Data and Computer Communications

Similar documents
Lecture 3 Data Link Layer - Digital Data Communication Techniques

Digital Data Communication Techniques

Physical-Layer Services and Systems

Chapter 10 Error Detection and Correction 10.1

Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction

DIGITAL DATA COMMUNICATION TECHNIQUES

Wireless Communications

BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering. Cohorts: BCNS/17A/FT & BEE/16B/FT

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Error Detection and Correction

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

16.36 Communication Systems Engineering

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Layering and Controlling Errors

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

and coding (a.k.a. communication theory) Signals and functions Elementary operation of communication: send signal on

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

A Novel Approach for Error Detection Using Additive Redundancy Check

Digital to Digital Encoding

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

Lecture 6: Reliable Transmission"

EC 554 Data Communications

SECTION 4 CHANNEL FORMAT TYPES AND RATES. 4.1 General

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC

QUIZ : oversubscription

802.11a Hardware Implementation of an a Transmitter

King Fahd University of Petroleum & Minerals Computer Engineering Dept

BSc (Hons) Computer Science with Network Security. Examinations for Semester 1

Revision of Lecture Eleven

BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering

Summary of Basic Concepts

Module 3: Physical Layer

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU

Chapter 5: WMAN - IEEE / WiMax. 5.1 Introduction and Overview 5.2 Deployment 5.3 PHY layer 5.4 MAC layer 5.5 Network Entry 5.

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

GSM Network and Services

Chapter 10 Error Detection and Correction

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Lecture 3: Error Handling

Mohammad Hossein Manshaei 1393

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

RECOMMENDATION ITU-R F (Question ITU-R 158/9) b) that it is desirable to specify the requirements of HF packet radio systems,

Wireless Communication

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

OSI Reference Model. Application Layer. Presentation Layer. Session Layer. Chapter 4: Application Protocols. Transport Layer.

SourceSync. Exploiting Sender Diversity

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

MULTIPLE CHOICE QUESTIONS

Performance Analysis of n Wireless LAN Physical Layer

WiMOD LR Base Plus Firmware

CSCI-1680 Physical Layer Rodrigo Fonseca

ROM/UDF CPU I/O I/O I/O RAM

UNIVERSITY OF MICHIGAN DEPARTMENT OF ELECTRICAL ENGINEERING : SYSTEMS EECS 555 DIGITAL COMMUNICATION THEORY

Fiber Distributed Data Interface

EC 551 Telecommunication System Engineering. Mohamed Khedr

Basic idea: divide spectrum into several 528 MHz bands.

Transmission Principles

Representation of Information. Transmission Principles. Agenda. Transmission of Information

DigiPoints Volume 1. Leader Guide. Module 6 Error Detection and Correction

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

Chapter 4 Digital Transmission 4.1

DATA COMMUNICATION (CS601) FINAL TERM MEGA FILE

9.4. Synchronization:

Baseline Proposal for EPoC PHY Layer

Local Asynchronous Communication. By S.Senthilmurugan Asst.Professor/ICE SRM University. Chennai.

Receiver Designs for the Radio Channel

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

ADVANCED WIRELESS TECHNOLOGIES. Aditya K. Jagannatham Indian Institute of Technology Kanpur

Mathematical Problems in Networked Embedded Systems

Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance

Error Protection: Detection and Correction

Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary

Chapter 1 Acknowledgment:

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Fading Channels

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

RECOMMENDATION ITU-R BT.1365 * 24-bit digital audio format as ancillary data signals in HDTV serial interfaces

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

Wireless Communication in Embedded System. Prof. Prabhat Ranjan

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Wireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN)

UWB for Sensor Networks:

Error Detection and Correction

Wireless LAN Consortium OFDM Physical Layer Test Suite v1.6 Report

Signal Encoding Criteria

Encapsulation Baseline Proposal for EFM Copper

Digital Modes II PSK31 and JT65

Burst Error Correction Method Based on Arithmetic Weighted Checksums

Technical datasheet. The DTXF-xxx supports South Korean ISM band, 424.7MHz, 447.3MHz and Japanese 429MHz as well as European MHz.

