Solution 64 user manual




















Need an account? Click here to sign up. Download Free PDF. Faizan Tahir. A short summary of this paper. Download Download PDF. Translate PDF. The five components of a data communication system are the sender, receiver, transmission medium, message, and protocol.

The advantages of distributed processing are security, access to distributed data- bases, collaborative processing, and faster problem solving. The three criteria are performance, reliability, and security. Advantages of a multipoint over a point-to-point configuration type of connec- tion include ease of installation and low cost.

Line configurations or types of connections are point-to-point and multipoint. We can divide line configuration in two broad categories: a. Point-to-point: mesh, star, and ring. Multipoint: bus 7. In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities can send at the same time. We give an advantage for each of four network topologies: a. Mesh: secure b. Bus: easy installation c. Star: robust d.

Ring: easy fault isolation 9. The number of cables for each type of network is: a. Star: n c. Bus: one backbone and n drop lines The general factors are size, distances covered by the network , structure, and ownership. An internet is an interconnection of networks. The Internet is the name of a spe- cific worldwide network A protocol defines what is communicated, in what way and when. This provides accurate and timely transfer of information between different devices on a net- work.

Standards are needed to create and maintain an open and competitive market for manufacturers, to coordinate protocol rules, and thus guarantee compatibility of data communication technologies. Exercises Unicode uses 32 bits to represent a symbol or a character. We can define differ- ent symbols or characters. With 16 bits, we can represent up to different colors.

Mesh topology: If one connection fails, the other connections will still be work- ing. Star topology: The other devices will still be able to send data through the hub; there will be no access to the device which has the failed connection to the hub.

Bus Topology: All transmission stops if the failure is in the bus. If the drop-line fails, only the corresponding device cannot operate. Ring Topology: The failed connection may disable the whole network unless it is a dual ring or there is a by-pass mechanism.

This is a LAN. Theoretically, in a ring topology, unplugging one station, interrupts the ring. How- ever, most ring networks use a mechanism that bypasses the station; the ring can continue its operation. In a bus topology, no station is in the path of the signal. Unplugging a station has no effect on the operation of the rest of the network.

See Figure 1. E-mail is not an interactive application. Even if it is delivered immediately, it may stay in the mail-box of the receiver for a while. It is not sensitive to delay. We normally do not expect a file to be copied immediately. It is not very sensi- tive to delay. Surfing the Internet is the an application very sensitive to delay. We except to get access to the site we are searching. In this case, the communication is only between a caller and the callee.

A dedi- cated line is established between them. The connection is point-to-point. The telephone network was originally designed for voice communication; the Internet was originally designed for data communication.

The two networks are similar in the fact that both are made of interconnections of small networks. The telephone network, as we will see in future chapters, is mostly a circuit-switched network; the Internet is mostly a packet-switched network. The Internet model, as discussed in this chapter, include physical, data link, net- work, transport, and application layers.

The network support layers are the physical, data link, and network layers. The application layer supports the user. The transport layer is responsible for process-to-process delivery of the entire message, whereas the network layer oversees host-to-host delivery of individual packets. Peer-to-peer processes are processes on two or more devices communicating at a same layer 6. Each layer calls upon the services of the layer just below it using interfaces between each pair of adjacent layers.

Headers and trailers are control data added at the beginning and the end of each data unit at each layer of the sender and removed at the corresponding layers of the receiver. They provide source and destination addresses, synchronization points, information for error detection, etc.

The physical layer is responsible for transmitting a bit stream over a physical medium. It is concerned with a. The data link layer is responsible for a. The network layer is concerned with delivery of a packet across multiple net- works; therefore its responsibilities include a. The transport layer oversees the process-to-process delivery of the entire message. It is responsible for a.

The physical address is the local address of a node; it is used by the data link layer to deliver data from one node to another within the same network. The logical address defines the sender and receiver at the network layer and is used to deliver messages across multiple networks. The port address service-point identifies the application process on the station. The application layer services include file transfer, remote access, shared data- base management, and mail services.

The application, presentation, and session layers of the OSI model are represented by the application layer in the Internet model. The lowest four layers of OSI corre- spond to the Internet model layers. The International Standards Organization, or the International Organization of Standards, ISO is a multinational body dedicated to worldwide agreement on international standards. Route determination: network layer b. Flow control: data link and transport layers c.

Interface to transmission media: physical layer d. Access for the end user: application layer Reliable process-to-process delivery: transport layer b. Route selection: network layer c. Defining frames: data link layer d. Providing user services: application layer e. Transmission of bits across the medium: physical layer Error correction and retransmission: data link and transport layers c. Responsibility for carrying frames between adjacent nodes: data link layer Format and code conversion services: presentation layer b.

Establishing, managing, and terminating sessions: session layer c. Ensuring reliable transmission of data: data link and transport layers d. Log-in and log-out procedures: session layer e. Providing independence from different data representation: presentation layer See Figure 2.

Figure 2. If the corrupted destination address does not match any station address in the net- work, the packet is lost. If the corrupted destination address matches one of the sta- tions, the frame is delivered to the wrong station. In this case, however, the error detection mechanism, available in most data link protocols, will find the error and discard the frame.

In both cases, the source will somehow be informed using one of the data link control mechanisms discussed in Chapter Before using the destination address in an intermediate or the destination node, the packet goes through error checking that may help the node find the corruption with a high probability and discard the packet.

Normally the upper layer protocol will inform the source to resend the packet. Most protocols issue a special error message that is sent back to the source in this case.

The errors between the nodes can be detected by the data link layer control, but the error at the node between input port and output port of the node cannot be detected by the data link layer. Frequency and period are the inverse of each other. The amplitude of a signal measures the value of the signal at any point. The fre- quency of a signal refers to the number of periods in one second.

The phase describes the position of the waveform relative to time zero. Using Fourier analysis. Fourier series gives the frequency domain of a periodic signal; Fourier analysis gives the frequency domain of a nonperiodic signal. Three types of transmission impairment are attenuation, distortion, and noise.

Baseband transmission means sending a digital or an analog signal without modu- lation using a low-pass channel. Broadband transmission means modulating a digital or an analog signal using a band-pass channel. A low-pass channel has a bandwidth starting from zero; a band-pass channel has a bandwidth that does not start from zero. The Nyquist theorem defines the maximum bit rate of a noiseless channel. The Shannon capacity determines the theoretical maximum bit rate of a noisy channel.

Optical signals have very high frequencies. A signal is periodic if its frequency domain plot is discrete; a signal is nonperi- odic if its frequency domain plot is continuous. The frequency domain of a voice signal is normally continuous because voice is a nonperiodic signal. An alarm system is normally periodic. Its frequency domain plot is therefore dis- crete. This is baseband transmission because no modulation is involved.

This is broadband transmission because it involves modulation. See Figure 3. We know the lowest frequency, We know the bandwidth is Each signal is a simple signal in this case. The bandwidth of a simple signal is zero. So the bandwidth of both signals are the same. There are 8 bits in 16 ns. The signal makes 8 cycles in 4 ms. The signal is periodic, so the frequency domain is made of discrete frequencies.

Figure 3. Frequency 10 30 KHz KHz The signal is nonperiodic, so the frequency domain is made of a continuous spec- trum of frequencies as shown in Figure 3.

The signal is amplified by a factor With a 1-Mbps channel, it takes 16 s. However, power is proportional to the square of voltage. We can approximately calculate the capacity as a.

When the SNR is doubled, the data rate increases slightly. This means a bit occupies meters on a transmission medium. This means a bit occupies 20 meters on a transmission medium. This means a bit occupies 2 meters on a transmission medium. The three different techniques described in this chapter are line coding, block cod- ing, and scrambling.

A data element is the smallest entity that can represent a piece of information a bit. A signal element is the shortest unit of a digital signal.

Data elements are what we need to send; signal elements are what we can send. Data elements are being carried; signal elements are the carriers. The data rate defines the number of data elements bits sent in 1s. The unit is bits per second bps. The signal rate is the number of signal elements sent in 1s. The unit is the baud. In decoding a digital signal, the incoming signal power is evaluated against the baseline a running average of the received signal power.

A long string of 0s or 1s can cause baseline wandering a drift in the baseline and make it difficult for the receiver to decode correctly. When the voltage level in a digital signal is constant for a while, the spectrum cre- ates very low frequencies, called DC components, that present problems for a sys- tem that cannot pass low frequencies. A self-synchronizing digital signal includes timing information in the data being transmitted.

This can be achieved if there are transitions in the signal that alert the receiver to the beginning, middle, or end of the pulse. In this chapter, we introduced unipolar, polar, bipolar, multilevel, and multitran- sition coding. Block coding provides redundancy to ensure synchronization and to provide inher- ent error detecting. In general, block coding changes a block of m bits into a block of n bits, where n is larger than m.

Scrambling, as discussed in this chapter, is a technique that substitutes long zero- level pulses with a combination of other levels without increasing the number of bits.

PCM finds the value of the signal amplitude for each sample; DM finds the change between two consecutive samples. In parallel transmission we send data several bits at a time. In serial transmission we send data one bit at a time. We mentioned synchronous, asynchronous, and isochronous. In both synchro- nous and asynchronous transmissions, a bit stream is divided into independent frames.

In synchronous transmission, the bytes inside each frame are synchro- nized; in asynchronous transmission, the bytes inside each frame are also indepen- dent.

In isochronous transmission, there is no independency at all. All bits in the whole stream must be synchronized. The number of bits is calculated as 0.

See Figure 4. Figure 4. Bandwidth is proportional to 4. Bandwidth is proportional to B is proportional to 5. The data stream can be found as a. NRZ-I: Differential Manchester: AMI: The data rate is Kbps. We then use Figure 4. All calculations are approximations. The output stream is The maximum length of consecutive 0s in the input stream is The maximum length of consecutive 0s in the output stream is 2.

The number of unused code sequences is Since we specified that the last non-zero signal is positive, the first bit in our sequence is positive. HDB3 In a low-pass signal, the minimum frequency 0. In a bandpass signal, the maximum frequency is equal to the minimum fre- quency plus the bandwidth. In a lowpass signal, the minimum frequency is 0. Note that we assume only one stop bit and one start bit. Some systems send more start bits.

For case b, we send extra for required bits. Normally, analog transmission refers to the transmission of analog signals using a band-pass channel. Baseband digital or analog signals are converted to a complex analog signal with a range of frequencies suitable for the channel.

A carrier is a single-frequency signal that has one of its characteristics amplitude, frequency, or phase changed to represent the baseband signal. The process of changing one of the characteristics of an analog signal based on the information in digital data is called digital-to-analog conversion. It is also called modulation of a digital signal. The baseband digital signal representing the digital data modulates the carrier to create a broadband analog signal.

ASK changes the amplitude of the carrier. FSK changes the frequency of the carrier. PSK changes the phase of the carrier. QAM changes both the amplitude and the phase of the carrier. We can say that the most susceptible technique is ASK because the amplitude is more affected by noise than the phase or frequency. A constellation diagram can help us define the amplitude and phase of a signal element, particularly when we are using two carriers. In a constellation diagram, a signal element type is represented as a dot.

The bit or combination of bits it can carry is often written next to it. The diagram has two axes. The horizontal X axis is related to the in-phase carrier; the vertical Y axis is related to the quadrature carrier. The two components of a signal are called I and Q.

The I component, called in- phase, is shown on the horizontal axis; the Q component, called quadrature, is shown on the vertical axis. It is also called the modulation of an analog signal; the baseband analog signal modulates the carrier to create a broadband analog signal. AM changes the amplitude of the carrier b. FM changes the frequency of the carrier c. PM changes the phase of the carrier We can say that the most susceptible technique is AM because the amplitude is more affected by noise than the phase or frequency.

See Figure 5. We have two signal elements with peak amplitudes 1 and 3. The phase of both signal elements are the same, which we assume to be 0 degrees. We have two signal elements with the same peak amplitude of 2. However, there must be degrees difference between the two phases. We assume one phase to be 0 and the other degrees. We have four signal elements with the same peak amplitude of 3. However, there must be 90 degrees difference between each phase.

We assume the first phase to be at 45, the second at , the third at , and the fourth at degrees. Note that this is one out of many configurations. ASK b. QPSK d. As long as the differences are 90 degrees, the solution is satisfactory.

We have four phases, which we select to be the same as the previous case. For each phase, however, we have two amplitudes, 1 and 3 as shown in the figure. The phases can be at 0, 90, , and As long as the differences are 90 degrees, the solution is satisfac- tory.

This is ASK. There are two peak amplitudes both with the same phase 0 degrees. The distance between each dot and the origin is 3. However, we have two phases, 0 and degrees. This is also BPSK. The peak amplitude is 2, but this time the phases are 90 and degrees.

The number of points define the number of levels, L. The number of bits per baud is the value of r. This means that that we need a QAM technique to achieve this data rate. We calculate the number of channels, not the number of coexisting stations.

Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. In multiplexing, the word link refers to the physical path. The word channel refers to the portion of a link that carries a transmission between a given pair of lines. One link can have many n channels. TDM is used to combine digital signals; the time is shared. To maximize the efficiency of their infrastructure, telephone companies have tradi- tionally multiplexed analog signals from lower-bandwidth lines onto higher-band- width lines.

To maximize the efficiency of their infrastructure, telephone companies have tradi- tionally multiplexed digital signals from lower data rate lines onto higher data rate lines. WDM is common for multiplexing optical signals because it allows the multiplex- ing of signals with a very high frequency.

In multilevel TDM, some lower-rate lines are combined to make a new line with the same data rate as the other lines. Multiple slot TDM, on the other hand, uses multiple slots for higher data rate lines to make them compatible with the lower data rate line. Pulse stuffing TDM is used when the data rates of some lines are not an integral multiple of other lines. In synchronous TDM, each input has a reserved slot in the output frame.

This can be inefficient if some input lines have no data to send. In spread spectrum, we spread the bandwidth of a signal into a larger bandwidth. Spread spectrum techniques add redundancy; they spread the original spectrum needed for each station. The expanded bandwidth allows the source to wrap its message in a protective envelope for a more secure transmission. The frequency hopping spread spectrum FHSS technique uses M different car- rier frequencies that are modulated by the source signal.

