QUIZ : oversubscription

Size: px
Start display at page:

Download "QUIZ : oversubscription"

Transcription

1 QUIZ : oversubscription A telco provider sells 5 Mpbs DSL service to 50 customers in a neighborhood. The DSLAM connects to the central office via one T3 and two T1 lines. What is the oversubscription factor? (Ignore overhead)

2 QUIZ: T1 Prove that the T1 carrier has a total (gross) data rate of Mbps

3 Solution Prove that the T1 carrier has a total data rate of Mbps ( ) = Mbps

4 QUIZ: OC-1 Prove that the OC1 carrier has a total (gross) data rate of Mbps

5 Solution Prove that the OC-1 carrier has a total data rate of Mbps (9 90) = Mbps

6 Chapter 3 The Data Link Layer (L2)

7 The Data Link Layer (L2) fundamental characteristics A. Whereas L1 is concerned with Tx/Rx of individual bits, L2 works with multi-bit frames. B. Transmission is over one wirelike channel, i.e. a channel which delivers the bits in the same order in which they are sent. As a consequence, L2 does not have to provide any reordering function.

8 Functions of the Data Link Layer Provide service interface to L3 (Network) Deal w/transmission errors on L1 (Physical) L2 hides the errors that occur in the real transmission, so L3 and higher don t have to worry about them Regulate the flow of data Slow receivers should not be swamped by fast senders

9 L2 Design Issues Services Provided to L3 (Network) Framing Error Control Flow Control Bit reordering

10 Services Provided by L2 to L3 (a) Virtual communication. (b) Actual communication.

11 Services Provided by L2 to L3 (a) Unacknowledged connectionless: Used when error rate is low (e.g. LAN Ethernet), or when there are stringent timing requirements (e.g. VoIP) Recovery is left to higher layers Might be bad b/c one L3 pkt. can be mapped to multiple L2 frames. L3 does not know about it, so it is wasting bandwidth by requiring entire pkt. to be retransmitted. Example:

12 Problem 1/251 A L3 pkt. is split into 10 frames, each of which has an 80% chance of arriving undamaged. L2 does not do any error control. How many times on average will L3 send the pkt. before it makes it? 1. Calculate the probability p that one send is successful:

13 Problem 1/251 A L3 pkt. is split into 10 frames, each of which has an 80% chance of arriving undamaged. L2 does not do any error control. How many times on average will L3 send the pkt. before it makes it? 1. Calculate the probability p that one send is successful: p = = = 0.107

14 Problem 1/251 A L3 pkt. is split into 10 frames, each of which has an 80% chance of arriving undamaged. L2 does not do any error control. How many times on average will L3 send the pkt. before it makes it? 2. What are the possible numbers of sends? P(1 send ) =? P(2 sends) =? P(n sends) =?

15 Problem 1/251 A L3 pkt. is split into 10 frames, each of which has an 80% chance of arriving undamaged. L2 does not do any error control. How many times on average will L3 send the pkt. before it makes it? Conclusion: GEOMETRIC distribution! P(X = k) = (1-p) k-1 p Plot source:

16 Problem 1/251 A L3 pkt. is split into 10 frames, each of which has an 80% chance of arriving undamaged. L2 does not do any error control. How many times on average will L3 send the pkt. before it makes it? GEOMETRIC distribution: P(X = k) = (1-p) k-1 p What is the expected value (a.k.a. mean, average) of a geometric distribution?

17 Problem 1/251 A L3 pkt. is split into 10 frames, each of which has an 80% chance of arriving undamaged. L2 does not do any error control. How many times on average will L3 send the pkt. before it makes it? GEOMETRIC distribution: P(X = k) = (1-p) k-1 p Expected value (a.k.a. mean, average): weight (multiply) each value of X by the corresponding probability: E[X] = 1 P(X=1) + 2 P(X=2) + k P(X=k) +

18 Problem 1/251 A L3 pkt. is split into 10 frames, each of which has an 80% chance of arriving undamaged. L2 does not do any error control. How many times on average will L3 send the pkt. before it makes it? GEOMETRIC distribution: P(X = k) = (1-p) k-1 p E[X] = 1/p

19 Problem 1/251 A L3 pkt. is split into 10 frames, each of which has an 80% chance of arriving undamaged. L2 does not do any error control. How many times on average will L3 send the pkt. before it makes it? GEOMETRIC distribution: P(X = k) = (1-p) k-1 p E[X] = 1/p E[X] = 1/0.107 = 9.32 times (What does it mean?)

