T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:

Size: px
Start display at page:

Download "T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:"

Transcription

1 T305 T325 B BLOCK 4 T325 Summary Prepared by: Session 3 [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your address] Dr. Saatchi, Seyed Mohsen T325

2 Error Control Coding Q1: Possibility of fault in all memory technologies means one or more bits being in error: Bit error : 1 0 or 0 1 True Q2: What is BER stands for? Bit Error Rate Q3: Bit error rate (BER), or bit error ratio, is one measure of how badly a signal is affected by errors. True Q4: Which is better: a high BER or a low BER? If there are 10 errors in bits, what is the BER? Lower BER is better, The BER = 10/10000 = Q5: Messages to be conveyed from the data source to the data sink. True Q6: The transmitter converts each message to a codeword (a process called encoding or just coding), which is sent through the channel. True Q7: The receiver converts the codeword back to the message (decoding). True Q8: Redundancy is a measure of the proportion of a code that is extra beyond what is strictly needed to convey the message. True Q9: What does it mean by term Redundancy? Redundancy is a measure of the proportion of a code that is extra beyond what is strictly needed to convey the message. Prepared by: Dr. Saatchi, Seyed Mohsen 2

3 Q10: Redundancy can be quantified, If the message has k bits and the codeword n bits, the redundancy of the code is: R = (n k) / n True Q11: The message has 4 bits (it is, say, 1101) and two extra bits are added for error control coding. The message with 4 bits, with extra 2 bits will be 6 bits in the codeword, so the redundancy of the codeword is R= (n-k) /n n= 6 (4 bits message + 2 bits codeword) k = 4 R= (6-4)/6 R= 2/6 2/6, which is X100= 33%. Q12: The message has 4 bits (it is, say, 1101) and two extra bits are added for error control coding. What is the code rate? n= 6, (4 bits message + 2 bits code word) k=4 (4 bits message) Code rate = k/n Code rate = 4/6 The code of an (n, k) code is given by k/n, so the rate of a (6, 4) code is 2/3. = X 100 = 66% Note: Code rate is normally written as a fraction, reduced to the smallest integers. Q13: Bit Error Rate (BER) or bit error ratio, is one measure of how badly a signal is affected by errors. A. Which is better a high BER or a low BER? Justify your answer B. If there are 10 errors in bits, what is the BER? Low BER, because low BER => less errors BER = 10/10000 = or 10-3 Prepared by: Dr. Saatchi, Seyed Mohsen 3

4 Q14: A (7,4) hamming code has the following redundancy a. 3/4 b. 4/7 c. 7/3 d. 4/3 e. 3/7 e. 3/7, because R= (n-k) / n => R=(7-4)/7 => R = 3/7 Q15: If there are 100 erroneous bits in , what is the BER? a b c d e c. 10-4, because BER= 100/ = => 10-4 Q16: A (6,4) hamming code has the following redundancy a. 6/4 b. 4/6 c. 3 d. 1/3 e. 6 d. 1/3, because R=(n-k)/n, so R=(6-4)/6 => 2/6 => 1/3 => Q17: The extra bits added by the error control codes are described as redundant bits. True Q18: Raw signals contain redundancy and, because of that, can be compressed to reduce the bit rate. True Q19: What does it mean by term Parity Check? A simple method of detecting single errors Underlies more advanced codes Parity checking can be done either on even parity or on odd parity. Q20: In Parity Check the transmitting device sends data, it counts the number of set bits (ones) in each group of seven bits. If the number of set bits is even, it sets the parity bit to 0 if the number of set bits is odd, it sets the parity bit to 1 True Prepared by: Dr. Saatchi, Seyed Mohsen 4

