Telecommunication Notes
Telecommunication Notes
Telecommunication Notes
DEFINITION OF TELECOMMUNICATION
Telecommunication is the transmission of data (voice, audio, facsimile, image,
video etc.) over significant distances by use of electronic technologies like
telephones (wired and wireless), microwave communications, fiber optics,
satellites, radio and television broadcasting, and the internet. Electronic
communications including but not limited to emails, instant messages and phone
calls are examples of data communications.
ROLE OF TELECOMMUNICATIONS IN BUSINESS
Enable effective Communication
Communication plays a vital role in the operations of a business. Telecom services
provide the platform necessary for data to be exchanged electronically either
through wired or wireless means. It enables companies to communicate effectively
with customers and deliver high standards of customer service.
Telecommunications can help main communication capability for employees
working in remote locations or at home. With high-speed internet, mobile apps,
VoIP and other means of communication, employees can now exchange
information such as documents, analytics, reports, emails, participate in
teleconference conversations etc., in real time and reach out to prospective clients
regardless of location. From web browsing to cell phone calling to instant
messaging, telecommunications have become increasingly integrated into how we
work. This has helped businesses to streamline workflow and productivity.
Businesses can leverage mobile communication to streamline workflow and
productivity. For instance, VoIP (Voice over Internet Protocol) or IP telephony
services bring together email, audio and video calls, texting and other telecom
solutions. Users can conduct conference calls in multiple cities or countries at the
same time, hold virtual meetings and record calls. Moreover, VoIP solutions are
more affordable than traditional phone and internet services.
Businesses are able to reach more customers and provide quality services
Telecommunications technology empowers businesses to reach more customers
with fewer resources and manpower. It has enabled direct conversations with
clients and colleagues hence building business relationships. The absence of
proper business relationships, hurdles business growth. Businesses all over the
world are getting connected as a result of embracing telecommunications
technology thus extending their services. Being able to access the internet 24/7 has
Page 1 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Page 2 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Page 3 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Delivery: The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user. This
characteristic includes the security of the system, that is; the protection of data.
Timeliness: Data must be deliver in a timely manner. Delayed delivery can make
the data useless to the receiver. In the case of video and audio, timely delivery
means delivering data as they are produced, in the same order that they are
produced, and without significant delay. This kind of delivery is called real-time
transmission.
Jitter- Jitter refers to the variation in the packet arrival time. Data is sent as
packets, that is, a chunk of the whole data is sent in each turn. These packets get
re-joined back in the target device to represent the complete data as it is. Each
packet is sent with a predefined delay or acceptable amount of delay. If packets
are sent without maintaining the predefined delay, then an uneven quality in the
data may result. For example, in case of a video, let us assume that video packets
Page 4 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
are sent every 3D-ms. If some of the packets arrive with 3D-ms delay and others
with 4D-ms delay, the quality of the video when streaming may be affected.
Sender: A source must send the message to a destination. This source is the
sender (the device that sends the data to the destination or target). It can be a
computer, workstation, cell phone, laptop, video camera etc.
Page 5 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
receiver can again be a computer, workstation, cell phone, laptop, video camera
etc.
Transmission medium: The transmission medium is the physical path for the
message to travel to its destination. The sender will send the message from one
end of this path and the receiver will receive the message from another end of
the path. The transmission medium could be guided (with wires) or unguided
(without wires), for example, twisted pair cable, fiber optic cable, radio waves,
microwaves etc.
Protocol: A protocol is a set of rules that applies on the full data communication
procedure. It represents some kind of agreement between the networked devices
to successfully communicate with each other. For example, how to send the data,
how the data will be traveling, how to ensure that full data is received, how to
handle errors in transmission etc. The communicating devices must follow the
same set of rules or protocol so that they understand each other. A typical
example of a data communication system is sending an e-mail. The user who
wants to send an email acts as a sender, the message is the information contained
in the email, the receiver is the who the user wants to send the message to, there
are many protocols involved in this entire process, one of them is Simple Mail
Transfer Protocol (SMTP), both sender and receiver must have an internet
connection which uses a wireless medium to send and receive email.
Page 6 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Addressing and Routing: When more than two devices share a transmission
facility, a source system must indicate the identity or address of the destination
and can choose a specific route through the network. This will ensure that the
data is sent to the appropriate destinations.
Page 7 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
A signal is an electromagnetic current or light wave that is used for carrying data
from one device or network to another through a communication medium. It is
the key component behind virtually all: Communication, Computing,
Networking, Electronic devices. A signal can be either analog or digital
ANALOG SIGNALS
DIGITAL SIGNALS
Data transmission methods are ways in which digital or analog data is sent and
received between two or more electronic devices over a communication medium.
