Unit 5
Unit 5
Computer Networks
Unit-5
Topic: Modulations & demodulations, Comparison of channel
access protocols
What is Modulation?
The process by which data is converted into electrical/digital signals for
transferring that signal over a medium is called modulation. It increases strength
for maximum reach of the signals. The process of extracting data from the
transmitted signal is called demodulation. A Modem is a device that performs
both modulation and demodulation processes. The various forms of modulation
are designed to alter the characteristics of carrier waves. The most commonly
altered characteristics of modulation include amplitude, frequency, and phase.
Carrier signal: The signals that contain no information but have a
certain phase, frequency, and amplitude are called carrier signals.
Modulated signals: The signals which are the combination of the carrier
signals and modulation signals are modulated signals. The modulated
signal is obtained after the modulation of the signals.
Types of Modulation:
Amplitude Modulation: It is a type of modulation in which only
the amplitude of the carrier signal is varied to represent the data being added to
the signals whereas the phase and the frequency of the signal are kept
unchanged..
For ex:
Think of amplitude modulation like adjusting the volume of your voice
to convey information. When you speak louder, it represents a higher
value, and when you speak softer, it represents a lower value. But you're
not changing the speed or pitch of your voice, just how loud it is. That's
how amplitude modulation works—it changes the "loudness" of the signal
while keeping everything else the same.
Phase Modulation: It is a type of modulation in which the phase of the
carrier signal is varied to represent the data being added to the signal.
Different information values are represented by different phases. For
example: ‘1’ may be represented by 0° while ‘0’ by 180°.
Imagine you're playing catch with a friend using a ball. With phase
modulation, you'd decide whether to start throwing the ball from your left
hand or your right hand to represent different messages. So, starting from
your left hand could mean '1', while starting from your right-hand means
'0'. You're not changing how hard you throw or how fast you throw the
ball—just where you start throwing it from. That's phase
modulation—changing the starting point to convey different information.
Flaws of Ethernet:
1. It can't be applied in real-time situations. Data delivery within a certain time frame is
necessary for real-time applications. Due to the high likelihood of collisions, Ethernet is
unreliable. The delivery of the data to its destination may be delayed due to an increased
number of collisions.
2. Applications requiring interaction cannot be utilized with it. Even extremely little amounts
of data must be delivered for interactive apps like chatting. The minimum data length
required by Ethernet is 46 bytes.
3. It is incompatible with client-server applications. Applications that use client-server
architecture demand that the server is prioritised over the client. Priorities cannot be set
in Ethernet.
4. DEFINITION
an FTP transaction, the end user's computer is typically called the local host. The second computer
involved in FTP is a remote host, which is usually a server. Both computers need to be connected via
a network and configured properly to transfer files via FTP. Servers must be set up to run FTP
services, and the client must have FTP software installed to access these services.
Although many file transfers can be conducted using Hypertext Transfer Protocol (HTTP) -- another
protocol in the TCP/IP suite -- FTP is still commonly used to transfer files behind the scenes for other
applications, such as banking services. It is also sometimes used to download new applications via
web browsers.
FTP is a client-server protocol that relies on two communications channels between the client and
server: a command channel for controlling the conversation and a data channel for transmitting file
content.
1. A user typically needs to log on to the FTP server, although some servers make some or all of
their content available without a login, a model known as anonymous FTP.
2. The client initiates a conversation with the server when the user requests to download a file.
3. Using FTP, a client can upload, download, delete, rename, move and copy files on a server.
FTP is used for file transfers between one system and another, and it has
several common use cases, including the following:
UDP Protocol:
UDP is a short form for User Datagram protocol. It is one of the
simplest transport layer protocol. It is a connectionless and
unreliable transport protocol.
This protocol is mainly designed in order to data send data packets over the
Internet.
This protocol does not add anything to the services of IP(Internet protocol)
except that UDP provides process-to-process communication rather than
host-to-host communication.
UDP performs a very limited amount of error checking.
This protocol uses the minimum number of overhead. Suppose if a process
wants to send a small message with no concern of reliability then it can make
the use of UDP.
This protocol simply takes the datagram from the network layer, attaches its
own header, and then sends it back to the user.
User Datagram
The UDP packets are commonly known as User Datagram and the size of the
header is fixed that is 8 bytes.
Let us now take a look at the format of User Datagram;
This port number is mainly used by the process that is running on the source host.
Its length is 16 bits which means that the port number can range from 0 to 65,535. It
is mainly used to identify the port of the sending or source application.
In case if the source host is a client (that mainly sends a request), then in most
cases the ephemeral port number is requested by the process and also chosen by
UDP software that runs on the source host.
But in the case of the server as a source host(mainly a server sending a response)
then the port number is a well-known port number in such cases.
This port number is mainly used by the process that is running on the destination
host. Its length is 16 bits.
If the destination host is the server ( a client sending the request), then the port
number is a well-known port number.
3.Length
This field of the datagram header is mainly used to identify the combined length of
UDP Header and Encapsulated data. It is a 16-bit field.
4.Checksum
The checksum calculation is although not mandatory in the User datagram protocol.
Characteristics of UDP
UDP is an unreliable and connectionless protocol.
It is almost a Null Protocol.
If the flow of data is in one direction, then it is a good protocol.
This protocol does not guarantee the delivery of the data.
No congestion control mechanism is provided by this protocol.
UDP offers Minimal transport services.
It is a stateless protocol.
1.Connectionless Services
The User datagram protocol offers Connectionless Services which simply means
that each user datagram that is sent by the UDP is an independent datagram. In
different datagrams, there is no relationship, even if they are coming from the same
source process and also going to the same destination program.
User datagrams are not numbered, there is no connection establishment and no
connection termination.
Each datagram mainly travels through different paths.
User datagram is a very simple and unreliable transport protocol. It does not provide
any flow control mechanism and hence there is no window mechanism. Due to which
the receiver may overflow with the incoming messages.
No error control mechanism is provided by UDP except checksum. Due to which the
sender does not know if any message is has been lost or duplicated.
As there is a lack of flow control and error control it means that the process that uses
the UDP should provide these mechanisms.
Applications of UDP
Given below are some applications of the User datagram protocol:
UDP is used by those applications that require one response for one request.
It is used by broadcasting and multicasting applications.
Management processes such as SNMP make use of UDP.
Route updating protocols like Routing Information Protocol(RIP) make use
of User Datagram Protocol.
The process that has an error and flows control mechanism makes use of
UDP. One Application for the same is Trivial File Transfer Protocol(TFTP).
Disadvantages of UDP
Now its time to take a look at UDP: