Telematics Chapter 3: Physical Layer

Total Page:16

File Type:pdf, Size:1020Kb

Telematics Chapter 3: Physical Layer Telematics User Server watching with video Chapter 3: Physical Layer video clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Data Link Layer Data Link Layer Data Link Layer Physical Layer Physical Layer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Computer Systems and Telematics (CST) Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Theoretical Basis for Data Communication ● Analog Data and Digital Signals ● Data Encoding ● Transmission Media ● Guided Transmission Media ● Wireless Transmission (see Mobile Communications) ● The Last Mile Problem ● Multiplexing ● Integrated Services Digital Network (ISDN) ● Digital Subscriber Line (DSL) ● Mobile Telephone System Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.3 Design Issues ● Connection parameters ● mechanical OSI Reference Model ● electric and electronic Application Layer ● functional and procedural Presentation Layer ● More detailed ● Physical transmission medium (copper cable, Session Layer optical fiber, radio, ...) ● Pin usage in network connectors Transport Layer ● Representation of raw bits (code, voltage,…) Network Layer ● Data rate ● Control of bit flow: Data Link Layer ● serial or parallel transmission of bits Physical Layer ● synchronous or asynchronous transmission ● simplex, half-duplex, or full-duplex transmission mode Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.4 Design Issues Transmitter Receiver Source Transmission System Destination NIC NIC Input Abcdef djasdja dak jd ashda kshd akjsd asdkjhasjd as kdjh askjda Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.5 Theoretical Basis of Data Communication Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.6 Signal Parameters ● The variable physical property of the signal which represent the data ● Spatial signals ● The values are functions of the space, i.e., memory space ● Time signals ● The values are functions of the time, i.e., S = S(t) ● Classification of signals (based on time and value space) ● Continuous-time, continuous-valued signals ● Discrete-time, continuous-valued signals ● Continuous-time, discrete-valued signals ● Discrete-time, discrete-valued signals Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.7 Types of Signals Time Continuous Discrete S(t) S(t) Analog Signal t t Continuous Value S(t) S(t) Digital Signal t t Discrete Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.8 Periodic and Digital Signals ● Periodic signals are the simplest S(t) signals S(t T) S(t) t ● Parameters of periodic signals: t ● Period T ● Frequency f =1/T T ● Amplitude S(t) S(t) ● Phase j t ● Examples: j ● Sine wave 2p ● Phase difference j S(t) ● Square wave t T Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.9 Composite Signals T1 Component with low frequency t (fix amplitude) Tn Component with high frequency t (fix amplitude) Composite voice signal with mixed frequencies and amplitudes. t Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.10 Composite Signals sin(2pft) ● A signal is made up of many frequencies 1 ● Example: s (t) sin(2pft) sin(2p (3 f )t) 3 ● Components of the signal are sine waves of frequencies f and 3f 1 sin(2p (3 f )t) ● Observations 3 ● Second frequency is multiple of the first one, which is denoted fundamental frequency ● The period of the composite signal is equal to the period of the 1 fundamental frequency sin(2pft) sin(2p (3 f )t) 3 Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.11 Composite Signals: Domain Concepts ● Frequency Domain Time Domain ● Specifies the constituent frequencies ● Spectrum of a signal is the range of frequencies it contains ● In the example from f to 3f ● The absolute bandwidth of the signal is the width of the spectrum Frequency Domain ● In the example 2f ● Many signals have infinite bandwidth ● Effective bandwidth ● Most energy is contained on a narrow band of frequencies Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.12 Composite Signals: Medium ● What can a medium transport? Attenuation (dB) ● A medium transports always a limited frequency-band. 1 Cutoff Frequencies 0 ● Bandwidth -1 ● Bandwidth in Hz [1/s] -2 ● Frequency range which can be transmitted over a medium -3 ● Bandwidth is the difference of the -4 highest and lowest frequency which Bandwidth -5 can be transmitted ● The cutoff is typically not sharp 0 1 2 3 4 Frequency (kHz) Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.13 Composite Signals ● Relationship between data rate 1 0 1 0 and bandwidth ● Square wave ● positive pulse 1-bit ● negative pulse 0-bit ● Duration of a pulse is ½ f ● Data rate is 2f bits per second Data 1 Data 2 ● Question ● What are the frequency components? Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.14 Composite Signals ● Relationship between data rate and bandwidth ● Signal made of: f, 3f, and 5f 1 1 sin( 2pft) sin(2p3 ft) sin(2p5 ft) 3 5 ● Signal made of: f, 3f, 5f, and 7f 1 1 1 sin( 2pft) sin(2p3 ft) sin(2p5 ft) sin(2p 7 ft) 3 5 7 ● Square waves can be expressed as 4 1 s(t) A sin(2pkft) p k k1,k odd 1 0 1 0 ● Infinite number of components ● Amplitude of the k-th component is only 1/k ● What happens if k is limited? Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.15 Effect of Bandwidth on a Digital Signal Bits: 0 1 0 0 0 0 1 0 0 0 Ideal, requires infinite Bit rate 2000 bps 1/400 s bandwidth! Bandwidth 500 Hz 1. Harmonic Bandwidth 900 Hz 1.+2. Harmonics Bandwidth 1300 Hz 1.-3. Harmonics Bandwidth 1700 Hz 1.-4. Harmonics Bandwidth 2500 Hz 1.-5. Harmonics t Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.16 Composite Signals ● Relationship between data rate and bandwidth ● Example 1 1 0 ● f = 106 Hz = 1 MHz ● The fundamental frequency ● Bandwidth of the signal s(t) (5×106 Hz) – (1×106 Hz) = 4 MHz ● T = 1/f = 1/106s = 10-6s = 1µs ● 1 bit occurs every 0.5µs 1 1 Data rate = 2 bit × 106 Hz = 2 Mbps s(t) sin(2pft) sin(2p3 ft) sin(2p5 ft) 3 5 ● Example 2 ● f = 2 MHz ● Bandwidth (5×2MHz) – (1×2MHz) = 8 MHz ● T = 1/f = 0.5µs ● 1 bit occurs every 0.25µs Data rate = 2 bit × 2 MHz = 4 Mbps Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.17 Symbol Rate 1 2 3 4 5 6 7 8 S(t) t T Takt Example: 1s Symbol rate 5 baud [1/s] Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.18 Binary and Multilevel Digital Signals ● Binary digital signal ● A digital signal with two possible values, e.g., 0 and 1 ● Multilevel digital signal ● A digital signal with more than two possible values, e.g., DIBIT = two bits per coordinate value (quaternary signal element) ● The number of discrete values which a signal may have are denoted as follows ● n = 2 binary ● n = 3 ternary ● n = 4 quaternary ● ... ● n = 8 octonary ● n = 10 denary Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.19 Multilevel Digital Signal Signal steps (amplitude value) 11 +2 10 +1 t 01 -1 00 -2 Quaternary 01 10 11 00 01 01 10 00 00 00 01 00 00 code Time 1 2 3 4 5 6 7 8 9 10 11 12 13 Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.20 Symbol rate vs. Data rate ● Symbol rate v (modulation rate, digit rate) ● The number of symbol changes (signaling events) made to the transmission medium per second ● Unit 1/s = baud (abbrv. bd) ● Data rate (Unit bps, bit/s) ● For binary signals Data rate [bps] = v [baud] ● Each signaling event codes one bit ● For multilevel signals (n possible values) Data rate [bps] = v × ld(n) ● DIBIT 1 baud = 2 bps (quaternary signal) ● TRIBIT 1 baud = 3 bps (octonary signal) Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.21 Units of Bit Rates Name of bit rate Symbol Multiple Explicit Bit per second bps 100 1 Kilobit per second kbps 103 1,000 Megabit per second Mbps 106 1,000,000 Gigabit per second Gbps 109 1,000,000,000 Terabit per second Tbps 1012 1,000,000,000,000 Petabit per second Pbps 1015 1,000,000,000,000,000 Do not confuse with binary prefixes ● 1 byte = 8 bit (also called octet in telco standards) ● today 8 bit, term coined in 1956 by Werner Buchholz, in general a unit of digital data to describe a group of bits as the smallest amount of data that a processor could process ● 1 kbyte = 210 byte = 1024 byte In this case kilo = 1024 ● Typically 2x in storage technology, 10x in transmission technology Univ.-Prof.