Page 8 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Page 9 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Instead, start and stop bits are used to indicate the beginning and end of a data
message. The start and stop bits ensure that the data is transmitted correctly.
Without the use of these bits, the sending and receiving systems will not know
where one character ends and another begins. Examples where its applicable
include email, forums etc.
SYNCHRONOUS SERIAL TRANSMISSION
Synchronous data transmission is a data transfer method in which a continuous
stream of data signals is accompanied by timing signals (generated by an
electronic clock) to ensure that the transmitter and the receiver are in step
(synchronized) with one another. The data is sent in blocks (called frames or
packets) spaced by fixed time intervals. This method is used when large amounts
of data must be transferred very quickly from one location to the other. The speed
of the synchronous connection is attained by transferring data in large blocks
instead of individual characters. Examples where its applicable include chat
rooms, telephone conversations, video conferencing, VOIP.
DATA TRANSMISSION MODES
Data transmission modes also known as communication modes; define the
direction of signal flow between two linked communication devices in a
computer network. It is important to control the direction of signal flow as it
leads to successful communication over the network and minimizes errors. Data
transmission modes are categorized into;
Simplex mode
Duplex mode
SIMPLEX MODE
In this mode, is transmitted in one direction only i.e. from the sender to the
receiver. Example; transfer of data from computer to printer, radio and television
broadcasts, keyboard, mouse etc.
DUPLEX MODE
In this mode, two or more connected devices can communicate with one another
in both directions. This mode is further categorized into;
Half Duplex
Full Duplex
Page 10 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Twisted-Pair cable
Coaxial cable
Fibre-Optic cable
Twisted-Pair cable; It consists of 2 separately insulated conductor wires
intertwined together. Generally, several such pairs are bundled together in a
protective sheath. They are the most widely used Transmission Media. Twisted
Pair is of two types: Unshielded twisted pair (UTP), which has the ability to block
interference and does not depend on a physical shield for this purpose. It is used
for telephonic applications.
Page 11 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Shielded twisted pair (STP), which consists of a special jacket to block external
interference. It is used in fast data rate Ethernet and in voice and data channels
of telephone lines.
Fibre-Optic cable; It uses the concept of reflection of light through a core made up
of glass or plastic. The core is surrounded by less dense glass or plastic covering
called cladding. Digital signals are sent as light pulses which are translated back
into electronic signals. It is used for the transmission of large volumes of data.
Page 12 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Radiowaves
Microwaves
Infrared
Radiowaves; These are low frequency signals and can travel a long distance. They
are easy to generate and can penetrate through buildings. The sending and
receiving antennas need not be aligned. Frequency Range: 3KHz – 1GHz. AM and
FM radios and cordless phones use Radiowaves for transmission. They are
further categorized as (i) Terrestrial and (ii) Satellite.
Microwaves; It is a line of sight transmission i.e. the sending and receiving
antennas need to be properly aligned with each other. The distance covered by
the signal is directly proportional to the height of the antenna. They have a higher
frequency than radio waves. Frequency Range:1GHz – 300GHz. They are majorly
used for telephone communication, mobile phones, television distribution etc.
Infrared; Infrared waves are used for very short distance communication. They
cannot penetrate through obstacles. This prevents interference between systems.
Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless mouse,
keyboard, printer, VCRs etc.
Page 13 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Page 14 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
De facto − These are the standards that are followed without any formal
plan or approval by any organization. They have come into existence due to
traditions or facts. For example, the HTTP had started as a de facto standard.
De jure − These standards are the ones which have been adopted through
legislation by any officially recognized standards organization. Most of the
communication standards that are used today are de jure standards.
Some of the noted standards organizations are;
2. Disable file sharing; File sharing might seem like a great and convenient
collaborative method, but it can also put your business’ network security at
risk. However, file sharing means that any user that is accessing the same
public network can access your files. Therefore, it’s a good idea to disable
file sharing on all employee devices, except on your independent, private
servers.
4. Set up a Firewall; If you don’t currently have a firewall, then make this a
priority. Not only should you install firewalls on your devices, but also set
up a web application firewall (WAF). This is especially important if you are
an eCommerce business and sell products online and store customers’
confidential information. Installing a WAF will help protect all your stored
data.
Page 16 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
Page 17 of 18
TELECOMMUNICATION NOTES
BCOM YR II, SEMESTER I/2022
12. Train employees in network security practices; Even though you have put
thought, effort, and time into documenting your network security practices
and process, unfortunately, most team members and employees will skim
through your documentation. In an effort to build a network security-
centered culture, it is also important to follow up with a network security
training session for your employees. For example, in addition to educating
team members on good versus poor network security practices, you can also
engage them with interactive activities, such as having them identify
phishing emails, quality versus unsecured password combinations, and
what to do if they notice any suspicious activity on any of their devices.
Page 18 of 18