5 Q21: Suppose a system uses an even parity check code, creating 8-bit codewords by adding a check bit to 7-bit messages. a. What would be the codewords if the messages were: I II An extra bit is added to the end of the message, chosen to be a 1 or 0 in such a way as to ensure that the codeword contains an even number of ones. i ii Q22: Assuming that the probability of there being more than one error in any one codeword is negligible, which of the following codewords contain errors? i ii iii iv i (The number of 1s are Odd), So there is an error ii (The number of 1s are Odd), So there is an error iii (The number of 1s are Even), So there is No error iv (The number of 1s are Odd), So there is an error Note: If the codeword contains an even number of ones it is error free. If it contains an odd number of ones it must contain an error. On this basis, (i), (ii) and (iv) contain an error, while (iii) does not. Prepared by: Dr. Saatchi, Seyed Mohsen 5

6 Q23: Figure below represents a codeword from a rectangular code. a. How many parity digits are used per codeword to check for errors? b. Describe this code using the (n, k) notation. c. Calculate the code rate and the redundancy of this code. d. Assuming that no more than one digit is in error, how many different errors can be corrected using this code? a) The diagram shows that eight parity digits are used to check for errors, out of 20 digits in total. b) n is the total number of bits in the code, 20, and k is the number of bits in the message, which is 12. The code is therefore a (20,12) code. c) The code rate is k/n, which is 12/20, or 3/5. => x 100 = 60% The redundancy is which is 60%. d) The rectangular code can correct a single error at any digit position, including the parity digits, so it can correct 20 different errors. Q24: Supposing that the probability of having more than one bit in error is negligible, which of the following codewords is incorrect? a b c d e a , because 5 one s (Has an error) Q25: How many bits are in error among 1000 bits if the bit error rate is 2% a. 2 b. 5 c. 20 d. 50 e. 200 c. 20, BER = 1000 x 0.02 = 20 Prepared by: Dr. Saatchi, Seyed Mohsen 6

7 Q26: What do you think is better : Compress then Code or Code then Compress? Code then compress: Redundancy bits added by the code will be removed by the compression and thus the result will be vulnerable to errors Compress then Code: Redundancy is minimized in the message signal by efficient source coding and/or advanced data compression, and then redundancy is added back through error-control coding. Compressing then adding redundancy allows the use of efficient error control codes Q27: What does it mean by term Code Distance? Is the minimum number of places in which any two codewords differ This is a fundamental parameter of error control codes! Q28: In general, codes with a minimum Hamming distance of n can correct up to (n - 1)/2 errors if n is odd, True Q29: In general, codes with a minimum Hamming distance of n can correct or up to (n/2) - 1 errors if n is even; or can detect up to n - 1 errors without correcting them True Q30: What is the Hamming distance of the code specified by this Table? Message Codeword Prepared by: Dr. Saatchi, Seyed Mohsen 7

8 To determine the Hamming distance of the code check all possible pairs of codewords, counting in how many places they differ. Table above: minimum value is 3, so the Hamming distance for this code is 3. up to (n - 1)/2 errors if n is odd, So, the Hamming distance is 3, and the number of bits this code can correct is = (3-1) / 2 = 1 bits Q31: What is the Hamming distance of the code specified by this Table? Codeword Minimum hamming distance is 1 up to (n - 1)/2 errors if n is odd, So, the Hamming distance is 3, and the number of bits this code can correct is = (1-1) / 2 = 0 bits Prepared by: Dr. Saatchi, Seyed Mohsen 8

9 Q32: The following matrix represents a codeword from a rectangular code i. Represent this code in (n, k) representation Code = (n,k), n=15, K=8, so the (15,8) ii. Calculate the code rate and the redundancy of this code. Code rate = k/n Code rate = 8/15 Redundancy = (n-k) / n Redundancy = (15-8) / 15 Redundancy = 7/ X 100 = 47% Q33: How many bits the following correction code can correct? Hint: calculate the Hamming distance: up to (n/2) - 1 errors if n is even So, the Hamming distance is 2, and the number of bits this code can correct is = 2/2 1 = 0 bits Prepared by: Dr. Saatchi, Seyed Mohsen 9

