211
Figure 8.9: Delays in a datagram network
8.212
The packet travels through two switches.
There are three transmission times (3T),
three propagation delays (slopes 3τ of the
lines), and two waiting times (w1 + w2).
Ignore the processing time in each switch.
Total delay = 3T + 3τ + w1 + w2
4.213
8.3.2 Virtual-Circuit Networks
8.214
• 4. As in a circuit-switched network, all packets
follow the same path established during the
connection.
• 5. A virtual-circuit network is normally
implemented in the data-link layer.
• Circuit-switched network - physical layer
• datagram network -network layer.
4.215
Figure 8.10: Virtual-circuit network
8.216
Addressing
Two types of addressing are involved:
Global Addressing
A source or a destination needs to have a global
address
A global address in virtual-circuit networks is
4.217
Virtual-Circuit Identifier or Label
The identifier for data transfer
A VCI, unlike a global address, is a small number
that has only switch scope;
When a frame arrives at a switch, it has a VCI;
when it leaves, it has a different VCI.
A VCI does not need to be a large number since
each switch can use its own unique set of VCIs.
4.218
Figure 8.11: Virtual-circuit identifier
8.219
Three phases
In the setup phase, the source and
phases.
4.220
Data transfer phase
All switches need to have a table entry for this
virtual circuit.
The table has four columns.
The switch holds four pieces of information for
each virtual circuit that is already set up.
4.221
Figure 8.12: Switch and table for a virtual-circuit network
8.222
Figure 8.12 shows a frame arriving at port 1 with a VCI
of 14.
When the frame arrives, the switch looks in its table to
find port 1 and a VCI of 14. When it is found, the switch
knows to change the VCI to 22 and send out the frame
from port 3.
Figure 8.13 shows how a frame from source A reaches
destination B and how its VCI changes during the trip.
Each switch changes the VCI and routes the frame.
The procedure at the switch is the same for each frame
of a message. The process creates a virtual circuit, not a
real circuit, between the source and destination.
4.223
Figure 8.13: Source-to-destination data transfer in a
circuit-switch
network
8.224
Setup phase
A switch creates an entry for a virtual
circuit.
For example, suppose source A needs to
create a virtual circuit to B.
Two steps are required: the setup request
and the acknowledgment.
4.225
Figure 8.14: Setup request in a virtual-circuit network
8.226
Figure 8.15: Setup acknowledgment in a virtual-
circuit network
8.227
Teardown Phase
Source A, after sending all frames to B, sends a
special frame called a teardown request.
Destination B responds with a teardown
confirmation frame.
All switches delete the corresponding entry from
their tables.
4.228
Efficiency
Resource reservation in a virtual-circuit network
can be made during the setup or can be on
demand during the data-transfer phase.
In the first case, the delay for each packet is the
same;
in the second case, each packet may encounter
different delays.
4.229
Advantage
Even if resource allocation is on demand.
The source can check the availability of
the resources, without actually reserving
it.
4.230
Delay
4.231
Figure 8.16: Delay in a virtual-circuit
network
8.232
The packet is traveling through two
switches (routers).
There are three transmission times (3T),
three propagation times (3τ)
Total delay= 3T +3τ + setup delay
+teardown delay
4.233
Circuit switched Technology in
WANs
virtual-circuit networks are used in
switched WANs such as ATM networks.
The data-link layer of these technologies
is well suited to the virtual circuit
technology.
4.234