Recommended publications
  • Data Communication and Computer Network Unit 1
    Department of Collegiate Education GOVERNMENT FIRST GRADE COLLEGE RAIBAG-591317 Department of Computer Science Lecture Notes SUBJECT : DATA COMMUNICATIONS AND COMPUTER NETWORKS SUBJECT CODE : 17BScCST61 CLASS : BSC VI Sem Paper-1 Subject In charge Smt Bhagirathi Halalli Assistant Professor 2019-20 Data Communication and Computer Network Unit 1 Unit 1: Introduction Content: 1.1. Data communications, 1.2. Networks, 1.3. The internet, 1.4. Protocols and standards, 1.5. Network models – OSI model, 1.6. TCP/IP protocol suite, 1.7. Addressing. 1.1.Data Communications, Data refers to the raw facts that are collected while information refers to processed data that enables us to take decisions. Ex. When result of a particular test is declared it contains data of all students, when you find the marks you have scored you have the information that lets you know whether you have passed or failed. The word data refers to any information which is presented in a form that is agreed and accepted upon by is creators and users. Data Communication Data Communication is a process of exchanging data or information In case of computer networks this exchange is done between two devices over a transmission medium. This process involves a communication system which is made up of hardware and software. The hardware part involves the sender and receiver devices and the intermediate devices through which the data passes. The software part involves certain rules which specify what is to be communicated, how it is to be communicated and when. It is also called as a Protocol. The following sections describe the fundamental characteristics that are important for the effective working of data communication process and are followed by the components that make up a data communications system.
    [Show full text]
  • The OSI Model
    Data Encapsulation & OSI & TCP/IP Models Week 2 Lecturer: Lucy White [email protected] Office : 324 1 Network Protocols • A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate. Protocols determine the format, timing, sequencing, flow control and error control in data communication. Without protocols, the computer cannot make or rebuild the stream of incoming bits from another computer into the original format. • Protocols control all aspects of data communication, which include the following: - How the physical network is built - How computers connect to the network - How the data is formatted for transmission - The setting up and termination of data transfer sessions - How that data is sent - How to deal with errors 2 Protocol Suites & Industry Standard • Many of the protocols that comprise a protocol suite reference other widely utilized protocols or industry standards • Institute of Electrical and Electronics Engineers (IEEE) or the Internet Engineering Task Force (IETF) • The use of standards in developing and implementing protocols ensures that products from different manufacturers can work together for efficient communications 3 Function of Protocol in Network Communication A standard is a process or protocol that has been endorsed by the networking industry and ratified by a standards organization 4 Protocol Suites TCP/IP Protocol Suite and Communication Function of Protocol in Network Communication 6 Function of Protocol in Network Communication • Technology independent Protocols -Many diverse types of devices can communicate using the same sets of protocols. This is because protocols specify network functionality, not the underlying technology to support this functionality.
    [Show full text]
  • Shahabi-Adib-Masc-ECE-August
    A New Line Code for a Digital Communication System by Adib Shahabi Submitted in partial fulfilment of the requirements for the degree of Master of Applied Science at Dalhousie University Halifax, Nova Scotia August 2019 © Copyright by Adib Shahabi, 2019 To my wife Shahideh ii TABLE OF CONTENTS LIST OF TABLES ............................................................................................................ v LIST OF FIGURES .......................................................................................................... vi ABSTRACT ....................................................................................................................viii LIST OF ABBREVIATIONS USED ............................................................................... ix ACKNOWLEDGEMENTS ............................................................................................... x CHAPTER 1 INTRODUCTION ....................................................................................... 1 1.1 BACKGROUND ........................................................................................... 1 1.2 THESIS SYNOPSIS ...................................................................................... 4 1.3 ORGANIZATION OF THE THESIS ............................................................ 5 CHAPTER 2 MODELLING THE LINE CHANNEL ....................................................... 7 2.1 CABLE MODELLING .................................................................................. 7 2.2 TRANSFORMER COUPLING ..................................................................
