0% found this document useful (0 votes)
20 views88 pages

Chapter-Iii Error Detection, Correction and Wireless Communication

Uploaded by

luminousmirth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views88 pages

Chapter-Iii Error Detection, Correction and Wireless Communication

Uploaded by

luminousmirth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 88

DATA COMMUNICATION &

COMPUTER NETWORK
DCC-22414

UNIT-III
ERROR DETECTION, CORRECTION &
WIRELESS COMMUNICATION

Mr. Naresh A. Kamble


27-04-2021
POINTS TO BE COVERED
• INTRODUCTION TO ERRORS

• TYPES OF ERRORS

• ERROR DETECTION

• ERROR CORRECTION

• IEEE STANDARDS

• WIRELESS LAN’s

• BLUETOOTH ARCHITECTURE

• MOBILE GENERATION

27-04-2021
INTRODUCTION

• Cause of data getting corrupted (Transmission Impairments)

• Attenuation – Loss of energy

• Distortion – Change in form

• Noise – Unintentional Voltages

27-04-2021
TYPES OF ERRORS
• There are two types of errors during transmission of data
from source to destination.

• SINGLE BIT ERROR

• BURST ERROR

27-04-2021
TYPES OF ERRORS

27-04-2021
27-04-2021
TYPES OF ERRORS

27-04-2021
27-04-2021
TYPES OF ERRORS

27-04-2021
27-04-2021
ERROR DETECTION
• Errors are caused by transmission impairments.

• Error detection is simpler than Error correction.

• Error detection only see if the error has occurred or not.

• It does not focus on how many errors has occurred.

• A burst error is similar to a single bit error.


27-04-2021
ERROR DETECTION
• There are 3 types of error detection methods

• VERTICAL REDUNDANCY CHECK (VRC)

• LONGITUDINAL REDUNDANCY CHECK (LRC)

• CYCLIC REDUNDANCY CHECK (CRC)

27-04-2021
ERROR DETECTION
• PARITY CHECKING

• Parity bit means nothing but an additional bit added to the


data at the transmitter before transmitting the data.

• Before adding the parity bit, number of 1’s or zeros is


calculated in the data.

• Based on this calculation of data an extra bit is added to the


actual information / data.

27-04-2021
ERROR DETECTION
• The addition of parity bit to the data will result in the change
of data string size. This means if we have an 8 bit data, then
after adding a parity bit to the data binary string it will
become a 9 bit binary data string.

• Parity check is also called as “Vertical Redundancy Check


(VRC)”. There is two types of parity bits in error detection,
they are
– Even parity

– Odd parity
27-04-2021
ERROR DETECTION
• VERTICAL REDUNDANCY CHECK (VRC)

• Parity bit means nothing but an additional bit added to the


data at the transmitter before transmitting the data.

• Before adding the parity bit, number of 1’s or zeros is


calculated in the data.

• Based on this calculation of data an extra bit is added to the


actual information /data.

27-04-2021
ERROR DETECTION
• VERTICAL REDUNDANCY CHECK (VRC)

• The addition of parity bit to the data will result in the change
of data string size.

• This means if we have an 8 bit data, then after adding a parity


bit to the data binary string it will become a 9 bit binary data
string.

27-04-2021
ERROR DETECTION
• VERTICAL REDUNDANCY CHECK (VRC)

• There is two types of parity bits in error detection, they are

• A. EVEN PARITY

• If the data has even number of 1’s, the parity bit is 0.

• Ex: data is 10000001 ->parity bit 0

• Odd number of 1’s, the parity bit is 1.

• Ex: data is 10010001 -> parity bit 1

27-04-2021
ERROR DETECTION
• VERTICAL REDUNDANCY CHECK (VRC)

• B. ODD PARITY

• If the data has odd number of 1’s, the parity bit is 0.

• Ex: data is 10011101 -> parity bit 0

• Even number of 1’s, the parity bit is 1.

• Ex: data is 10010101 -> parity bit 1

27-04-2021
ERROR DETECTION

27-04-2021
ERROR DETECTION

27-04-2021
27-04-2021
ERROR DETECTION
• EXAMPLE - 1

• Suppose the sender wants to send the word WORLD. In ASCII


the five characters are coded as

1110111 1101111 1110010 1101100 1100100

• The following shows the actual bits sent

11101110 11011110 11100100 11011000 11001001

27-04-2021
ERROR DETECTION
• EXAMPLE - 2

• Now suppose the word WORLD in Example 1 is received by


the receiver without being corrupted in transmission.