10 Q34: What is the Hamming distance of the code specified by this Table? Message Codeword Codeword up to (n - 1)/2 errors if n is odd, So, the Hamming distance is 1, and the number of bits this code can correct is = (1-1) / 2 = 0 bits Q35: What is the Hamming distance of the code specified by this Table? How many erroneous bits it can detect? It can correct? Codeword up to (n-1) /2 errors if n is odd The hamming distance is therefore 3 The code can detect up to 3-1 = 2 erroneous bits It can correct up to 3-1/2 => 1 bit Prepared by: Dr. Saatchi, Seyed Mohsen 10

11 Q36: What is CRC stands for? Cyclic Redundancy Check Q37: What does it mean by term CRC? The CRC stands for Cyclic Redundancy Check, and its more powerful type of error detection code. CRC codes add one or more bytes (a collection of bits) to a message. Q38: In CRC is adding the redundancy makes these codes more flexible than Parity Check codes because they can detect many different combinations of errors. True Q39: How to correct errors once detected? Automatic Repeat Request (ARQ): get a replacement copy of the data. ARQ introduces delays while you wait for the repeat, which might not be acceptable, also the correct data will generally not be available. Forward Error Correction (FEC) : used to overcome the limitations of ARQ Q40: What is ARQ stands for? Automatic Repeat Request Q41: What is FEC stands for? Forward Error Correction Q42: List two types of nodes in convolutional code tree. Upper Node upper path is taken if the input bit is a 0 Lower Node lower path is taken if the input is a 1 Prepared by: Dr. Saatchi, Seyed Mohsen 11

12 Q43: What would the output stream be if the input data were: a) 1010 b) 0110 By using the Convolutional Code: Tree representation a) 1010 => b) 0110 => Q44: It is possible to collapse equivalent nodes at a given level on the tree onto each other, which leads to a trellis rather than a tree. True Prepared by: Dr. Saatchi, Seyed Mohsen 12

13 Q45: What would the output stream be if the input data were: a) 1010 b) 0110 By using the Convolutional Code: Trellis representation a) 1010 => b) 0110 => Q46: Consider the following trellis representation of a convolutional encoder, where S is the point to start from in the encoding process. What will be the codeword if the message to encode is 1101? Justify your answer and draw that path followed in the trellis. In the trellis representation, When a branch is encountered: The upper path is taken if the input bit is a 0 The lower path is taken if the input is a 1. Applying these rules and starting from the point S, the output of the encoder is: Prepared by: Dr. Saatchi, Seyed Mohsen 13

14 Q47: The coding of the input data 1100 is shown by the red dashed path, resulting in the code (The spaces between the pairs of bits are for ease of reading.) What would the output stream be if the input data were? (a) 0011 (b) 1101 A) 0011 => B) 1101 => (a) (b) Prepared by: Dr. Saatchi, Seyed Mohsen 14

15 Q48: The three parts of the question are independent a. Consider the following coding tree for a simple convolutional code. b. What will be the output sequence for the following input sequence: 1101 (start with the most significant bit 1 ->1 ->0 ->1) a. The code rate is ½ since for every one bit input there are two bits output b. Following the arrows (if 1 go down and if 0 go up): the output sequence is : Q49: List two types of Error correction codes. Convolutional codes Block codes Q50: Turbo codes have found a very wide range of applications, mainly in wireless communications, ranging from the third generation mobile systems to deep-space exploration. True Prepared by: Dr. Saatchi, Seyed Mohsen 15

16 Q51: Turbo-codes promise to achieve the ultimate limits of capacity of a communication channel True Q52: In the Turbo Codes Capacity of communication channel, C= B log 2 (1+ S/N), C is the data rate in bits per second ( channel capacity ), B is the channel bandwidth in hertz, S/N is the signal power divided by the noise power and the logarithm is to the base 2. True Q53: Using Shannon equation, what is the maximum theoretical capacity of a channel of bandwidth 500 MHz if the signal to noise ratio (SNR) is 100? According to shannon: C = B log2 (1 + SNR) 500 x 10 6 x log2 ( ) = 500 x 10 6 x 6.66 = 3330 Mbits/s Q54: Block codes are the most popular type of error correction codes. True Q55: Explain the importancies of Block Code. Encoder takes in a message block of finite length adds redundancy sends out a code word that is also a block of longer length than the message. Q56: If the following codes are received, state whether there have been any errors, and give the decoded output. (Assume that the probability of there being more than one error in a received codeword is negligible.) i The decoding can either be done by looking for the closest match among the codewords in Table 3.4, or by calculating the syndrome. Prepared by: Dr. Saatchi, Seyed Mohsen 16