20 QUIZ For a GEOMETRIC distribution, write the formulas for: P(X=k) E[X]

21 QUIZ for individual work: Designing L2 fragmentation The Network layer of Host 1 receives a 512-Byte packet every 20 ms, to be sent to Host 2. The Data Link layer fragments each packet into k frames for transmission, and sends out the frames using unacknowledged, connectionless service over a T1 link. This way, error correction is left entirely to Network, who needs to retransmit entire pkts. The probability for one frame to make it to Host 2 w/o errors is p=0.85 (85%). What is the maximum fragmentation that can be used? (Ignore all overhead, e.g. headers, trailers) Hint: What is the probability that an entire packet be transmitted without errors?

22 Services Provided by L2 to L3 (b)acknowledged connectionless: Each frame individually ACK-ed, timers, retransmissions Used when error rate is high (e.g. wireless WiFi) What if the ACK frame itself gets lost? The ghost frame problem.

23 Services Provided by L2 to L3 (c)acknowledged and connection-oriented: Used in long, error-prone links (e.g. satellite) Connection established, frames are numbered Eliminates the ghost packet problem Makes an unreliable (error-prone) L1 look reliable to L3. We say that L3 sees a reliable bit-stream at L1. (d) Unacknowledged connection-oriented??

24 QUIZ Which Data Link type of service should we choose in the 4 cases below? Low error probability High error probability Short propagation delay Long propagation delay

25 QUIZ Which Data Link type of service should we choose in the 4 cases below? Short propagation delay Long propagation delay Low error probability Unacknowledged connectionless Unacknowledged connectionless High error probability Acknowledged connectionless Acknowledged connection-oriented

26 L2 framing Stream of bits in L1 (PHYSICAL) Relationship between packets, frames and bits. Unlike packets, frames usually have a strict max. length (for hardware optimization).

27 Why framing? To control errors and flow Unfortunately, framing introduces its own problem: How does the receiver recognize the beginning and end of a frame?

28 Framing 5 methods for recognizing frames: Fixed timing (frame-gap-frame-gap ) hard to sync. Character count counter can be garbled (next slide) Flag bytes w/byte stuffing Flag bytes w/bit stuffing L1 (PHY layer) coding violations e.g. 1=hi-lo, 0=lohi, use hi-hi or lo-lo as flags Needs redundancy on L1 Goes against idea of modularity!

29 Framing with byte count A character stream. (a) Without errors. (b) With one error.

30 Framing with Flag Bytes (e.g. PPP) What to do if the flag itself is inside the data stream? Byte stuffing (a) A frame delimited by flag bytes. (b) Four examples of byte sequences before and after stuffing.

31 Extra-credit:

32 Framing with Flag Bytes Problem: Requires 8-bit characters, otherwise the FLAG boundaries cannot be detected! What do we do if we want Unicode (16 bit)? Solution: Have the FLAG byte contain a pattern of bits not encountered anywhere else in the data! So what if the pattern does occur in the data?

33 Framing with Bit Stuffing (e.g. HDLC) Flag is Bit stuffing (a) The original data. (b) The data as they are transmitted on the line. (c) The data as they are stored in receiver s memory after de-stuffing.

34 QUIZ Problem 2/252 The following character encoding is used in a L2 protocol: A: B: FLAG: ESC: The payload (actual data) in the frame is: A B ESC FLAG Show the frame for each of these framing methods: Byte count Flag bytes w/byte stuffing Flag bytes w/bit stuffing

35 Framing - conclusion Most existing L2 protocols use a combination of methods for reliability, e.g. byte stuffing and count field. EOL1

36 QUIZ For a GEOMETRIC distribution, write the formulas for: P(X=k) E[X]

37 QUIZ In a certain dry area in the world, the probability for a rainy day is How many days do we have to wait on the average for the next rainy day? Hint: Use a Geometric distribution!