11101110 11011110 11100100 11011000 11001001

• The receiver counts the 1s in each character and comes up


with even numbers (6, 6, 4, 4, 4). The data are accepted.

27-04-2021
ERROR DETECTION
• EXAMPLE - 3

• Now suppose the word world in Example 1 is corrupted during


transmission.

11111110 11011110 11101100 11011000 11001000

• The receiver counts the 1s in each character and comes up


with even and odd numbers (7, 6, 5, 4, 3).

• The receiver knows that the data are corrupted, discards


them, and asks for retransmission.

27-04-2021
ERROR DETECTION
• LONGITUDINAL REDUNDANCY CHECK (LRC)

• LRC is simpler than VRC.

• In LRC, a block of bits is divided into rows and a redundant


rows of bits is added to the whole block.

• Data is organized in a table (rows and columns) format.

27-04-2021
27-04-2021
As both the LRC (sent by sender and calculated by receiver) are not matching so
receiver will reject data block.
27-04-2021
ERROR DETECTION
• CYCLIC REDUNDANCY CHECK (CRC)

• In CRC, a message is divided into blocks, each of k bits, called


datawords.

• Then r redundant bits are added to each block to make the


length n = k + r.

• The resulting n-bit blocks are called codewords.


27-04-2021
27-04-2021
27-04-2021
ERROR DETECTION

27-04-2021
27-04-2021
27-04-2021
1 0 1

0 1 1

1 1 0

0 0 0

27-04-2021
27-04-2021
27-04-2021
ERROR DETECTION
• CYCLIC REDUNDANCY CHECK (CRC)

• Example to solve

• Dataword (k): 1001

• Redundant bits (r): 000

• Codeword (n): 1001000

• Divisor: 1101

27-04-2021
SENDER (ENCODER) 1 1 1 1

1 0 0 1 0 0 0
1 1 0 1
1 1 0 1

0 1 0 0 0

1 1 0 1

0 1 0 1 0

1 1 0 1

0 1 1 1 0

1 1 0 1

27-04-2021 0 0 1 1
ERROR DETECTION
• CYCLIC REDUNDANCY CHECK (CRC)

• SENDER SIDE (ENCODER)

• Dataword (k): 1001

• Remainder : 011

• Codeword (n): 1001011

27-04-2021
RECEIVER (DECODER) 1 1 1 1

1 0 0 1 0 1 1
1 1 0 1
1 1 0 1

0 1 0 0 0

1 1 0 1

0 1 0 1 1

1 1 0 1

0 1 1 0 1

1 1 0 1

27-04-2021 0 0 0 0
ERROR DETECTION
• CYCLIC REDUNDANCY CHECK (CRC)

• RECEIVER SIDE (DECODER)

• Dataword (k): 1001

• Syndrome: 000

• Codeword (n): 1011000

• As the Syndrome Bits are all ‘000’. The Dataword 1001 is


accepted and considered as error free.
27-04-2021
ERROR CORRECTION
• BACKWARD ERROR CORRECTION (BEC)

• Backward error correction (BEC) (also known as Automatic


Repeat request, ARQ) uses feedback from the receiver to the
transmitter: the receiver signals to the transmitter whether a
block of data was received correctly or not.

• If the reception is erroneous, then the transmission is


repeated. This scheme is simple, yet surprisingly efficient.

• ARQ leads to a delay in the transmission of data packets.

27-04-2021
ERROR CORRECTION
• FORWARD ERROR CORRECTION (BEC)

• Forward error correction (FEC) or channel coding is a


technique used for controlling errors in data transmission over
unreliable or noisy communication channels. The central idea
is the sender encodes the message in a redundant way by
using an error-correcting code (ECC).

27-04-2021
IEEE STANDARDS
• The Institute of Electrical and Electronic Engineers (IEEE) is a global
association and organization of professionals working toward the
development, implementation and maintenance of technology-centered
products and services.

• IEEE is a nonprofit organization founded in 1963.

• It works solely toward innovating, educating and standardizing the


electrical and electronic development industry.

•27-04-2021
It is best known for its development of standards such as IEEE 802.11.
27-04-2021
27-04-2021
IEEE STANDARDS
• IEEE 802.1 – Network Management

• IEEE 802.2 – Logical Link Control (LLC)

• IEEE 802.3 – Ethernet Based Networks

• IEEE 802.4 – Token Bus

• IEEE 802.5 – Token Ring

• IEEE 802.11 – Wireless Technologies


27-04-2021
IEEE STANDARDS
• IEEE 802.1
• It is associated with network management and
monitoring capabilities in a network.