    [Show full text]
  • Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks
    ICST Transactions on Mobile Communications and Applications Research Article Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks Jun Li ∗, Mylene` Toulgoat, Yifeng Zhou, and Louise Lamont Communications Research Centre Canada, 3701 Carling Avenue, Ottawa, ON. K2H 8S2 Canada Abstract With recent developments in terrestrial wireless networks and advances in acoustic communications, multichannel technologies have been proposed to be used in underwater networks to increase data transmission rate over bandwidth-limited underwater channels. Due to high bit error rates in underwater networks, an efficient error control technique is critical in the logical link control (LLC) sublayer to establish reliable data communications over intrinsically unreliable underwater channels. In this paper, we propose a novel protocol stack architecture featuring cross-layer design of LLC sublayer and more efficient packet- to-channel scheduling for multichannel underwater sensor networks. In the proposed stack architecture, a selective-repeat automatic repeat request (SR-ARQ) based error control protocol is combined with a dynamic channel scheduling policy at the LLC sublayer. The dynamic channel scheduling policy uses the channel state information provided via cross-layer design. It is demonstrated that the proposed protocol stack architecture leads to more efficient transmission of multiple packets over parallel channels. Simulation studies are conducted to evaluate the packet delay performance of the proposed cross-layer protocol stack architecture with two different scheduling policies: the proposed dynamic channel scheduling and a static channel scheduling. Simulation results show that the dynamic channel scheduling used in the cross-layer protocol stack outperforms the static channel scheduling. It is observed that, when the dynamic channel scheduling is used, the number of parallel channels has only an insignificant impact on the average packet delay.
    [Show full text]
  • Physical Layer Overview
    ELEC3030 (EL336) Computer Networks S Chen Physical Layer Overview • Physical layer forms the basis of all networks, and we will first revisit some of fundamental limits imposed on communication media by nature Recall a medium or physical channel has finite Spectrum bandwidth and is noisy, and this imposes a limit Channel bandwidth: on information rate over the channel → This H Hz is a fundamental consideration when designing f network speed or data rate 0 H Type of medium determines network technology → compare wireless network with optic network • Transmission media can be guided or unguided, and we will have a brief review of a variety of transmission media • Communication networks can be classified as switched and broadcast networks, and we will discuss a few examples • The term “physical layer protocol” as such is not used, but we will attempt to draw some common design considerations and exams a few “physical layer standards” 13 ELEC3030 (EL336) Computer Networks S Chen Rate Limit • A medium or channel is defined by its bandwidth H (Hz) and noise level which is specified by the signal-to-noise ratio S/N (dB) • Capability of a medium is determined by a physical quantity called channel capacity, defined as C = H log2(1 + S/N) bps • Network speed is usually given as data or information rate in bps, and every one wants a higher speed network: for example, with a 10 Mbps network, you may ask yourself why not 10 Gbps? • Given data rate fd (bps), the actual transmission or baud rate fb (Hz) over the medium is often different to fd • This is for
    [Show full text]
  • Criteria for Choosing Line Codes in Data Communication
    ISTANBUL UNIVERSITY – YEAR : 2003 (843-857) JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING VOLUME : 3 NUMBER : 2 CRITERIA FOR CHOOSING LINE CODES IN DATA COMMUNICATION Demir Öner Istanbul University, Engineering Faculty, Electrical and Electronics Engineering Department Avcılar, 34850, İstanbul, Turkey E-mail: [email protected] ABSTRACT In this paper, line codes used in data communication are investigated. The need for the line codes is emphasized, classification of line codes is presented, coding techniques of widely used line codes are explained with their advantages and disadvantages and criteria for chosing a line code are given. Keywords: Line codes, correlative coding, criteria for chosing line codes.. coding is either performed just before the 1. INTRODUCTION modulation or it is combined with the modulation process. The place of line coding in High-voltage-high-power pulse current The transmission systems is shown in Figure 1. purpose of applying line coding to digital signals before transmission is to reduce the undesirable The line coder at the transmitter and the effects of transmission medium such as noise, corresponding decoder at the receiver must attenuation, distortion and interference and to operate at the transmitted symbol rate. For this ensure reliable transmission by putting the signal reason, epecially for high-speed systems, a into a form that is suitable for the properties of reasonably simple design is usually essential. the transmission medium. For example, a sampled and quantized signal is not in a suitable form for transmission. Such a signal can be put 2. ISSUES TO BE CONSIDERED IN into a more suitable form by coding the LINE CODING quantized samples.
