Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Size: px
Start display at page:

Download "Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University"

Transcription

1 Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University

2 Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation l Multiple devices sharing a single, limited medium: collision handling and multiplexing l Concepts of error detection and correction 2

3 Amplitude l Amplitude is the height of a wave, which can be voltage, current, or field intensity l In telecommunications, amplitude is usually measured as the average wave height l Amplitude modulation (AM) in radio signals is used, for example, in AM broadcast radio the amplitude of a fixed-frequency carrier wave is modulated (changed) by the signal being sent l Optical signals are usually sent using amplitude modulation

4 Frequency l Frequency is the number of waves per given time interval l Alternatively, the inverse is used the distance between waves, or wavelength l Frequency modulation (FM) in radio signals is used, for example, in FM broadcast radio The frequency of a fixed-amplitude carrier is modulated by the signal being sent

5 Signal Degradation l Degradation means a signal s quality is reduced as it moves through a medium l Over distance, the signal strength is reduced, which is called attenuation when a signal is attenuated too much relative to noise, it is no longer reliable: it has degraded l Occlusion (or obstruction) means a physical object is blocking a signal l Interference happens when nearby signals become mixed together, corrupting the signal

6 Multiplexing l Multiplexing means sending two or more signals through a single channel l Signals are encoded by analog or digital means before being transmitted l At the receiver, the signals must be decoded l One kind of multiplexing sends signals using different frequencies l Another kind breaks a signal into small parts, and sends different parts at different times parts from different signals are interleaved

7 Collisions l A collision happens when two or more devices attempt to use a single channel at the same time l When a collision happens, both devices are usually unable to transmit l Media Access Control (MAC), in the Data Link Layer, performs the task of handling collisions and allowing multiple devices to share a limited medium

8 CSMA/CD l Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is one solution for handling collisions, used on Ethernet l When a device attempts to send a frame, it listens for a collision l If there is a collision, the device waits for a pseudo-random time before attempting to resend the frame l After a certain number of failed attempts, the device gives up, and the transmission fails

9 CSMA/CD l Very abbreviated flowchart for CSMA/CD Start Backoff routine: Wait a pseudorandom period of microseconds true Transmit if idle Collision detected true Attempts <16 false false The method used to detect depends on the physical and data-link layer implementation Transmission success Too many collisions

10 CSMA/CA l Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) can be used to solve the collision problem l Before transmitting, a device listens and waits if the medium is busy l The sender may request a period of time to send, with a Request to Send (RTS) packet l A central controller device acknowledges the request with a Clear to Send (CTS) packet, giving the sender permission to transmit

11 CSMA/CA with RTS/CTS l Very abbreviated flowchart for IEEE Start Backoff routine: Wait a pseudorandom period of microseconds false Transmit RTS if idle CTS received? Both CSMA/CD and CSMA/CA enter a backoff or wait routine if another device is already transmitting true Transmit frame Transmission success

12 Error Detection and Correction l Because digital data is discrete, it can be checked and even corrected l The correct value is determined by the transmitting party l The simplest form of correction is simple redundancy but that is not very efficient l Error detection and correction is handled in the Data Link layer at the bit level, and at the Transport layer for whole packets

13 Parity Bits l One simple way of checking data in a signal is to count the number of bits l The sender must have some way of telling the correct number of 1 bits and 0 bits l One parity bit per byte (or word) can check for errors, but not correct them l Multiple parity bits can be used redundantly to allow error correction

14 Block Parity Example (Message, Part 1)

15 Block Parity Example (Message, Part 2)

16 Checksums l A checksum performs arithmetic on the values of digits or bits transmitted and adds the result to the data sent l Examples of checksums are all around you l UPC checksums are based on multiplying every other digit by 3 and adding the result (UPC bar codes also have parity) l ISBN 10 codes have checksum values of 0 to 10 (where 10 is represented by the digit X) Note: ISBN 13 has a different checksum formula

17 ISBN 10 example l ISBN l 4*1 + 5*2 + 6*3 + 3*4 + 0*5 + 1*6 + 3*7 + 9*8 + 9*9 = l = l 224 l 224 % 11 = 4

18 Transport Layer Checksums l Internet Checksum simply uses addition on each set of 16 bits (as an unsigned integer) and the final checksum is the one s complement l Cyclic Redundancy Check (CRC) is one type of checksum used in the Transport Layer l CRC uses simple XOR, multiplication, and division operations on each set of bits to encode and decode the data while checking for errors l A parity bit is an example of a single-bit CRC l CRC encoding does not make the data encrypted or secret; it is only for detecting errors