• It mainly focus on
– Internetworking
– Audio / Video (A/V) bridging
– Data Center Bridging
– Security
27-04-2021
IEEE STANDARDS
• IEEE 802.2
• It is referred to as Logical Link Control (LLC) that manages
data flow control and error control for the other IEEE LAN
standards.

• 802.2 is also called as “translator” for Data Link Layer.

27-04-2021
27-04-2021
IEEE STANDARDS
• IEEE 802.3

• It deals with Ethernet-Based Networks.

• It deals with physical Layer and Media Access Control (MAC)

27-04-2021
IEEE STANDARDS
• IEEE 802.4
• It defines Token Bus.

• It defines Local Area Network (LAN).

• In this a network connects nodes on the bus or tree to form a


logical ring (virtual ring).

• A token is used to pass the data / information.


27-04-2021
27-04-2021
27-04-2021
IEEE STANDARDS
• IEEE 802.5
• It defines Token Ring that was developed by IBM in 1970.

• A token is used to pass the data / information.

• In this a network connects nodes to form a logical ring


(Physical Ring).

27-04-2021
27-04-2021
IEEE STANDARDS
• WIRELESS LAN
• Wireless network do not require physical cabling.

• Wireless Local Area Network (WLAN) is a wireless distribution


method for two or more devices that use high-frequency radio
waves and often include an access point to the internet.

27-04-2021
COMPONENTS OF WLAN
Stations (STAs)
Access Point (AP)
Distribution System (DS)
Wireless
27-04-2021
Medium
IEEE STANDARDS
• IEEE 802.11 Architecture

• Two network architectures are supported


• 1. Infrastructure Network
– It provides communication between wireless clients and
wired network resources.

• 2. Point-to-Point (ad-hoc) Network


– It support mutual communication between wireless
clients. This network is created spontaneously and does
not support access to wired networks.

27-04-2021
27-04-2021
IEEE STANDARDS
• IEEE 802.11 (2.4 GHz to 5 GHz band)
• 802.11a - WLAN

• 802.11b - Modulation Technology

• 802.11g – Addition of Speed

• 802.11n – Multiple Input, Multiple Output (MIMO)

27-04-2021
IEEE STANDARDS
• IEEE 802.11a

• Same as original 802.11 and supports WLAN.

• It uses 5 GHz bandwidth for operation and 54 Mbps data rate.

• Helps for multitasking.

27-04-2021
IEEE STANDARDS
• IEEE 802.11b
• Developed in year 2000.

• It operates on 2.4 GHz band.

• 802.11b added modulation technology.

• It is more suffered by intrusion of other products.

• Used in Bluetooth, microwave oven, cordless phones etc.

27-04-2021
IEEE STANDARDS
• IEEE 802.11g

• Developed in 2003.

• It operates on 2.4 GHz band and provides maximum data rate


of 54 Mbps.

• Addition of forward error and improvement codes.

27-04-2021
IEEE STANDARDS
• IEEE 802.11n

• Developed in 2009.

• Addition of Multiple input, Multiple Output (MIMO).

• It support Wireless Fidelity (Wi-Fi)

27-04-2021
27-04-2021
BLUETOOTH ARCHITECTURE
• BLUETOOTH

• It is short range wireless technology that lets you connect

– Computer

– Mobile Phones

– Handheld devices

– To each other and to the internet.

• It eliminates the use of cables needed to connect devices together.

• It has range of 10 meters.

• Current version of Bluetooth is 4.0.

27-04-2021
BLUETOOTH ARCHITECTURE
• APPLICATIONS OF BLUETOOTH

• Used to provide communication between peripheral devices like


wireless mouse or keyboard with computer.

• Used by modern health care devices to send signals to monitors.

• Used in Mobile phones, PDA, palmtops etc.

• Handsfree voice communication with headset.

• Allows to connect and share internet.

• Used for file transfer from one device to other.

27-04-2021
BLUETOOTH ARCHITECTURE
• BLUETOOTH ARCHITECTURE
• Bluetooth architecture defines two types of network:

• Piconet

• Scatternet

• PICONET

• It consists of one primary (master) node and seven active secondary


(slave) nodes.

• Piconet can have up to eight active nodes (1 master and 7 slaves) or


stations within the distance of 10 meters.

• There can be only one primary or master station in each Piconet.


27-04-2021
BLUETOOTH ARCHITECTURE
• BLUETOOTH ARCHITECTURE

• The communication between primary and secondary can be one-


to-one or one-to-many.

• All communication is between master and slave. Slave to slave


communication is not possible.

• Apart from seven active station, a piconet can have up to 255


parked nodes.