38 Flow Control Does not need negotiation Needs negotiation Feedback-based: receiver sends back explicit messages: Send me more Stop sending Rate-based: Mostly used in higher layers (e.g. L4 TCP) Modern Ethernet cards can switch among 10/100/1000 Mbps

39 3.2 Error Control Error-Correcting Codes Error-Detecting Codes

40 Error Control Simple model for errors: bits are affected independently. Closer to real-life: Errors come in bursts Good: at the same average error rate, less frames are affected Bad: Adjacent errors are harder to detect/correct than isolated ones. An entire frame may disappear! Mathematical treatment of errors probability theory

41 Error Control Mathematical treatment of errors probability theory Three basic rules: The probabilities of complementary events add up to 1 The probabilities of mutually exclusive events add up The probabilities of independent events multiply Example on p.203: 1000 bits in a frame, BER = 10-3, errors independent What is the probability that a frame has errors?

42 Error Control Three basic rules: The probabilities of complementary events add up to 1 The probabilities of mutually exclusive events add up The probabilities of independent events multiply 1000 bits in a frame, BER = 10-3, errors independent P[no errors in a given frame] =? P[at least 1 error in a given frame] =? Out of many frames (say 10, 000), how many contain errors on average?

43 Error Control Three basic rules: The probabilities of complementary events add up to 1 The probabilities of mutually exclusive events add up The probabilities of independent events multiply 1000 bits in a frame, BER = 10-3, errors independent Instructive mistake: # of bits x BER Result:?? How can we tell this method is wrong?

44 QUIZ There are 1000 bits in a frame Errors are independent, with BER = 10-3 Calculate the following: P[exactly one errror in a given frame] =? P[exactly two errrors in a given frame] =? Out of many frames (say 10, 000), what fraction contain: Exactly one error? Exactly two errors?

45 Principles of Error Detection and Correction Any mechanism for detecting or correcting errors needs redundancy, a.k.a. overhead m data bits + r redundant bits = n-bit codeword m + r = n

46 codeword m + r = n m < n 2 m < 2 n Hamming distance between two codewords = # of different bits Cubes and hyper-cubes

47 Let s apply probability to codewords! Assume: Independent errors BER = 10-3 The codeword 000 was transmitted Calculate: P[001 is received] P[010 is received] P[100 is received] P[011 is received] P[111 is received] Conclusion (in terms of Hamming distance):

48 Hamming distance of a code = minimum of the Hamming distance between all pairs of legal codewords. What is the Hamming distance of the code below? What is the maximum # of errors that can be detected with the code below? Corrected?

49 Conclusion: To detect d errors, we need a code with Hamming distance at least d+1. Example: Select the codewords that have even-parity-bit. How many data bits does a codeword have? What is the Hamming distance of this code? How many errors can be detected?

50 handout

51 Conclusion: To detect d errors, we need a code with Hamming distance at least d+1. QUIZ: Select the codewords that have odd-parity-bit. How many data bits does a codeword have? What is the Hamming distance of this code? How many errors can be detected?

52 Conclusion: To detect d errors, we need a code with Hamming distance at least d+1. QUIZ: Select the codewords that are palindromes. How many data bits does a codeword have? What is the Hamming distance of this code? How many errors can be detected?

53 Error-Correcting Codes a.k.a. forward error correction To detect d errors, a code with Hamming distance d+1 (or higher) is needed. New result: To correct c errors, a code with Hamming distance 2 c + 1 (or higher) is needed.

54 Why 2 c + 1? Basins of attraction

55 Each of 2 m legal messages needs n+1 codewords assigned Why n+1? B/c each good code needs n insulating neighbors at Hamming distance 1 (Basin of attraction). In the image you have an example for n = 7.

