DATA COMMUNICATION &
COMPUTER NETWORK
DCC-22414
UNIT-III
ERROR DETECTION, CORRECTION &
WIRELESS COMMUNICATION
Mr. Naresh A. Kamble
27-04-2021
POINTS TO BE COVERED
• INTRODUCTION TO ERRORS
• TYPES OF ERRORS
• ERROR DETECTION
• ERROR CORRECTION
• IEEE STANDARDS
• WIRELESS LAN’s
• BLUETOOTH ARCHITECTURE
• MOBILE GENERATION
27-04-2021
INTRODUCTION
• Cause of data getting corrupted (Transmission Impairments)
• Attenuation – Loss of energy
• Distortion – Change in form
• Noise – Unintentional Voltages
27-04-2021
TYPES OF ERRORS
• There are two types of errors during transmission of data
from source to destination.
• SINGLE BIT ERROR
• BURST ERROR
27-04-2021
TYPES OF ERRORS
27-04-2021
27-04-2021
TYPES OF ERRORS
27-04-2021
27-04-2021
TYPES OF ERRORS
27-04-2021
27-04-2021
ERROR DETECTION
• Errors are caused by transmission impairments.
• Error detection is simpler than Error correction.
• Error detection only see if the error has occurred or not.
• It does not focus on how many errors has occurred.
• A burst error is similar to a single bit error.
27-04-2021
ERROR DETECTION
• There are 3 types of error detection methods
• VERTICAL REDUNDANCY CHECK (VRC)
• LONGITUDINAL REDUNDANCY CHECK (LRC)
• CYCLIC REDUNDANCY CHECK (CRC)
27-04-2021
ERROR DETECTION
• PARITY CHECKING
• Parity bit means nothing but an additional bit added to the
data at the transmitter before transmitting the data.
• Before adding the parity bit, number of 1’s or zeros is
calculated in the data.
• Based on this calculation of data an extra bit is added to the
actual information / data.
27-04-2021
ERROR DETECTION
• The addition of parity bit to the data will result in the change
of data string size. This means if we have an 8 bit data, then
after adding a parity bit to the data binary string it will
become a 9 bit binary data string.
• Parity check is also called as “Vertical Redundancy Check
(VRC)”. There is two types of parity bits in error detection,
they are
– Even parity
– Odd parity
27-04-2021
ERROR DETECTION
• VERTICAL REDUNDANCY CHECK (VRC)
• Parity bit means nothing but an additional bit added to the
data at the transmitter before transmitting the data.
• Before adding the parity bit, number of 1’s or zeros is
calculated in the data.
• Based on this calculation of data an extra bit is added to the
actual information /data.
27-04-2021
ERROR DETECTION
• VERTICAL REDUNDANCY CHECK (VRC)
• The addition of parity bit to the data will result in the change
of data string size.
• This means if we have an 8 bit data, then after adding a parity
bit to the data binary string it will become a 9 bit binary data
string.
27-04-2021
ERROR DETECTION
• VERTICAL REDUNDANCY CHECK (VRC)
• There is two types of parity bits in error detection, they are
• A. EVEN PARITY
• If the data has even number of 1’s, the parity bit is 0.
• Ex: data is 10000001 ->parity bit 0
• Odd number of 1’s, the parity bit is 1.
• Ex: data is 10010001 -> parity bit 1
27-04-2021
ERROR DETECTION
• VERTICAL REDUNDANCY CHECK (VRC)
• B. ODD PARITY
• If the data has odd number of 1’s, the parity bit is 0.
• Ex: data is 10011101 -> parity bit 0
• Even number of 1’s, the parity bit is 1.
• Ex: data is 10010101 -> parity bit 1
27-04-2021
ERROR DETECTION
27-04-2021
ERROR DETECTION
27-04-2021
27-04-2021
ERROR DETECTION
• EXAMPLE - 1
• Suppose the sender wants to send the word WORLD. In ASCII
the five characters are coded as
1110111 1101111 1110010 1101100 1100100
• The following shows the actual bits sent
11101110 11011110 11100100 11011000 11001001
27-04-2021
ERROR DETECTION
• EXAMPLE - 2
• Now suppose the word WORLD in Example 1 is received by
the receiver without being corrupted in transmission.
11101110 11011110 11100100 11011000 11001001
• The receiver counts the 1s in each character and comes up
with even numbers (6, 6, 4, 4, 4). The data are accepted.
27-04-2021
ERROR DETECTION
• EXAMPLE - 3
• Now suppose the word world in Example 1 is corrupted during
transmission.