• These nodes are secondary or slave stations and cannot take part
in communication until it is moved from parked state to active
state.
27-04-2021
27-04-2021
BLUETOOTH ARCHITECTURE
• BLUETOOTH ARCHITECTURE

• SCATTERNET
• Scatternet is formed by combining various piconets.

• A slave in one piconet can act as a master or primary in other piconet.

• Such a station can receive messages from the master in the first piconet
and deliver the message to its slaves in other piconet where it is acting as
master.

• This node is also called as bridge slave.

• Thus a station can be a member of two piconets but a station cannot be


master in two piconets
27-04-2021
27-04-2021
BLUETOOTH ARCHITECTURE
• ADVANTAGES OF BLUETOOTH

• It is wireless technology.

• Bluetooth is no expensive.

• It provide low interference.

• It requires low energy consumption.

• It allows data sharing

27-04-2021
BLUETOOTH ARCHITECTURE
• DISADVANTAGES OF BLUETOOTH

• Date rate is 1mbps which is low that IR i.e. 4 mbps.

• Has fixed number of Bluetooth devices in memory, to add a


new one some device in memory has to be deleted.

27-04-2021
MOBILE GENERATIONS

27-04-2021
MOBILE GENERATIONS

27-04-2021
MOBILE GENERATIONS

27-04-2021
MOBILE GENERATIONS
• First mobile developed in 1946 in USA.

• It was operated on single channel.

• It was working on half-duplex mode and called as push-to-talk-system.

• In 1960’s Improved Mobile Telephone System (IMTS) was developed.

• It operated on two frequencies, one for sending and other for receiving
and worked on fullduplex mode with 23 channels.

• In 1980’s Advanced Mobile Phone System (AMPS) was developed in


England.

• Here the area was divided into small regions called as cells.

27-04-2021
MOBILE GENERATIONS
• Cells are in circular manner and looks like a “Honey Bee Hive”

• Each cell has antenna and a cell office to control that cell.

• A Mobile Telephone Switching Office (MTSO) controls various such


cell offices and coordinates the communication between them and
the Telephone Central Office (TCO) or a telephone exchange.

• MTSO is responsible for information and the billing of the cells.

• MTSO places calls from land based telephones to wireless


customers.

• It switches calls between cells as mobile travels across cell


boundaries.
27-04-2021
MOBILE GENERATIONS

27-04-2021
MOBILE GENERATIONS
• 1G (VOICE ONLY)

• Launched in Japan by NTT in 1979.

• 1G is Analog Technology and phones had poor battery life and voice
quality was large without much security and experienced drop calls.

• The maximum speed of 1G is 2.4 Kbps.

• It was used for voice services and was based on technology called as
Advanced Mobile Phone System (AMPS).

• AMPS system was frequency modulated and used FDMA with channel
capacity of 30 KHz and frequency band of 824-894 MHz

27-04-2021
MOBILE GENERATIONS
• 2G (DIGITAL NETWORKS)

• Launched in Finland in 1991.

• It is based on Global System for Mobile communications (GSM) and Code


division Multiple Access (CDMA).

• It use digital signals.

• Its data speed is up to 64 Kbps.

• It enables services like text messages, picture messages and multimedia


message (MMS).

• It provides better quality and capacity (coverage area).

27-04-2021
MOBILE GENERATIONS
• 3G (HIGH SPEED IP DATA NETWORKS)

• Based on GSM and was launched in 2000.

• It use packet switching and provides data rate up to 14 Mbps.

• 3G utilizes Universal Mobile Telecommunication System (UMTS).

• It offers data services, access to television/video, new services like Global


Roaming.

27-04-2021
MOBILE GENERATIONS
• 4G (GROWTH OF MOBILE BROADBAND)

• It is extension of the 3G technology with more bandwidth and services


offers in the 3G.

• It offers a downloading speed of 100 Mbps.

• Long Term Evolution (LTE) is considered as 4G technology.

• It provides high quality audio/video streaming over end to end Internet


Protocol.

• Key technologies used in 4G are Multiple Input Multiple Output (MIMO)


and Orthogonal Frequency Division Multiplexing (OFDM).

27-04-2021
MOBILE GENERATIONS
• 5G

• Started in 2010.

• Main focus is on Wireless World Wide Web (WWWW).

• Max speed of 5G is aimed at being as fast 35.46 Gbps, which is over 35


times faster than 4G.

• Key Technologies
– Massive MIMO

– Millimeter Wave Mobile Communication

– Small cells

– Li-Fi

• And all new technologies from the previous decade could be used to give
27-04-2021
10 Gbps to a user.
27-04-2021
27-04-2021

You might also like