19 Cyclic Redundancy Check l Transmitter performs polynomial division to calculate an N-bit remainder (the CRC), which is appended to the data l When the same division is performed by the receiver (with CRC attached) the remainder will be zero if the data contains no errors l Division performed by exclusive-or between input and N+1-bit divisor, with MSbit set l Divisor shifted right so dividend and divisor MSbits are aligned l When dividend is zero, remainder is CRC

20 Cyclic Redundancy Check transmit C R C divisor divisor divisor divisor divisor remainder receive divisor divisor divisor divisor divisor remainder OK 0 0 0

21 Hamming Distance l Hamming Distance is a form of error correction using special encoding to send values that are very different from each other l If one byte or word is wrong, the distance to the nearest correct byte or word in the set is the most probable value l The difference between data sent and expected data is known as the Hamming distance

22 Hamming Code l Is a way to mix parity and data bits to correct single-bit errors l Bits are numbered from 1 and each powerof-2 bit position becomes a parity bit for all bits whose binary number has that bit set l The sum of the bit numbers of any incorrect parity bit(s) identifies an incorrect bit Bit number Coded data p1 p2 d1 p4 d2 d3 d4 p8 d5 d6 d7 d8 d9 d10 d11 p16 d12 d13 d14 d15 bits p1 x x x x x x x x x x Parity Bit coverage p2 x x x x x x x x x x p3 x x x x x x x x x p4 x x x x x x x x p5 x x x x x

23 Conclusions l Signals are sent using basic principles of electromagnetic waves: amplitude and frequency l Media Access Control (MAC) allows several devices to share a medium that is limited to one signal at a time l Multiplexing allows many signals to be sent over a limited number of lines or channels l Errors must be detected and corrected using parity, checksums, or encoding methods such as Hamming Distance

Physical-Layer Services and Systems

Physical-Layer Services and Systems Physical-Layer Services and Systems Figure Transmission medium and physical layer Figure Classes of transmission media GUIDED MEDIA Guided media, which are those that provide a conduit from one device

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Data communication and networking fourth Edition by Behrouz A. Forouzan Chapter 10 Error Detection and Correction 10.1 Note Data can be corrupted during transmission. Some applications require that errors

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Error Detection Mohamed Khedr http://webmail.aast.edu/~khedr Syllabus Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12

More information

Lecture 6: Reliable Transmission"

Lecture 6: Reliable Transmission Lecture 6: Reliable Transmission" CSE 123: Computer Networks Alex C. Snoeren HW 2 out Wednesday! Lecture 6 Overview" Cyclic Remainder Check (CRC) Automatic Repeat Request (ARQ) Acknowledgements (ACKs)

More information

Summary of Basic Concepts

Summary of Basic Concepts Transmission Summary of Basic Concepts Sender Channel Receiver Dr. Christian Rohner Encoding Modulation Demodulation Decoding Bits Symbols Noise Terminology Communications Research Group Bandwidth [Hz]

More information

Error Protection: Detection and Correction

Error Protection: Detection and Correction Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Physical Layer Concepts Part II Electromagnetic Spectrum Frequency, Period, Phase

More information

Wireless Transmission & Media Access

Wireless Transmission & Media Access Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Mobile Communications

Mobile Communications COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access

More information

Error Detection and Correction

Error Detection and Correction . Error Detection and Companies, 27 CHAPTER Error Detection and Networks must be able to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

Wireless Communications

Wireless Communications 3. Data Link Layer DIN/CTC/UEM 2018 Main Functions Handle transmission errors Adjust the data flow : Main Functions Split information into frames: Check if frames have arrived correctly Otherwise: Discard

More information

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal

More information

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson Detecting and Correcting Bit Errors COS 463: Wireless Networks Lecture 8 Kyle Jamieson Bit errors on links Links in a network go through hostile environments Both wired, and wireless: Scattering Diffraction

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use? Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors

More information

Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction

Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction Datacommunication I Lecture 3 signal encoding, error detection/correction Layers of the OSI-model repetition 1 The OSI-model and its networking devices repetition The OSI-model and its networking devices