56 3.2.2 Error-Correcting Codes Mathematical treatment of prev. slide: To correct single errors, each of 2 m legal messages needs n+1 codewords assigned (n+1) 2 m 2 n (m+r+1) 2 n-m (m+r+1) 2 r Take log on both sides log 2 (m+r+1) r log 2 (m) r We say that r has a lower bound which is logarithmic in m In asymptotic notation: r is W(log 2 m)

57 r is W(log 2 m) The Hamming code is a method of attaining this bound: Number the n bits in the codeword starting at 1. The power-of-two bits (1, 2, 4, 8 ) are check bits, the rest are data. A data bit in position k contributes to the check bits corresponding to the 1s in the binary expansion of k Usually the check bits implement even parity At the receiver: Check the parity of all check bits. If all parities are OK (even), conclude that no errors have ocurred. If the parities of some check bits are not OK, add up the values k of the incorrect check bits. This is the position of the bit in error. Correct that bit, i.e. flip it!

58 Hamming code redundant bits Initial message (11 information bits): Make room for redundant bits in positions that are powers of 2: r 1 r 2 r 4 r 8

59 How to calculate the values of the redundant bits Message with check bits inserted in power-of-two positions: r 1 r 2 0 r r Set of bits associated with r 1 : r 1 r 2 0 r r To make the set even, r 1 is made 1: 1 r 2 0 r r Set of bits associated with r 2 : 1 r 2 0 r r To make the set even, r 2 is made 1: r r Set of bits associated with r 4 : r r To make the set even, r 4 is made 0: r Set of bits associated with r 8 : r To make the set even, r 8 is made 1:

60 QUIZ Hamming code The 12 data bits to be coded are: Calculate the codeword Hint: Start by inserting the redundant bits

61 Hamming code extra-credit question

62 Hamming code error correction Message with check bits inserted in power-of-two positions: r 1 r 2 0 r r Codeword transmitted: Assume that bit 13 is corrupted in transmission, so the receiver gets: Perform the parity calculations for all check bits Which check bits have wrong parity? r 8, r 4 and r = 13. What happens if the corrupted bit is one of the check bits?

63 Hamming code lingo: What is the syndrome? Perform the parity calculations for all check bits Which check bits have wrong parity? r 8, r 4 and r = 13. Parity bit r 8 r 4 r 2 r 1 Has error? yes yes no yes Syndrome If we convert the syndrome to base 10 we have = 13.

64 Hamming code error correction Message with check bits inserted in power-of-two positions: r 1 r 2 0 r r Codeword transmitted: Assume that bit 13 is corrupted in transmission, so the receiver gets: Perform the parity calculations for all check bits Which check bits have wrong parity? r 8, r 4 and r = 13. What happens if the corrupted bit is one of the check bits?

65 Important: Many Hamming Code Calculators are available on the Web. Their use in this class is not allowed (except for checking results). All work has to be shown, step by step, in the manner presented in our text and the previous slides. Answers without work receive no credit.

66 This is the end of the material required for the midterm Tuesday lecture: review Wednesday lab: exam Recommended problems for Ch.3: 1, 2, 9 (end of chapter) Solve in notebook before the review! EoL2

Wireless Communications

Wireless Communications 3. Data Link Layer DIN/CTC/UEM 2018 Main Functions Handle transmission errors Adjust the data flow : Main Functions Split information into frames: Check if frames have arrived correctly Otherwise: Discard

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson Detecting and Correcting Bit Errors COS 463: Wireless Networks Lecture 8 Kyle Jamieson Bit errors on links Links in a network go through hostile environments Both wired, and wireless: Scattering Diffraction

More information

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use? Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors

More information

Lecture 3 Data Link Layer - Digital Data Communication Techniques

Lecture 3 Data Link Layer - Digital Data Communication Techniques DATA AND COMPUTER COMMUNICATIONS Lecture 3 Data Link Layer - Digital Data Communication Techniques Mei Yang Based on Lecture slides by William Stallings 1 ASYNCHRONOUS AND SYNCHRONOUS TRANSMISSION timing