11111110 11011110 11101100 11011000 11001000
• The receiver counts the 1s in each character and comes up
with even and odd numbers (7, 6, 5, 4, 3).
• The receiver knows that the data are corrupted, discards
them, and asks for retransmission.
27-04-2021
ERROR DETECTION
• LONGITUDINAL REDUNDANCY CHECK (LRC)
• LRC is simpler than VRC.
• In LRC, a block of bits is divided into rows and a redundant
rows of bits is added to the whole block.
• Data is organized in a table (rows and columns) format.
27-04-2021
27-04-2021
As both the LRC (sent by sender and calculated by receiver) are not matching so
receiver will reject data block.
27-04-2021
ERROR DETECTION
• CYCLIC REDUNDANCY CHECK (CRC)
• In CRC, a message is divided into blocks, each of k bits, called
datawords.
• Then r redundant bits are added to each block to make the
length n = k + r.
• The resulting n-bit blocks are called codewords.
27-04-2021
27-04-2021
27-04-2021
ERROR DETECTION
27-04-2021
27-04-2021
27-04-2021
1 0 1
0 1 1
1 1 0
0 0 0
27-04-2021
27-04-2021
27-04-2021
ERROR DETECTION
• CYCLIC REDUNDANCY CHECK (CRC)
• Example to solve
• Dataword (k): 1001
• Redundant bits (r): 000
• Codeword (n): 1001000
• Divisor: 1101
27-04-2021
SENDER (ENCODER) 1 1 1 1
1 0 0 1 0 0 0
1 1 0 1
1 1 0 1
0 1 0 0 0
1 1 0 1
0 1 0 1 0
1 1 0 1
0 1 1 1 0
1 1 0 1
27-04-2021 0 0 1 1
ERROR DETECTION
• CYCLIC REDUNDANCY CHECK (CRC)
• SENDER SIDE (ENCODER)
• Dataword (k): 1001
• Remainder : 011
• Codeword (n): 1001011
27-04-2021
RECEIVER (DECODER) 1 1 1 1
1 0 0 1 0 1 1
1 1 0 1
1 1 0 1
0 1 0 0 0
1 1 0 1
0 1 0 1 1
1 1 0 1
0 1 1 0 1
1 1 0 1
27-04-2021 0 0 0 0
ERROR DETECTION
• CYCLIC REDUNDANCY CHECK (CRC)
• RECEIVER SIDE (DECODER)
• Dataword (k): 1001
• Syndrome: 000
• Codeword (n): 1011000
• As the Syndrome Bits are all ‘000’. The Dataword 1001 is
accepted and considered as error free.
27-04-2021
ERROR CORRECTION
• BACKWARD ERROR CORRECTION (BEC)
• Backward error correction (BEC) (also known as Automatic
Repeat request, ARQ) uses feedback from the receiver to the
transmitter: the receiver signals to the transmitter whether a
block of data was received correctly or not.
• If the reception is erroneous, then the transmission is
repeated. This scheme is simple, yet surprisingly efficient.
• ARQ leads to a delay in the transmission of data packets.
27-04-2021
ERROR CORRECTION
• FORWARD ERROR CORRECTION (BEC)
• Forward error correction (FEC) or channel coding is a
technique used for controlling errors in data transmission over
unreliable or noisy communication channels. The central idea
is the sender encodes the message in a redundant way by
using an error-correcting code (ECC).
27-04-2021
IEEE STANDARDS
• The Institute of Electrical and Electronic Engineers (IEEE) is a global
association and organization of professionals working toward the
development, implementation and maintenance of technology-centered
products and services.
• IEEE is a nonprofit organization founded in 1963.
• It works solely toward innovating, educating and standardizing the
electrical and electronic development industry.
•27-04-2021
It is best known for its development of standards such as IEEE 802.11.
27-04-2021
27-04-2021
IEEE STANDARDS
• IEEE 802.1 – Network Management
• IEEE 802.2 – Logical Link Control (LLC)
• IEEE 802.3 – Ethernet Based Networks
• IEEE 802.4 – Token Bus
• IEEE 802.5 – Token Ring
• IEEE 802.11 – Wireless Technologies
27-04-2021
IEEE STANDARDS
• IEEE 802.1
• It is associated with network management and
monitoring capabilities in a network.
• It mainly focus on
– Internetworking
– Audio / Video (A/V) bridging
– Data Center Bridging
– Security
27-04-2021
IEEE STANDARDS
• IEEE 802.2
• It is referred to as Logical Link Control (LLC) that manages
data flow control and error control for the other IEEE LAN
standards.