More information

BSc (Hons) Computer Science with Network Security. Examinations for Semester 1

BSc (Hons) Computer Science with Network Security. Examinations for Semester 1 BSc (Hons) Computer Science with Network Security Cohort: BCNS/15B/FT Examinations for 2015-2016 Semester 1 MODULE: DATA COMMUNICATIONS MODULE CODE: CAN1101C Duration: 2 Hours Instructions to Candidates:

More information

Layering and Controlling Errors

Layering and Controlling Errors Layering and Controlling Errors Brad Karp (some slides contributed by Kyle Jamieson) UCL Computer Science CS 3035/GZ01 2 nd October 2014 Today s Agenda Layering Physical-layer encoding Link-layer framing

More information

Digital to Digital Encoding

Digital to Digital Encoding MODULATION AND ENCODING Data must be transformed into signals to send them from one place to another Conversion Schemes Digital-to-Digital Analog-to-Digital Digital-to-Analog Analog-to-Analog Digital to

More information

A Novel Approach for Error Detection Using Additive Redundancy Check

A Novel Approach for Error Detection Using Additive Redundancy Check J. Basic. Appl. Sci. Res., 6(5)34-39, 26 26, TextRoad Publication ISSN 29-434 Journal of Basic and Applied Scientific Research www.textroad.com A Novel Approach for Error Detection Using Additive Redundancy

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Lecture 3 Data Link Layer - Digital Data Communication Techniques

Lecture 3 Data Link Layer - Digital Data Communication Techniques DATA AND COMPUTER COMMUNICATIONS Lecture 3 Data Link Layer - Digital Data Communication Techniques Mei Yang Based on Lecture slides by William Stallings 1 ASYNCHRONOUS AND SYNCHRONOUS TRANSMISSION timing

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

MULTIPLE CHOICE QUESTIONS

MULTIPLE CHOICE QUESTIONS CHAPTER 7 2. Guided and unguided media 4. Twisted pair, coaxial, and fiber-optic cable 6. Coaxial cable can carry higher frequencies than twisted pair cable and is less sus-ceptible to noise. 8. a. The

More information

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES Encoding Coding is the process of embedding clocks into a given data stream and producing a signal that can be transmitted over a selected medium.

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( ) CHAPTER 2 Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication (2170710) Syllabus Chapter-2.4 Spread Spectrum Spread Spectrum SS was developed initially for military and intelligence

More information

DATA COMMUNICATION (CS601) FINAL TERM MEGA FILE

DATA COMMUNICATION (CS601) FINAL TERM MEGA FILE DATA COMMUNICATION (CS601) FINAL TERM MEGA FILE Question No: 1 representation of links that connect nodes is called as physical topology. geometrical logical physical Question No: 2 (Marks: 1 ) - Please

More information

Module 3: Physical Layer

Module 3: Physical Layer Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud

More information

HY448 Sample Problems

HY448 Sample Problems HY448 Sample Problems 10 November 2014 These sample problems include the material in the lectures and the guided lab exercises. 1 Part 1 1.1 Combining logarithmic quantities A carrier signal with power

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

Chapter 1 Acknowledgment:

Chapter 1 Acknowledgment: Chapter 1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. Manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC Outline, Lecture 6 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Error Control Overview : n ARQ vs. FEC n Link vs. End-to-End : n Objectives n How Codes Work Code Examples: n Parity

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

and coding (a.k.a. communication theory) Signals and functions Elementary operation of communication: send signal on

and coding (a.k.a. communication theory) Signals and functions Elementary operation of communication: send signal on Fundamentals of information transmission and coding (a.k.a. communication theory) Signals and functions Elementary operation of communication: send signal on medium from point A to point B. media copper

More information

ROM/UDF CPU I/O I/O I/O RAM

ROM/UDF CPU I/O I/O I/O RAM DATA BUSSES INTRODUCTION The avionics systems on aircraft frequently contain general purpose computer components which perform certain processing functions, then relay this information to other systems.

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

Multiplexing Module W.tra.2

Multiplexing Module W.tra.2 Multiplexing Module W.tra.2 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Multiplexing W.tra.2-2 Multiplexing shared medium at

More information

OSI Reference Model. Application Layer. Presentation Layer. Session Layer. Chapter 4: Application Protocols. Transport Layer.