Reduced Complexity by Incorporating Sphere Decoder with MIMO STBC HARQ Systems

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Stefan Savage

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

Encoding and Framing

Digital Transmission (Line Coding) EE4367 Telecom. Switching & Transmission. Pulse Transmission

Rep. ITU-R BO REPORT ITU-R BO SATELLITE-BROADCASTING SYSTEMS OF INTEGRATED SERVICES DIGITAL BROADCASTING

2320 cousteau court

Transcription:

Data and Computer Communications Error Detection Mohamed Khedr http://webmail.aast.edu/~khedr

Syllabus Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Data Transmission Signal encoding techniques Error Detection Error correction Flow Control Error control HDLC Multiplexing Spread spectrum Wireless channel characteristics OFDM Packet switching Routing Revision

Data Link Layer

Position of the data-link layer

LLC and MAC sublayers IEEE standards for LANs

Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit intervals if clocks not aligned and drifting will sample at wrong time after sufficient bits are sent two solutions to synchronizing clocks asynchronous transmission synchronous transmission

Asynchronous Transmission simple cheap overhead of 2 or 3 bits per char (~20%) good for data with large gaps (keyboard)

Synchronous Transmission block of data transmitted sent as a frame clocks must be synchronized can use separate clock line or embed clock signal in data need to indicate start and end of block use preamble and postamble more efficient (lower overhead) than async

Note: Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected.

Types of Error an error occurs when a bit is altered between transmission and reception single bit errors only one bit altered caused by white noise burst errors contiguous sequence of B bits in which first last and any number of intermediate bits in error caused by impulse noise or by fading in wireless effect greater at higher data rates

10.1 Single-bit error 10.2 Burst error of length 5

Probabilities of Error P b = Probability that a bit is received in error, AKA as BER P 1 = Probability that a frame arrives with no bits in error P 2 = Probability that a frame arrives with one or more undetectable error in the presence of error detection algorithm P 3 =Probability that a frame arrives with one or more detected bit errors in the presence of error detection algorithm

Probabilities of Error In case of no error detection algorithm is used P 3 =zero P 1 =(1-P b ) n P 2 =1-P 1

10.2 Detection Redundancy Parity Check Cyclic Redundancy Check (CRC) Checksum

Error Detection Process

Note: Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination.

10.3 Redundancy

10.4 Detection methods

10.5 Even-parity concept

Note: In parity check, a parity bit is added to every data unit so that the total number of 1s is even (or odd for odd-parity).

Example 1 Suppose the sender wants to send the word world. In ASCII the five characters are coded as 1110111 1101111 1110010 1101100 1100100 The following shows the actual bits sent 11101110 11011110 11100100 11011000 11001001

Example 2 Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission. 11101110 11011110 11100100 11011000 11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.

Example 3 Now suppose the word world in Example 1 is corrupted during transmission. 11111110 11011110 11101100 11011000 11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.

Note: Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd.

10.6 Two-dimensional parity

Example 4 Suppose the following block is sent: 10101001 00111001 11011101 11100111 10101010 However, it is hit by a burst noise of length 8, and some bits are corrupted. 10100011 10001001 11011101 11100111 10101010 When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded. 10100011 10001001 11011101 11100111 10101010

Note: In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block.

Cyclic Redundancy Check one of most common and powerful checks for block of k bits transmitter generates an n bit frame check sequence (FCS) transmits k+n bits which is exactly divisible by some number receiver divides frame by that number if no remainder, assume no error for math, see Stallings chapter 6

10.8 Binary division in a CRC generator

10.9 Binary division in CRC checker

10.10 A polynomial Example D=1010001101 P=110101

Table 10.1 Standard polynomials Name CRC-8 CRC-10 ITU-16 ITU-32 Polynomial x 8 + x 2 + x + 1 x 10 + x 9 + x 5 + x 4 + x 2 + 1 x 16 + x 12 + x 5 + 1 x 32 + x 26 + x 23 + x 22 + x 16 + x 12 + x 11 + x 10 + x 8 + x 7 + x 5 + x 4 + x 2 + x + 1 Application ATM header ATM AAL HDLC LANs

Example 6 The CRC-12 x 12 + x 11 + x 3 + x + 1 which has a degree of 12, will detect all burst errors affecting an odd number of bits, will detect all burst errors with a length less than or equal to 12, and will detect, 99.97 percent of the time, burst errors with a length of 12 or more.

10.12 Checksum

Example 7 Suppose the following block of 16 bits is to be sent using a checksum of 8 bits. 10101001 00111001 The numbers are added using one s complement 10101001 00111001 ------------ Sum 11100010 Checksum 00011101 The pattern sent is 10101001 00111001 00011101

Example 8 Now suppose the receiver receives the pattern sent in Example 7 and there is no error. 10101001 00111001 00011101 When the receiver adds the three sections, it will get all 1s, which, after complementing, is all 0s and shows that there is no error. 10101001 00111001 00011101 Sum 11111111 Complement 00000000 means that the pattern is OK.

Example 9 Now suppose there is a burst error of length 5 that affects 4 bits. 10101111 11111001 00011101 When the receiver adds the three sections, it gets 10101111 11111001 00011101 Partial Sum 1 11000101 Carry 1 Sum 11000110 Complement 00111001 the pattern is corrupted.

Thank You