At one moment, the signal modulates one carrier frequency; at the next moment, the signal modulates another carrier frequency.

The direct sequence spread spectrum DSSS technique expands the bandwidth of the original signal. It replaces each data bit with n bits using a spreading code. To multiplex 10 voice channels, we need nine guard bands. The required band- Each output frame carries 1 bit from each source plus one extra bit for synchro- b. Each frame carries 1 bit from each source. In each frame 20 bits out of 21 are useful. Each output frame carries 2 bits from each source plus one extra bit for syn- b.

Each frame carries 2 bit from each source. The output data rate here is slightly less than the one in Exercise In each frame 40 bits out of 41 are useful. Effi- ciency is better than the one in Exercise We can assume that we have only 6 input lines. Each frame needs to carry one character from each of these lines.

We combine six kbps sources into three kbps. Now we have seven kbps channel. Each output frame carries 1 bit from each of the seven kbps line.

Frame b. Each frame carries 1 bit from each kbps source. We can also synchronizing bits. The frame carries 4 bits from each of the first two sources and 3 bits from each b.

Each frame carries 4 bit from each kbps source or 3 bits from each kbps. We can also synchronization bits. Now we have two sources, each of Kbps.

The frame carries 1 bit from each source. Here the output bit rate is greater than the sum of the input rates kbps because of extra bits added to the second source. Each frame carries one extra bit. See Figure 6. Figure 6. This means that the The Barker chip is 11 bits, which means that it increases the bit rate 11 times. The transmission media is located beneath the physical layer and controlled by the physical layer. The two major categories are guided and unguided media.

Guided media have physical boundaries, while unguided media are unbounded. The three major categories of guided media are twisted-pair, coaxial, and fiber- optic cables. Twisting ensures that both wires are equally, but inversely, affected by external influences such as noise.

Refraction and reflection are two phenomena that occur when a beam of light travels into a less dense medium. When the angle of incidence is less than the crit- ical angle, refraction occurs.

The beam crosses the interface into the less dense medium. When the angle of incidence is greater than the critical angle, reflection occurs. The beam changes direction at the interface and goes back into the more dense medium.

The inner core of an optical fiber is surrounded by cladding. The core is denser than the cladding, so a light beam traveling through the core is reflected at the boundary between the core and the cladding if the incident angle is more than the critical angle. We can mention three advantages of optical fiber cable over twisted-pair and coax- ial cables: noise resistance, less signal attenuation, and higher bandwidth. In sky propagation radio waves radiate upward into the ionosphere and are then reflected back to earth.

In line-of-sight propagation signals are transmitted in a straight line from antenna to antenna. Omnidirectional waves are propagated in all directions; unidirectional waves are propagated in one direction. See Table 7. Table 7. As the Table 7. If we consider the bandwidth to start from zero, we can say that the bandwidth decreases with distance.

For example, if we can tol- erate a maximum attenuation of 50 dB loss , then we can give the following list- ing of distance versus bandwidth. We can use Table 7. As Table 7. This means all three figures represent the a. The wave length is the inverse of the frequency if the propagation speed is same thing. We can change the wave length to frequency. For example, the value nm can be written as THz. The curve must be flipped horizontally. Therefore, we have: a. See Figure 7.

Figure 7. The incident angle 40 degrees is smaller than the critical angle 60 degrees. We have refraction. The light ray enters into the less dense medium. The incident angle 60 degrees is the same as the critical angle 60 degrees. The light ray travels along the interface. The incident angle 80 degrees is greater than the critical angle 60 degrees. We have reflection. The light ray returns back to the more dense medium. Previous Page. Next Page. Bosch Solution 64 User Manual 32 pages.

Page 5: Introduction When you turn your system on, you have the option of turning Listed below are the main features of the Solution 64 control on all zones All On , or just some of the zones Part On. Refer panel.

During the last Exit The area is turned off. Delay 10 seconds fast short beeps will be heard. Opening a designated door e. Use this function to turn an area All On. The Solution 64 control front door will start entry time.

During entry time, the keypad panel is factory default only for one area. The keypad will now prompt you to enter your new PIN again. A list of users will display on the keypad. This section outlines various commands that control individual areas. The keypad will display the exit time bar to prompt you to exit all areas. You should leave all areas now. To properly experience our LG. Skip to Contents Skip to Accessibility Help.

AUS Request a Repair. Register a Product Support Home. See Warranty Information Close. Refer to the detailed Warranty information delivered in your product packaging. Please have the Serial number of your product and proof of purchase ready. Out-of-warranty service fees may apply for diagnosis, parts, and labor. Help Library See more. Still not solved?



0コメント

  • 1000 / 1000