OSI Reference Model. Application Layer. Presentation Layer. Session Layer. Chapter 4: Application Protocols. Transport Layer. Chapter 2: Computer Networks 2.1: Physical Layer and Data Link Layer 2.2: Examples for Local Area Networks 2.3: Examples for Wide Area Networks 2.4: Wireless Networks OSI Reference Model Application Layer

More information

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 9: Error Control Coding Chapter 8 Coding and Error Control From: Wireless Communications and Networks by William Stallings,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 PLCP format, Data Rates, OFDM, Modulations, 2 IEEE 802.11a: Transmit and Receive Procedure 802.11a Modulations BPSK Performance Analysis Convolutional

More information

BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering

BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering Cohort: BCNS/16B/FT Examinations for 2016-2017 / Semester 1 Resit Examinations for BEE/12/FT MODULE: DATA COMMUNICATIONS

More information

Encoding and Framing

Encoding and Framing Encoding and Framing EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Nov 2, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Questions

More information

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal Questions Encoding and Framing Why are some links faster than others? What limits the amount of information we can send on a link? How can we increase the capacity of a link? EECS 489 Computer Networks

More information

Fundament Fundamen als t of Communications

Fundament Fundamen als t of Communications Fundamentals of Communications Communication System Transmitter Medium Receiver Transmitter: originates the signal Receiver: receives transmitted signal after it travels over the medium Medium: guides

More information

Lecture 5 Transmission. Physical and Datalink Layers: 3 Lectures

Lecture 5 Transmission. Physical and Datalink Layers: 3 Lectures Lecture 5 Transmission Peter Steenkiste School of Computer Science Department of Electrical and Computer Engineering Carnegie Mellon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1 Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error

More information

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux 1. Introduction 1.2 Medium Access Control Prof. JP Hubaux 1 Modulation and demodulation (reminder) analog baseband digital signal data digital analog 101101001 modulation modulation radio transmitter radio

More information

Digital Data Communication Techniques

Digital Data Communication Techniques Digital Data Communication Techniques Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 6-1 Overview

More information

BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering. Cohorts: BCNS/17A/FT & BEE/16B/FT

BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering. Cohorts: BCNS/17A/FT & BEE/16B/FT BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering Cohorts: BCNS/17A/FT & BEE/16B/FT Examinations for 2016-2017 Semester 2 & 2017 Semester 1 Resit Examinations for BEE/12/FT

More information

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads

More information

Medium Access Methods. Lecture 9

Medium Access Methods. Lecture 9 Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated

More information

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued CSCD 433 Network Programming Fall 2016 Lecture 5 Physical Layer Continued 1 Topics Definitions Analog Transmission of Digital Data Digital Transmission of Analog Data Multiplexing 2 Different Types of

More information

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access

More information

Department of Electronics & Telecommunication Engg. LAB MANUAL. B.Tech V Semester [ ] (Branch: ETE)

Department of Electronics & Telecommunication Engg. LAB MANUAL. B.Tech V Semester [ ] (Branch: ETE) Department of Electronics & Telecommunication Engg. LAB MANUAL SUBJECT:-DIGITAL COMMUNICATION SYSTEM [BTEC-501] B.Tech V Semester [2013-14] (Branch: ETE) KCT COLLEGE OF ENGG & TECH., FATEHGARH PUNJAB TECHNICAL

More information

DigiPoints Volume 1. Student Workbook. Module 6 Error Detection and Correction

DigiPoints Volume 1. Student Workbook. Module 6 Error Detection and Correction Error Detection and Correction Page 6.1 DigiPoints Volume 1 Module 6 Error Detection and Correction Summary This module describes typical errors that can exist in digital communications systems and describes

More information

Wireless Communication in Embedded System. Prof. Prabhat Ranjan

Wireless Communication in Embedded System. Prof. Prabhat Ranjan Wireless Communication in Embedded System Prof. Prabhat Ranjan Material based on White papers from www.radiotronix.com Networked embedded devices In the past embedded devices were standalone Typically

More information

Lecture 5 Transmission

Lecture 5 Transmission Lecture 5 Transmission David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05 1 Physical and Datalink Layers: 3