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Error Detection Mohamed Khedr http://webmail.aast.edu/~khedr Syllabus Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12

More information

Digital Data Communication Techniques

Digital Data Communication Techniques Digital Data Communication Techniques Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 6-1 Overview

More information

Lecture 3: Error Handling

Lecture 3: Error Handling Lecture 3: Error Handling CSE 123: Computer Networks Alex C. Snoeren HW 1 Due NEXT WEDNESDAY Lecture 3 Overview Framing wrap-up Clock-based framing Error handling through redundancy Hamming Distance When

More information

Physical-Layer Services and Systems

Physical-Layer Services and Systems Physical-Layer Services and Systems Figure Transmission medium and physical layer Figure Classes of transmission media GUIDED MEDIA Guided media, which are those that provide a conduit from one device

More information

Layering and Controlling Errors

Layering and Controlling Errors Layering and Controlling Errors Brad Karp (some slides contributed by Kyle Jamieson) UCL Computer Science CS 3035/GZ01 2 nd October 2014 Today s Agenda Layering Physical-layer encoding Link-layer framing

More information

Encoding and Framing

Encoding and Framing Encoding and Framing EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Nov 2, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Questions

More information

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal Questions Encoding and Framing Why are some links faster than others? What limits the amount of information we can send on a link? How can we increase the capacity of a link? EECS 489 Computer Networks

More information

Lecture 6: Reliable Transmission"

Lecture 6: Reliable Transmission Lecture 6: Reliable Transmission" CSE 123: Computer Networks Alex C. Snoeren HW 2 out Wednesday! Lecture 6 Overview" Cyclic Remainder Check (CRC) Automatic Repeat Request (ARQ) Acknowledgements (ACKs)

More information

Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance

Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 9: Error Control Coding Chapter 8 Coding and Error Control From: Wireless Communications and Networks by William Stallings,

More information

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

Error Detection and Correction

Error Detection and Correction . Error Detection and Companies, 27 CHAPTER Error Detection and Networks must be able to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Data communication and networking fourth Edition by Behrouz A. Forouzan Chapter 10 Error Detection and Correction 10.1 Note Data can be corrupted during transmission. Some applications require that errors

More information

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Stefan Savage

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Stefan Savage Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Stefan Savage Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,

More information

An Efficient Forward Error Correction Scheme for Wireless Sensor Network

An Efficient Forward Error Correction Scheme for Wireless Sensor Network Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 737 742 C3IT-2012 An Efficient Forward Error Correction Scheme for Wireless Sensor Network M.P.Singh a, Prabhat Kumar b a Computer

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name...ID... Section...Seat No... Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 1/2009 Course Title Instructor : ITS323 Introduction to Data Communications

More information

6.004 Computation Structures Spring 2009

6.004 Computation Structures Spring 2009 MIT OpenCourseWare http://ocw.mit.edu 6.004 Computation Structures Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Welcome to 6.004! Course

More information

Department of Computer Science and Engineering. CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015

Department of Computer Science and Engineering. CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015 Department of Computer Science and Engineering CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015 Final Examination Instructions: Examination time: 180 min. Print your

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Alex C. Snoeren Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,

More information

Error Correction with Hamming Codes

Error Correction with Hamming Codes Hamming Codes http://www2.rad.com/networks/1994/err_con/hamming.htm Error Correction with Hamming Codes Forward Error Correction (FEC), the ability of receiving station to correct a transmission error,

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009. Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name

More information

Intuitive Guide to Principles of Communications By Charan Langton Coding Concepts and Block Coding

Intuitive Guide to Principles of Communications By Charan Langton  Coding Concepts and Block Coding Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Coding Concepts and Block Coding It s hard to work in a noisy room as it makes it harder to think. Work done in such

More information

CSCI-1680 Physical Layer Rodrigo Fonseca

CSCI-1680 Physical Layer Rodrigo Fonseca CSCI-1680 Physical Layer Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Signup for Snowcast milestone Make sure you signed up Make sure you are on