    [Show full text]
  • Data Networks
    Second Ed ition Data Networks DIMITRI BERTSEKAS Massachusetts Institute of Technology ROBERT GALLAGER Massachusetts Institute ofTechnology PRENTICE HALL, Englewood Cliffs, New Jersey 07632 2 Node A Node B Time at B --------- Packet 0 Point-to-Point Protocols and Links 2.1 INTRODUCTION This chapter first provides an introduction to the physical communication links that constitute the building blocks of data networks. The major focus of the chapter is then data link control (i.e., the point-to-point protocols needed to control the passage of data over a communication link). Finally, a number of point-to-point protocols at the network, transport, and physical layers are discussed. There are many similarities between the point-to-point protocols at these different layers, and it is desirable to discuss them together before addressing the more complex network-wide protocols for routing, flow control, and multiaccess control. The treatment of physical links in Section 2.2 is a brief introduction to a very large topic. The reason for the brevity is not that the subject lacks importance or inherent interest, but rather, that a thorough understanding requires a background in linear system theory, random processes, and modem communication theory. In this section we pro­ vide a sufficient overview for those lacking this background and provide a review and perspective for those with more background. 37 38 Point-to-Point Protocols and Links Chap. 2 In dealing with the physical layer in Section 2.2, we discuss both the actual com­ munication channels used by the network and whatever interface modules are required at the ends of the channels to transmit and receive digital data (see Fig 2.1).
    [Show full text]
  • Radio Communications in the Digital Age
    Radio Communications In the Digital Age Volume 1 HF TECHNOLOGY Edition 2 First Edition: September 1996 Second Edition: October 2005 © Harris Corporation 2005 All rights reserved Library of Congress Catalog Card Number: 96-94476 Harris Corporation, RF Communications Division Radio Communications in the Digital Age Volume One: HF Technology, Edition 2 Printed in USA © 10/05 R.O. 10K B1006A All Harris RF Communications products and systems included herein are registered trademarks of the Harris Corporation. TABLE OF CONTENTS INTRODUCTION...............................................................................1 CHAPTER 1 PRINCIPLES OF RADIO COMMUNICATIONS .....................................6 CHAPTER 2 THE IONOSPHERE AND HF RADIO PROPAGATION..........................16 CHAPTER 3 ELEMENTS IN AN HF RADIO ..........................................................24 CHAPTER 4 NOISE AND INTERFERENCE............................................................36 CHAPTER 5 HF MODEMS .................................................................................40 CHAPTER 6 AUTOMATIC LINK ESTABLISHMENT (ALE) TECHNOLOGY...............48 CHAPTER 7 DIGITAL VOICE ..............................................................................55 CHAPTER 8 DATA SYSTEMS .............................................................................59 CHAPTER 9 SECURING COMMUNICATIONS.....................................................71 CHAPTER 10 FUTURE DIRECTIONS .....................................................................77 APPENDIX A STANDARDS
    [Show full text]
  • Preface Towards the Reality of Petabit Networks
    Preface Towards the Reality of Petabit Networks Yukou Mochida Member of the Board Fujitsu Laboratories Ltd. The telecommunications world is shifting drastically from voice oriented telephone networks to data oriented multimedia networks based on the Internet protocol (IP). Telecommunication carriers are positively extending their service attributes to new applications, and suppliers are changing their business areas and models, conforming to the radical market changes. The Internet, which was originally developed for correspondence among researchers, has evolved into a global communi- cations platform. Improvements in security technology are encouraging businesses to integrate the Internet into their intranets, and the eco- nomic world and basic life styles are being changed by the many new Internet-based services, for example, electronic commerce (EC), that have become available. This revolutionary change in telecommunications seems to come mainly from three motive forces. The first is the information society that has come into being with the wide and rapid deployment of person- al computers and mobile communications. The second is the worldwide deregulation and the resulting competitive telecommunications envi- ronment, which facilitates active investment in the growing market to construct huge-capacity networks for exploding traffic. The third is photonic networks based on wavelength division multiplexing (WDM) technology, which can greatly increase the communication capacity and drastically decrease the transmission cost per channel. Photonic net- works are attractive because they can also radically improve node throughput and offer transparency and flexibility while accommodating different signal formats and protocols, expandability for cost-effective gradual deployment, and high reliability, which is strongly required for a secure information society.