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

UNIT-1. Basic signal processing operations in digital communication

UNIT-1. Basic signal processing operations in digital communication UNIT-1 Lecture-1 Basic signal processing operations in digital communication The three basic elements of every communication systems are Transmitter, Receiver and Channel. The Overall purpose of this system

More information

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Wireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN)

Wireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN) Wireless Networks Why Wireless Networks? rate MBit/s 100.0 10.0 1.0 0.1 0.01 wired terminals WMAN WLAN CORDLESS (CT, DECT) Office Building stationary walking drive Indoor HIPERLAN UMTS CELLULAR (GSM) Outdoor

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 3-6 PERFORMANCE One important issue in networking

More information

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU Convolutional Codes In block coding, the encoder accepts a k-bit message block and generates an n-bit code word. Thus, codewords are produced on a block-by-block basis. Buffering is needed. m 1 m 2 Block

More information

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Okeke. C Department of Electrical /Electronics Engineering, Michael Okpara University of Agriculture, Umudike, Abia State,

More information

RECOMMENDATION ITU-R BS

RECOMMENDATION ITU-R BS Rec. ITU-R BS.1194-1 1 RECOMMENDATION ITU-R BS.1194-1 SYSTEM FOR MULTIPLEXING FREQUENCY MODULATION (FM) SOUND BROADCASTS WITH A SUB-CARRIER DATA CHANNEL HAVING A RELATIVELY LARGE TRANSMISSION CAPACITY

More information

Signal Characteristics

Signal Characteristics Data Transmission The successful transmission of data depends upon two factors:» The quality of the transmission signal» The characteristics of the transmission medium Some type of transmission medium

More information

GSM and Similar Architectures Lesson 08 GSM Traffic and Control Data Channels

GSM and Similar Architectures Lesson 08 GSM Traffic and Control Data Channels GSM and Similar Architectures Lesson 08 GSM Traffic and Control Data Channels 1 Four Types of Control Data Bursts Access burst The call setup takes place when setting the initial connection using a burst

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Computer Networks - Xarxes de Computadors

Computer Networks - Xarxes de Computadors Computer Networks - Xarxes de Computadors Outline Course Syllabus Unit 1: Introduction Unit 2. IP Networks Unit 3. Point to Point Protocols -TCP Unit 4. Local Area Networks, LANs 1 Outline Introduction

More information

PRINCIPLES OF COMMUNICATION SYSTEMS. Lecture 1- Introduction Elements, Modulation, Demodulation, Frequency Spectrum

PRINCIPLES OF COMMUNICATION SYSTEMS. Lecture 1- Introduction Elements, Modulation, Demodulation, Frequency Spectrum PRINCIPLES OF COMMUNICATION SYSTEMS Lecture 1- Introduction Elements, Modulation, Demodulation, Frequency Spectrum Topic covered Introduction to subject Elements of Communication system Modulation General

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

Chapter 10 Error Detection and Correction

Chapter 10 Error Detection and Correction Chapter 10 Error Detection and Correction 10.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10.2 Note Data can be corrupted during transmission. Some applications

More information

CSCI-1680 Physical Layer Rodrigo Fonseca

CSCI-1680 Physical Layer Rodrigo Fonseca CSCI-1680 Physical Layer Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Signup for Snowcast milestone Make sure you signed up Make sure you are on

More information

The ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1.

The ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1. Alphabets EE 387, Notes 2, Handout #3 Definition: An alphabet is a discrete (usually finite) set of symbols. Examples: B = {0,1} is the binary alphabet T = { 1,0,+1} is the ternary alphabet X = {00,01,...,FF}

More information

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued CSCD 433 Network Programming Fall 2016 Lecture 5 Physical Layer Continued 1 Topics Definitions Analog Transmission of Digital Data Digital Transmission of Analog Data Multiplexing 2 Different Types of

More information

Error Correction with Hamming Codes

Error Correction with Hamming Codes Hamming Codes http://www2.rad.com/networks/1994/err_con/hamming.htm Error Correction with Hamming Codes Forward Error Correction (FEC), the ability of receiving station to correct a transmission error,

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Signal Encoding Criteria

Signal Encoding Criteria Signal Encoding Criteria What determines how successful a receiver will be in interpreting an incoming signal? Signal to noise ratio (or better E b /N 0 ) Data rate Bandwidth An increase in data rate increases