17 i) if the message is ABCD, the hamming codeword is XYAZBCD with X Y A Z B C D The three parity checks are as follows: o ABDX : 0011 => syndrome 0 o ACDY : 0011 => syndrome 0 o BCDZ : 0011 => syndrome 0 Parity 1 tests parity on digits 1, 3, 5 and 7 : => 1100, this has an even number of ones (two), so passes. the syndrome is (0) ABDX : 1001 Parity 2 tests parity on digits 2, 3, 6 and 7: => 1100, this has an even number of ones (two), so passes. the syndrome is (0) ACDY : 1001 Parity 3 tests parity on digits 4, 5, 6 and 7: => 0000, this has an even number of ones (none), so passes. the syndrome is (0) BCDZ : 0000 All three parity checks pass, so the syndrome is 000, and there are no errors. The decoded data is just extracted from the codeword (digits 3, 5, 6 and 7) : => Q57: If the following codes are received, state whether there have been any errors, and give the decoded output. (Assume that the probability of there being more than one error in a received codeword is negligible.) i The decoding can either be done by looking for the closest match among the codewords in Table 3.4, or by calculating the syndrome. i) X Y A Z B C D Parity 1 tests parity on digits 1, 3, 5 and 7: => 1001, this has an Even, so passes. the syndrome is (0) ABDX : 0011 Prepared by: Dr. Saatchi, Seyed Mohsen 17

18 Parity 2 tests parity on digits 2, 3, 6 and 7: => 1011, this has an Odd, so Fail. the syndrome is (1) ACDY : 0111 Parity 3 tests parity on digits 4, 5, 6 and 7: => 0000, this has an Odd, so Fail. the syndrome is (1) BCDZ : 0111 Writing 0 for a pass and 1 for a fail, the syndrome is (110). This is the binary for 110 is 6, indicating that digit number 6 is in error = 6 so the denary for 110 is 6 The number 6 is the location of error for , it will be 0 like Last Step: The corrected codeword is therefore The decoded data is extracted from the corrected codeword (digits 3, 5, 6 and 7): 0011 Q57: Two machines A and B are using a (7, 4) Hamming code to detect errors during transmission. The codeword is received by B. State whether there have been any errors, and give the decoded output. (Assume that the probability of there being more than one error in a received codeword is negligible.) X Y A Z B C D The three parity checks are as follows: Parity 1 tests parity on digits 1, 3, 5 and 7: => This has an Even number of ones (two), so passes, the syndrome is (0) Prepared by: Dr. Saatchi, Seyed Mohsen 18

19 ABDX : 1100 Parity 2 tests parity on digits 2, 3, 6 and 7: => 0110 This has an Even number of ones (two), so passes. the syndrome is (0) ACDY : 1100 Parity 3 tests parity on digits 4, 5, 6 and 7: => 0110 This has an Even number of ones (none), so passes. the syndrome is (0) BCDZ : 1100 All three parity checks pass, so the syndrome is 000, and there are no errors. The decoded data is just extracted from the codeword (digits 3, 5, 6 and 7): => Q59: Verify if the following (7, 4) hamming codeword is correct or not, and find the message if the message is ABCD, the hamming codeword is XYAZBCD with X Y A Z B C D Parity 1 tests parity on digits 1, 3, 5 and 7: => 1001, this has an Even number of ones (two), so passes, the syndrome is (0) ABDX : 0011 Parity 2 tests parity on digits 2, 3, 6 and 7: => 1001, this has an Even number of ones (two), so passes, the syndrome is (0) ACDY : 0011 Parity 3 tests parity on digits 4, 5, 6 and 7: => 1001, this has an Even number of ones (two), so passes, the syndrome is (0) BCDZ : 0011 o ABDX : 0011 => syndrome 0 o ACDY : 0011 => syndrome 0 Prepared by: Dr. Saatchi, Seyed Mohsen 19