More information

Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction

Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction Datacommunication I Lecture 3 signal encoding, error detection/correction Layers of the OSI-model repetition 1 The OSI-model and its networking devices repetition The OSI-model and its networking devices

More information

BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering

BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering Cohort: BCNS/16B/FT Examinations for 2016-2017 / Semester 1 Resit Examinations for BEE/12/FT MODULE: DATA COMMUNICATIONS

More information

Revision of Lecture Eleven

Revision of Lecture Eleven Revision of Lecture Eleven Previous lecture we have concentrated on carrier recovery for QAM, and modified early-late clock recovery for multilevel signalling as well as star 16QAM scheme Thus we have

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Physical Layer Concepts Part II Electromagnetic Spectrum Frequency, Period, Phase

More information

Lec 19 Error and Loss Control I: FEC

Lec 19 Error and Loss Control I: FEC Multimedia Communication Lec 19 Error and Loss Control I: FEC Zhu Li Course Web: http://l.web.umkc.edu/lizhu/teaching/ Z. Li, Multimedia Communciation, Spring 2017 p.1 Outline ReCap Lecture 18 TCP Congestion

More information

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads

More information

HY448 Sample Problems

HY448 Sample Problems HY448 Sample Problems 10 November 2014 These sample problems include the material in the lectures and the guided lab exercises. 1 Part 1 1.1 Combining logarithmic quantities A carrier signal with power

More information

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon

More information

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2 Outline Basic Concepts Physical Redundancy Error Detecting/Correcting Codes Re-Execution Techniques Backward Error Recovery Techniques Basic Idea Start with k-bit data word Add r check bits Total = n-bit

More information

The idea of similarity is through the Hamming

The idea of similarity is through the Hamming Hamming distance A good channel code is designed so that, if a few bit errors occur in transmission, the output can still be identified as the correct input. This is possible because although incorrect,

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 12: Soft Information Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 PPR: Partial Packet Recovery for Wireless Networks ACM SIGOCMM, 2017 Kyle Jamieson and Hari

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 20 Spring 2012 April 4, 2012 Announcements HW9 due this week HW10 out HW11 and HW12 coming soon! Student presenta)ons HW9 Capture packets using Wireshark

More information

Chapter 10 Error Detection and Correction

Chapter 10 Error Detection and Correction Chapter 10 Error Detection and Correction 10.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10.2 Note Data can be corrupted during transmission. Some applications

More information

EECS 473 Advanced Embedded Systems. Lecture 13 Start on Wireless

EECS 473 Advanced Embedded Systems. Lecture 13 Start on Wireless EECS 473 Advanced Embedded Systems Lecture 13 Start on Wireless Team status updates Losing track of who went last. Cyberspeaker VisibleLight Elevate Checkout SmartHaus Upcoming Last lecture this Thursday

More information

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation

More information

COSC 3213: Communication Networks Chapter 5: Handout #6

COSC 3213: Communication Networks Chapter 5: Handout #6 OS 323: ommunication Networks hapter 5: Handout #6 Instructor: Dr. Marvin Mandelbaum Department o omputer Science York University F8 Section E Topics:. Peer-to-peer and service models 2. RQ and how to

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering. Cohorts: BCNS/17A/FT & BEE/16B/FT

BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering. Cohorts: BCNS/17A/FT & BEE/16B/FT BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering Cohorts: BCNS/17A/FT & BEE/16B/FT Examinations for 2016-2017 Semester 2 & 2017 Semester 1 Resit Examinations for BEE/12/FT

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

CSE 461: Bits and Bandwidth. Next Topic

CSE 461: Bits and Bandwidth. Next Topic CSE 461: Bits and Bandwidth Next Topic Focus: How do we send a message across a wire? The physical / link layers: 1. Different kinds of media 2. Encoding bits, messages 3. Model of a link Application Presentation

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

The ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1.

The ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1. Alphabets EE 387, Notes 2, Handout #3 Definition: An alphabet is a discrete (usually finite) set of symbols. Examples: B = {0,1} is the binary alphabet T = { 1,0,+1} is the ternary alphabet X = {00,01,...,FF}

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

Error Protection: Detection and Correction

Error Protection: Detection and Correction Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped

More information

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Basics of Error Correcting Codes

Basics of Error Correcting Codes Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

Multiple Downstream Profile Implications. Ed Boyd, Broadcom

Multiple Downstream Profile Implications. Ed Boyd, Broadcom Multiple Downstream Profile Implications Ed Boyd, Broadcom 1 Overview EPON is a broadcast downstream with a constant data rate. Using Multiple Modulation profiles for groups of CNUs will be considered

More information

Lecture 8: Media Access Control

Lecture 8: Media Access Control Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing

More information

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004. EE29C - Spring 24 Advanced Topics in Circuit Design High-Speed Electrical Interfaces Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 24. Announcements Project phase 1 is posted

More information

Digital Communication Systems ECS 452

Digital Communication Systems ECS 452 Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 5. Channel Coding 1 Office Hours: BKD, 6th floor of Sirindhralai building Tuesday 14:20-15:20 Wednesday 14:20-15:20

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

Module 3: Physical Layer

Module 3: Physical Layer Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud

More information

A Wireless Communication System using Multicasting with an Acknowledgement Mark

A Wireless Communication System using Multicasting with an Acknowledgement Mark IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an

More information

DIGITAL DATA COMMUNICATION TECHNIQUES

DIGITAL DATA COMMUNICATION TECHNIQUES 6 CHAPTER DIGITAL DATA COMMUNICATION TECHNIQUES 6.1 Asynchronous and Synchronous Transmission 6.2 Types of Errors 6.3 Error Detection 6.4 Error Correction 6.5 Line Configurations 6.6 Recommended Reading

More information

Wireless Communication Systems: Implementation perspective

Wireless Communication Systems: Implementation perspective Wireless Communication Systems: Implementation perspective Course aims To provide an introduction to wireless communications models with an emphasis on real-life systems To investigate a major wireless

More information

Rep. ITU-R BO REPORT ITU-R BO SATELLITE-BROADCASTING SYSTEMS OF INTEGRATED SERVICES DIGITAL BROADCASTING

Rep. ITU-R BO REPORT ITU-R BO SATELLITE-BROADCASTING SYSTEMS OF INTEGRATED SERVICES DIGITAL BROADCASTING Rep. ITU-R BO.7- REPORT ITU-R BO.7- SATELLITE-BROADCASTING SYSTEMS OF INTEGRATED SERVICES DIGITAL BROADCASTING (Questions ITU-R 0/0 and ITU-R 0/) (990-994-998) Rep. ITU-R BO.7- Introduction The progress

More information

ECE Advanced Communication Theory, Spring 2007 Midterm Exam Monday, April 23rd, 6:00-9:00pm, ELAB 325

ECE Advanced Communication Theory, Spring 2007 Midterm Exam Monday, April 23rd, 6:00-9:00pm, ELAB 325 C 745 - Advanced Communication Theory, Spring 2007 Midterm xam Monday, April 23rd, 600-900pm, LAB 325 Overview The exam consists of five problems for 150 points. The points for each part of each problem

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Transmission Principles

Transmission Principles Transmission Principles Serialization, Bit synchronization, Framing, Error Checking Physical Aspects of Transmission, Modem Agenda Introduction Bit synchronization asynchronous synchronous Frame synchronization

More information

Representation of Information. Transmission Principles. Agenda. Transmission of Information

Representation of Information. Transmission Principles. Agenda. Transmission of Information Representation of Information information is stored, processed and exchanged by computer systems in binary form bit (binary digit) values or Transmission Principles Serialization, Bit synchronization,

More information

Wireless Communication in Embedded System. Prof. Prabhat Ranjan

Wireless Communication in Embedded System. Prof. Prabhat Ranjan Wireless Communication in Embedded System Prof. Prabhat Ranjan Material based on White papers from www.radiotronix.com Networked embedded devices In the past embedded devices were standalone Typically