• 802.2 is also called as “translator” for Data Link Layer.
27-04-2021
27-04-2021
IEEE STANDARDS
• IEEE 802.3
• It deals with Ethernet-Based Networks.
• It deals with physical Layer and Media Access Control (MAC)
27-04-2021
IEEE STANDARDS
• IEEE 802.4
• It defines Token Bus.
• It defines Local Area Network (LAN).
• In this a network connects nodes on the bus or tree to form a
logical ring (virtual ring).
• A token is used to pass the data / information.
27-04-2021
27-04-2021
27-04-2021
IEEE STANDARDS
• IEEE 802.5
• It defines Token Ring that was developed by IBM in 1970.
• A token is used to pass the data / information.
• In this a network connects nodes to form a logical ring
(Physical Ring).
27-04-2021
27-04-2021
IEEE STANDARDS
• WIRELESS LAN
• Wireless network do not require physical cabling.
• Wireless Local Area Network (WLAN) is a wireless distribution
method for two or more devices that use high-frequency radio
waves and often include an access point to the internet.
27-04-2021
COMPONENTS OF WLAN
Stations (STAs)
Access Point (AP)
Distribution System (DS)
Wireless
27-04-2021
Medium
IEEE STANDARDS
• IEEE 802.11 Architecture
• Two network architectures are supported
• 1. Infrastructure Network
– It provides communication between wireless clients and
wired network resources.
• 2. Point-to-Point (ad-hoc) Network
– It support mutual communication between wireless
clients. This network is created spontaneously and does
not support access to wired networks.
27-04-2021
27-04-2021
IEEE STANDARDS
• IEEE 802.11 (2.4 GHz to 5 GHz band)
• 802.11a - WLAN
• 802.11b - Modulation Technology
• 802.11g – Addition of Speed
• 802.11n – Multiple Input, Multiple Output (MIMO)
27-04-2021
IEEE STANDARDS
• IEEE 802.11a
• Same as original 802.11 and supports WLAN.
• It uses 5 GHz bandwidth for operation and 54 Mbps data rate.
• Helps for multitasking.
27-04-2021
IEEE STANDARDS
• IEEE 802.11b
• Developed in year 2000.
• It operates on 2.4 GHz band.
• 802.11b added modulation technology.
• It is more suffered by intrusion of other products.
• Used in Bluetooth, microwave oven, cordless phones etc.
27-04-2021
IEEE STANDARDS
• IEEE 802.11g
• Developed in 2003.
• It operates on 2.4 GHz band and provides maximum data rate
of 54 Mbps.
• Addition of forward error and improvement codes.
27-04-2021
IEEE STANDARDS
• IEEE 802.11n
• Developed in 2009.
• Addition of Multiple input, Multiple Output (MIMO).
• It support Wireless Fidelity (Wi-Fi)
27-04-2021
27-04-2021
BLUETOOTH ARCHITECTURE
• BLUETOOTH
• It is short range wireless technology that lets you connect
– Computer
– Mobile Phones
– Handheld devices
– To each other and to the internet.
• It eliminates the use of cables needed to connect devices together.
• It has range of 10 meters.
• Current version of Bluetooth is 4.0.
27-04-2021
BLUETOOTH ARCHITECTURE
• APPLICATIONS OF BLUETOOTH
• Used to provide communication between peripheral devices like
wireless mouse or keyboard with computer.
• Used by modern health care devices to send signals to monitors.
• Used in Mobile phones, PDA, palmtops etc.
• Handsfree voice communication with headset.
• Allows to connect and share internet.
• Used for file transfer from one device to other.
27-04-2021
BLUETOOTH ARCHITECTURE
• BLUETOOTH ARCHITECTURE
• Bluetooth architecture defines two types of network:
• Piconet
• Scatternet
• PICONET
• It consists of one primary (master) node and seven active secondary
(slave) nodes.
• Piconet can have up to eight active nodes (1 master and 7 slaves) or
stations within the distance of 10 meters.
• There can be only one primary or master station in each Piconet.
27-04-2021
BLUETOOTH ARCHITECTURE
• BLUETOOTH ARCHITECTURE
• The communication between primary and secondary can be one-
to-one or one-to-many.
• All communication is between master and slave. Slave to slave
communication is not possible.
• Apart from seven active station, a piconet can have up to 255
parked nodes.