20 o BCDZ : 0011 => syndrome 0 Last Step: The corrected codeword is therefore The decoded data is extracted from the corrected codeword (digits 3, 5, 6 and 7): 0001 Q60: If the following codes are received(they have been encoded using the sevendigit Hamming code )), state whether there have been any errors(using the table2 below), and give the decoded output. (Assume that the probability of there being more than one error in a received codeword is negligible.) (i) (ii) (i) if the message is ABCD, the hamming codeword is XYAZBCD with X Y A Z B C D o ABDX : 0011 => syndrome 0 o ACDY : 0011 => syndrome 0 o BCDZ : 0011 => syndrome 0 Last Step: The corrected codeword is therefore , the decoded data is extracted from the corrected codeword (digits 3, 5, 6 and 7): 1000 Prepared by: Dr. Saatchi, Seyed Mohsen 20

21 (ii) if the message is ABCD, the hamming codeword is XYAZBCD with X Y A Z B C D o ABDX : 0001 => syndrome 1 o ACDY : 0100 => syndrome 1 o BCDZ : 0100 => syndrome 1 Last Step: Writing 0 for a pass and 1 for a fail, the syndrome is (111). This is the binary for 110 is 6, indicating that digit number 6 is in error = 7 so the denary for 111 is The number 7 is the location of error for => , All three parity checks pass, so the syndrome is 000, and there are no errors. The decoded data is just extracted from the codeword (digits 3, 5, 6 and 7): => i) Scanning through the code words in Table 1, the received codeword is found to be a valid codeword corresponding to the original data word ii) Scanning through the code words in Table 1 we can t find any match,calculating the hamming distance strating for the first row, we Prepared by: Dr. Saatchi, Seyed Mohsen 21

22 found that the fourt row Has a hamming distance equal to one, so the original massage has to be Q61: Calculate the (7,4) hamming code corresponding to the following message : Explain your answer. if the message is ABCD, the hamming codeword is XYAZBCD with X Y A Z B C D?? 1? A B C D o ABDX : 111X => X= 1 o ACDY : 101Y => Y= 0 o BCDZ : 101Z => Z= 0 So, to find the codword for XYAZBCD =>?? 1? X=1, Y= 0, Z = 0, A = 1, B = 1, C = 0, D =1 So, the codeword is Q62: What should be the minimum hamming distance for a code to be able to correct 7 erroneous bits? n for odd = (n-1)/2 n for even = (n/2) 1 If n is odd => (n 1) / 2 = 7, => 2x7+1 => n = 15 If n is even => (n/2) 1, =>n+1x2, => (7+1)x2 = 16 The minimum distance is 15 Q63: A technique which can be employed to allow error-correcting codes to protect against bursts is interleaving. True Q64: The interleaving takes place after the coding at the transmitter, and the deinterleaving takes place before the decoding at the receiver. Prepared by: Dr. Saatchi, Seyed Mohsen 22

23 That is, the sequence is: coding interleaving channel de-interleaving decoding If we now have a burst of four errors on the channel, so that four consecutive bits in the data arriving at the receiver are errored, the de-interleaving has the effect of spreading out the errors so that each of the four codewords contains only a single error, which can be corrected. True Q65: Low density parity check (LDPC) codes are block codes based on parity checks. True Q66: Calculate the check digit, and so derive the full EAN-13 code, for the following: The first Step: we found has 12 digits, so we have to find the last 13 digits: Adding together the odd digits: = 30 The second Step: Adding together the even digits: = 25 The third Step: And multiplying by 3 gives = 25 x 3 = 75. The fourth Step: Adding these two together gives = 105. The sixth Step: Taking this result modulo-10 amounts to taking the units digit, which is 5. Finally, the check digit is 10-5 = 5. So, The EAN-13 code is therefore Q67: Explain if the following EAN-13 code ( ) is correct or not. You should detail the different steps. First step: the no has 13 digits, so we have to check if there is an error on last digit 4: Adding together the odd digits: = 26 Note: don t sum number (4), because it position is 13 Prepared by: Dr. Saatchi, Seyed Mohsen 23