More information

Revision of Lecture Eleven

Revision of Lecture Eleven Revision of Lecture Eleven Previous lecture we have concentrated on carrier recovery for QAM, and modified early-late clock recovery for multilevel signalling as well as star 16QAM scheme Thus we have

More information

Basic Concepts in Data Transmission

Basic Concepts in Data Transmission Basic Concepts in Data Transmission EE450: Introduction to Computer Networks Professor A. Zahid A.Zahid-EE450 1 Data and Signals Data is an entity that convey information Analog Continuous values within

More information

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2 Outline Basic Concepts Physical Redundancy Error Detecting/Correcting Codes Re-Execution Techniques Backward Error Recovery Techniques Basic Idea Start with k-bit data word Add r check bits Total = n-bit

More information

Physical Layer: Outline

Physical Layer: Outline 18-345: Introduction to Telecommunication Networks Lectures 3: Physical Layer Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Physical Layer: Outline Digital networking Modulation Characterization

More information

b. When transmitting a message through a transmission medium, the equipment which receives the message should first find out whether it has received

b. When transmitting a message through a transmission medium, the equipment which receives the message should first find out whether it has received b. When transmitting a message through a transmission medium, the equipment which receives the message should first find out whether it has received the message correctly. If there is an error the receive

More information

MODULE IV. End Sem. Exam Marks. Syllabus

MODULE IV. End Sem. Exam Marks. Syllabus MODULE IV Syllabus Multiplexing- Space Division Multiplexing, Frequency Division Multiplexing, Wave length Division Multiplexing - Time Division multiplexing: Characteristics, Digital Carrier system, SONET/SDH,

More information

Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications

Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications 802.11a Wireless Networks: Principles and Performance Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications May 8, 2002 IEEE Santa Clara Valley Comm Soc Atheros Communications,

More information

Energy Consumption of an Internal CRC Module in a Microcontroller

Energy Consumption of an Internal CRC Module in a Microcontroller Energy Consumption of an Internal CRC Module in a Microcontroller Mario Alberto Camarillo-Ramos 1, Roberto López-Avitia 1, Miguel Bravo-Zanoguera 2, Verónica Quintero-Rosas 1, Apolonio Castro-Corral Reyes

More information

Outline / Wireless Networks and Applications Lecture 3: Physical Layer Signals, Modulation, Multiplexing. Cartoon View 1 A Wave of Energy

Outline / Wireless Networks and Applications Lecture 3: Physical Layer Signals, Modulation, Multiplexing. Cartoon View 1 A Wave of Energy Outline 18-452/18-750 Wireless Networks and Applications Lecture 3: Physical Layer Signals, Modulation, Multiplexing Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Chapter-1: Introduction

Chapter-1: Introduction Chapter-1: Introduction The purpose of a Communication System is to transport an information bearing signal from a source to a user destination via a communication channel. MODEL OF A COMMUNICATION SYSTEM

More information

AHA Application Note. Primer: Reed-Solomon Error Correction Codes (ECC)

AHA Application Note. Primer: Reed-Solomon Error Correction Codes (ECC) AHA Application Note Primer: Reed-Solomon Error Correction Codes (ECC) ANRS01_0404 Comtech EF Data Corporation 1126 Alturas Drive Moscow ID 83843 tel: 208.892.5600 fax: 208.892.5601 www.aha.com Table of

More information

Mobile Computing. Chapter 3: Medium Access Control

Mobile Computing. Chapter 3: Medium Access Control Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access

More information

ITM 1010 Computer and Communication Technologies

ITM 1010 Computer and Communication Technologies ITM 1010 Computer and Communication Technologies Lecture #14 Part II Introduction to Communication Technologies: Digital Signals: Digital modulation, channel sharing 2003 香港中文大學, 電子工程學系 (Prof. H.K.Tsang)

More information

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX Amr Shehab Amin 37-20200 Abdelrahman Taha 31-2796 Yahia Mobasher 28-11691 Mohamed Yasser

More information

The quality of the transmission signal The characteristics of the transmission medium. Some type of transmission medium is required for transmission:

The quality of the transmission signal The characteristics of the transmission medium. Some type of transmission medium is required for transmission: Data Transmission The successful transmission of data depends upon two factors: The quality of the transmission signal The characteristics of the transmission medium Some type of transmission medium is

More information