More information

General Class Digital Modes Presentation

General Class Digital Modes Presentation Question groups: G1E, G2E, G8A, G8B, G8C General Class Digital Modes Presentation General Segment of the 20 meter band used for digital transmissions? (14.070-14.100 MHz) Segment of the 80 meter band used

More information

Tracking, Telemetry and Command

Tracking, Telemetry and Command Tracking, Telemetry and Command Jyh-Ching Juang ( 莊智清 ) Department of Electrical Engineering National Cheng Kung University juang@mail.ncku.edu.tw April, 2006 1 Purpose Given that the students have acquired

More information

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

MULTIPLE CHOICE QUESTIONS

MULTIPLE CHOICE QUESTIONS CHAPTER 7 2. Guided and unguided media 4. Twisted pair, coaxial, and fiber-optic cable 6. Coaxial cable can carry higher frequencies than twisted pair cable and is less sus-ceptible to noise. 8. a. The

More information

(Refer Slide Time: 2:23)

(Refer Slide Time: 2:23) Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-11B Multiplexing (Contd.) Hello and welcome to today s lecture on multiplexing

More information

Burst Error Correction Method Based on Arithmetic Weighted Checksums

Burst Error Correction Method Based on Arithmetic Weighted Checksums Engineering, 0, 4, 768-773 http://dxdoiorg/0436/eng04098 Published Online November 0 (http://wwwscirporg/journal/eng) Burst Error Correction Method Based on Arithmetic Weighted Checksums Saleh Al-Omar,

More information

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission

More information

Solutions to Information Theory Exercise Problems 5 8

Solutions to Information Theory Exercise Problems 5 8 Solutions to Information Theory Exercise roblems 5 8 Exercise 5 a) n error-correcting 7/4) Hamming code combines four data bits b 3, b 5, b 6, b 7 with three error-correcting bits: b 1 = b 3 b 5 b 7, b

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

Channel Coding/Decoding. Hamming Method

Channel Coding/Decoding. Hamming Method Channel Coding/Decoding Hamming Method INFORMATION TRANSFER ACROSS CHANNELS Sent Received messages symbols messages source encoder Source coding Channel coding Channel Channel Source decoder decoding decoding

More information

EECS 380: Wireless Technologies Week 7-8

EECS 380: Wireless Technologies Week 7-8 EECS 380: Wireless Technologies Week 7-8 Michael L. Honig Northwestern University May 2018 Outline Diversity, MIMO Multiple Access techniques FDMA, TDMA OFDMA (LTE) CDMA (3G, 802.11b, Bluetooth) Random

More information

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1. EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Data and Computer Communications. Tenth Edition by William Stallings

Data and Computer Communications. Tenth Edition by William Stallings Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education, 2013 CHAPTER 8 Multiplexing It was impossible

More information

CAN for time-triggered systems

CAN for time-triggered systems CAN for time-triggered systems Lars-Berno Fredriksson, Kvaser AB Communication protocols have traditionally been classified as time-triggered or eventtriggered. A lot of efforts have been made to develop

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen. T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:

More information

EECS 473 Advanced Embedded Systems. Lecture 14 Wireless in the real world

EECS 473 Advanced Embedded Systems. Lecture 14 Wireless in the real world EECS 473 Advanced Embedded Systems Lecture 14 Wireless in the real world Team status updates Team Alert (Home Alert) Team Fitness (Fitness watch) Team Glasses Team Mouse (Control in hand) Team WiFi (WiFi

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

CSE 123: Computer Networks Alex C. Snoeren. Project 1 out Today, due 10/26!

CSE 123: Computer Networks Alex C. Snoeren. Project 1 out Today, due 10/26! CSE 123: Computer Networks Alex C. Snoeren Project 1 out Today, due 10/26! Signaling Types of physical media Shannon s Law and Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI, etc.

More information

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC Outline, Lecture 6 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Error Control Overview : n ARQ vs. FEC n Link vs. End-to-End : n Objectives n How Codes Work Code Examples: n Parity

More information