24 Second step: Adding together the even digits: = 20 Third step: Multiply 20 by 3 => 3X 20 = 60 Fourth step: Adding Adding these two together gives 86. Fifth step: Taking this result modulo-10 amounts to taking the units digit, which is finally, the check digit is 10-6 = 4. While the received one is 4, so there is no error on the code. Because EAN-13 code ( ) last number is equal 4. Q68: barcode machine is reading the following full EAN-13 code and is about to check it for eventual error. You are asked to do the check manually for an eventual error: The first step: We have threen digits, so we have to check if the last number has an error or not: Adding together the odd digits: = 26 The second step: Adding together the even digits: = 20 The third step: Multiply 20 X 3 = 60 The fourth step: Adding = 86 Adding these two together gives 86. Taking this result modulo-10 amounts to taking the units digit, which is 6. Finally, the check digit is 10-6 = 4. While the received one is 7, so there is an error on the code., because of Ean-13 code last number not matching the number 4. Q69: What Calculate the check digit, and so derive the full EAN-13 code, for the following: We have 12 digits and we have to find the last threen digits: The first step: Adding together the odd digits: = 29 The second step: Adding together the even digits: = 24 Prepared by: Dr. Saatchi, Seyed Mohsen 24

25 The third step: Multiply the result of the second step x 3 24x3 = 72 The fourth step: Adding = 101 The fifth step: Taking this result modulo-10 amounts to taking the units digit, which is 1. Finally, the check digit is 10-1 = 9. The EAN-13 code is therefore Q70: The following information is found in a memory chip data sheet indicating the memory organization : bits x 128 pages x 4096 blocks x 2 planes. taking into consideration that the organization is presented from the smallest unit size (bit) to the largest unit size (plane). Calculate the following A. The size of a memory in KiloBytes Size of memory in KB = / (1024 x 8) = 4Kbytes B. The size of a memory page in MigaBytes Size of memory page in MB = 4K x 128 / (1024) = 0.5 Mbytes C. The size of a memory block in GigaBytes Size of memory block in GB = 0.5 x 4096 x 2 / (1024) = 4 Gbytes Q71: Consider the following Convolutional encoder. What it the codeword corresponding to the message 110? detail your answer by drawing the states of the encoder (values stored in the registers, input bit, inputs of the XOR gates and output bits). Assume that the registers M1 and M2 are initialized to zeros at the beginning. and that the input bits are fed to the convolutional encoder starting with the most significant bit (1 then 1 then 0). Prepared by: Dr. Saatchi, Seyed Mohsen 25

26 Q72: The following questions (a and b) are independent a. Consider the following convolutional encoder. The two registers are initialized to zeros at the beginning. The + operations correspond to simple XOR operations. a. What is the code rate of this encoder? Justify your answer => One input bit corresponds to two output bits => the code rate is ½ b. What will be the output of the following sequence: (101)? Start with the most significant bit. Detail your answer; draw the different states of the encoder for each input bit. Prepared by: Dr. Saatchi, Seyed Mohsen 26

27 Q73: Consider the following encoder (Figure 1) of a convolutional code. Each input bit is encoded into two bits transmitted to the channel. The D rectangles are buffers and the circles correspond to XOR operations. Assume that the buffers of the encoder are initialized to zeros, what will be the output sequence corresponding to a (1010) input sequence. You should draw each step of the encoder (Fill the white rectangles in the four figures below). Note: Start encoding the most significant bit. The first step: Prepared by: Dr. Saatchi, Seyed Mohsen 27