    [Show full text]
  • Android and Wireless Data-Extraction Using Wi-Fi
    Android and Wireless data-extraction using Wi-Fi Bert Busstra N-A. Le-Khac, M-Tahar Kechadi School of Computer Science & Informatics School of Computer Science & Informatics University College Dublin University College Dublin Dublin 4, Ireland Dublin 4, Ireland [email protected] {an.lekhac, tahar.kechadi}@ucd.ie Abstract—Today, mobile phones are very popular, fast growing To investigate a mobile device an investigator needs to technology. Mobile phones of the present day are more and more interact with the device directly. The examiner must be like small computers. The so-called "smartphones" contain a sufficiently trained to examine the device. He has to think wealth of information each. This information has been proven to before he acts, because he must know exactly what effects his be very useful in crime investigations, because relevant evidence actions have on the data, and he must be prepared to prove it. If can be found in data retrieved from mobile phones used by criminals. In traditional methods, the data from mobile phones the examiner did change the data, he must be prepared to can be extracted using an USB-cable. However, for some reason explain why it was necessary and what data has changed. For this USB-cable connection cannot be made, the data should be this reason the examiner should document every action taken. extracted in an alternative way. In this paper, we study the In a traditional way, the data from mobile devices can be possibility of extracting data from mobile devices using a Wi-Fi extracted using an USB-cable.
    [Show full text]
  • How Many Bits Are in a Byte in Computer Terms
    How Many Bits Are In A Byte In Computer Terms Periosteal and aluminum Dario memorizes her pigeonhole collieshangie count and nagging seductively. measurably.Auriculated and Pyromaniacal ferrous Gunter Jessie addict intersperse her glockenspiels nutritiously. glimpse rough-dries and outreddens Featured or two nibbles, gigabytes and videos, are the terms bits are in many byte computer, browse to gain comfort with a kilobyte est une unité de armazenamento de armazenamento de almacenamiento de dados digitais. Large denominations of computer memory are composed of bits, Terabyte, then a larger amount of nightmare can be accessed using an address of had given size at sensible cost of added complexity to access individual characters. The binary arithmetic with two sets render everything into one digit, in many bits are a byte computer, not used in detail. Supercomputers are its back and are in foreign languages are brainwashed into plain text. Understanding the Difference Between Bits and Bytes Lifewire. RAM, any sixteen distinct values can be represented with a nibble, I already love a Papst fan since my hybrid head amp. So in ham of transmitting or storing bits and bytes it takes times as much. Bytes and bits are the starting point hospital the computer world Find arrogant about the Base-2 and bit bytes the ASCII character set byte prefixes and binary math. Its size can vary depending on spark machine itself the computing language In most contexts a byte is futile to bits or 1 octet In 1956 this leaf was named by. Pages Bytes and Other Units of Measure Robelle. This function is used in conversion forms where we are one series two inputs.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]