• These nodes are secondary or slave stations and cannot take part
in communication until it is moved from parked state to active
state.
27-04-2021
27-04-2021
BLUETOOTH ARCHITECTURE
• BLUETOOTH ARCHITECTURE
• SCATTERNET
• Scatternet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station can receive messages from the master in the first piconet
and deliver the message to its slaves in other piconet where it is acting as
master.
• This node is also called as bridge slave.
• Thus a station can be a member of two piconets but a station cannot be
master in two piconets
27-04-2021
27-04-2021
BLUETOOTH ARCHITECTURE
• ADVANTAGES OF BLUETOOTH
• It is wireless technology.
• Bluetooth is no expensive.
• It provide low interference.
• It requires low energy consumption.
• It allows data sharing
27-04-2021
BLUETOOTH ARCHITECTURE
• DISADVANTAGES OF BLUETOOTH
• Date rate is 1mbps which is low that IR i.e. 4 mbps.
• Has fixed number of Bluetooth devices in memory, to add a
new one some device in memory has to be deleted.
27-04-2021
MOBILE GENERATIONS
27-04-2021
MOBILE GENERATIONS
27-04-2021
MOBILE GENERATIONS
27-04-2021
MOBILE GENERATIONS
• First mobile developed in 1946 in USA.
• It was operated on single channel.
• It was working on half-duplex mode and called as push-to-talk-system.
• In 1960’s Improved Mobile Telephone System (IMTS) was developed.
• It operated on two frequencies, one for sending and other for receiving
and worked on fullduplex mode with 23 channels.
• In 1980’s Advanced Mobile Phone System (AMPS) was developed in
England.
• Here the area was divided into small regions called as cells.
27-04-2021
MOBILE GENERATIONS
• Cells are in circular manner and looks like a “Honey Bee Hive”
• Each cell has antenna and a cell office to control that cell.
• A Mobile Telephone Switching Office (MTSO) controls various such
cell offices and coordinates the communication between them and
the Telephone Central Office (TCO) or a telephone exchange.
• MTSO is responsible for information and the billing of the cells.
• MTSO places calls from land based telephones to wireless
customers.
• It switches calls between cells as mobile travels across cell
boundaries.
27-04-2021
MOBILE GENERATIONS
27-04-2021
MOBILE GENERATIONS
• 1G (VOICE ONLY)
• Launched in Japan by NTT in 1979.
• 1G is Analog Technology and phones had poor battery life and voice
quality was large without much security and experienced drop calls.
• The maximum speed of 1G is 2.4 Kbps.
• It was used for voice services and was based on technology called as
Advanced Mobile Phone System (AMPS).
• AMPS system was frequency modulated and used FDMA with channel
capacity of 30 KHz and frequency band of 824-894 MHz
27-04-2021
MOBILE GENERATIONS
• 2G (DIGITAL NETWORKS)
• Launched in Finland in 1991.
• It is based on Global System for Mobile communications (GSM) and Code
division Multiple Access (CDMA).
• It use digital signals.
• Its data speed is up to 64 Kbps.
• It enables services like text messages, picture messages and multimedia
message (MMS).
• It provides better quality and capacity (coverage area).
27-04-2021
MOBILE GENERATIONS
• 3G (HIGH SPEED IP DATA NETWORKS)
• Based on GSM and was launched in 2000.
• It use packet switching and provides data rate up to 14 Mbps.
• 3G utilizes Universal Mobile Telecommunication System (UMTS).
• It offers data services, access to television/video, new services like Global
Roaming.
27-04-2021
MOBILE GENERATIONS
• 4G (GROWTH OF MOBILE BROADBAND)
• It is extension of the 3G technology with more bandwidth and services
offers in the 3G.
• It offers a downloading speed of 100 Mbps.
• Long Term Evolution (LTE) is considered as 4G technology.
• It provides high quality audio/video streaming over end to end Internet
Protocol.
• Key technologies used in 4G are Multiple Input Multiple Output (MIMO)
and Orthogonal Frequency Division Multiplexing (OFDM).
27-04-2021
MOBILE GENERATIONS
• 5G
• Started in 2010.
• Main focus is on Wireless World Wide Web (WWWW).
• Max speed of 5G is aimed at being as fast 35.46 Gbps, which is over 35
times faster than 4G.
• Key Technologies
– Massive MIMO
– Millimeter Wave Mobile Communication
– Small cells
– Li-Fi
• And all new technologies from the previous decade could be used to give
27-04-2021
10 Gbps to a user.
27-04-2021
27-04-2021