28 The second step: The Third step: Prepared by: Dr. Saatchi, Seyed Mohsen 28

29 The fourth step: So, Thus the output of the encoder is : Good Luck, Prepared by: Dr. Saatchi, Seyed Mohsen 29

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

ELG3175 Introduction to Communication Systems. Introduction to Error Control Coding

ELG3175 Introduction to Communication Systems. Introduction to Error Control Coding ELG375 Introduction to Communication Systems Introduction to Error Control Coding Types of Error Control Codes Block Codes Linear Hamming, LDPC Non-Linear Cyclic BCH, RS Convolutional Codes Turbo Codes

More information

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

CSE 123: Computer Networks

CSE 123: Computer Networks Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:

More information

FAULT TOLERANT SYSTEMS

FAULT TOLERANT SYSTEMS FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded

More information

UCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, June 8, Solutions to Practice Final Examination (Spring 2016)

UCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, June 8, Solutions to Practice Final Examination (Spring 2016) UCSD ECE54C Handout #2 Prof. Young-Han Kim Thursday, June 8, 27 Solutions to Practice Final Examination (Spring 26) There are 4 problems, each problem with multiple parts, each part worth points. Your

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

CSEP 561 Error detection & correction. David Wetherall

CSEP 561 Error detection & correction. David Wetherall CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled

More information

Data Link Control Layer, Error Detection, Error Correction, and Framing

Data Link Control Layer, Error Detection, Error Correction, and Framing Data Link Control Layer, Error Detection, Error Correction, and Framing EEE 538, WEEK 2 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Error Detection Techniques Used

More information

Link Layer: Error detection and correction

Link Layer: Error detection and correction Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability

More information

CS321: Computer Networks Error Detection and Correction

CS321: Computer Networks Error Detection and Correction CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must

More information

UNIT-II 1. Discuss the issues in the data link layer. Answer:

UNIT-II 1. Discuss the issues in the data link layer. Answer: UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy

More information

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Additional Interesting Codes m-out-of-n codes - each binary code word has m ones in a length n non-systematic codeword - used for unidirectional errors

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The

More information

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd.

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd. Parity Even parity: Odd parity: Add a bit to make the number of ones (1s) transmitted even. Add a bit to make the number of ones (1s) transmitted odd. Example and ASCII A is coded 100 0001 Parity ASCII

More information

Lecture / The Data Link Layer: Framing and Error Detection

Lecture / The Data Link Layer: Framing and Error Detection Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start

More information

COMPUTER NETWORKS UNIT-3

COMPUTER NETWORKS UNIT-3 COMPUTER NETWORKS UNIT-3 Syllabus: The Data Link Layer - Data Link Layer Design Issues, Services Provided to the Network Layer Framing Error Control Flow Control, Error Detection and Correction Error-Correcting

More information

Communication Fundamentals in Computer Networks

Communication Fundamentals in Computer Networks Lecture 7 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07

More information

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst EITF25 Internet Techniques and Applications L3: Data Link layer Stefan Höst Communication on physical layer To transmit on the physical medium use signals At each computer it can be seen as transmitting

More information

Forward Error Correction Using Reed-Solomon Codes

Forward Error Correction Using Reed-Solomon Codes Exercise 5 Forward Error Correction Using Reed-Solomon Codes EXERCISE OBJECTIVE When you have completed this exercise, you will be familiar with the concept of forward error correction (FEC). You will

More information

Channel Decoding in Wireless Communication Systems using Deep Learning

Channel Decoding in Wireless Communication Systems using Deep Learning Channel Decoding in Wireless Communication Systems using Deep Learning Gaurang Naik 12/11/2017 Deep Learning Course Project Acknowledgements: Navneet Agrawal, TU Berlin Error Control Coding Wireless Communication

More information

The Data Link Layer. CS158a Chris Pollett Feb 26, 2007.

The Data Link Layer. CS158a Chris Pollett Feb 26, 2007. The Data Link Layer CS158a Chris Pollett Feb 26, 2007. Outline Finish up Overview of Data Link Layer Error Detecting and Correcting Codes Finish up Overview of Data Link Layer Last day we were explaining

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Homework 1 Solutions Total points = 44 Problems 1. Modified HDLC Framing [6 points] Assume we are following the protocol described in the textbook except our modified HDLC frames

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes

More information

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check. Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced

More information

Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction

Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction Vishal Badole 1, Amit Udawat 2 Department of Electronics and Communication Engg. 1, Acropolis

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

Comparative Performance Analysis of Block and Convolution Codes

Comparative Performance Analysis of Block and Convolution Codes Comparative Performance Analysis of Block and Convolution Codes Manika Pandey M.Tech scholar, ECE DIT University Dehradun Vimal Kant Pandey Assistant Professor/ECE DIT University Dehradun ABSTRACT Error

More information

Data Link Layer (1) Networked Systems 3 Lecture 6

Data Link Layer (1) Networked Systems 3 Lecture 6 Data Link Layer (1) Networked Systems 3 Lecture 6 Purpose of Data Link Layer Arbitrate access to the physical layer Structure and frame the raw bits Provide flow control Detect and correct bit errors Perform

More information

Where we are in the Course

Where we are in the Course Link Layer Where we are in the Course Moving on up to the Link Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Scope of the Link Layer Concerns how to transfer messages

More information

Data Link Layer. Srinidhi Varadarajan

Data Link Layer. Srinidhi Varadarajan Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images Prof Bill Buchanan

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images  Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding Data, Audio, Video and Images http://asecuritysite.com/comms Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding: Modulo-2 Data, Audio, Video and Images

More information

PART III. Data Link Layer MGH T MGH C I 204

PART III. Data Link Layer MGH T MGH C I 204 PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control

More information

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two 26 February 2014

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two 26 February 2014 Instructions: This is a closed book, closed note exam. Calculators are not permitted. If you have a question, raise your hand and I will come to you. Please work the exam in pencil and do not separate

More information

CHANNEL CODING 1. Introduction

CHANNEL CODING 1. Introduction CHANNEL CODING 1. Introduction The fundamental resources at the disposal of a communications engineer are signal power, time and bandwidth. For a given communications environment, these three resources

More information

Viterbi Algorithm for error detection and correction

Viterbi Algorithm for error detection and correction IOSR Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: 2278-2834-, ISBN: 2278-8735, PP: 60-65 www.iosrjournals.org Viterbi Algorithm for error detection and correction Varsha P. Patil

More information

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two Solutions 26 February 2014

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two Solutions 26 February 2014 Problem 1 (4 parts, 21 points) Encoders and Pass Gates Part A (8 points) Suppose the circuit below has the following input priority: I 1 > I 3 > I 0 > I 2. Complete the truth table by filling in the input

More information

(Refer Slide Time: 2:20)

(Refer Slide Time: 2:20) Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-15 Error Detection and Correction Hello viewers welcome to today s lecture

More information

Communication Systems, 5e Chapter 13: Channel Coding

Communication Systems, 5e Chapter 13: Channel Coding Communication Systems, 5e Chapter 13: Channel Coding A. Bruce Carlson Paul B. Crilly Pop Quiz 1) The sampling rate for CD audio is. a) 22.0 khz b) 44.1 khz 2) CD audio format does not allow for any form

More information

Design and Implementation of Low Density Parity Check Codes

Design and Implementation of Low Density Parity Check Codes IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V2 PP 21-25 www.iosrjen.org Design and Implementation of Low Density Parity Check Codes

More information

Pending Issues. Opera,ng Systems and Networks. Network Lecture 3: Link Layer (1) Where we are in the Course. Scope of the Link Layer

Pending Issues. Opera,ng Systems and Networks. Network Lecture 3: Link Layer (1) Where we are in the Course. Scope of the Link Layer Opera,ng Systems and Networks Network Lecture 3: Link Layer (1) Adrian Perrig Network Security Group ETH Zürich Pending Issues Earlier pos,ng of lecture slides Answering student ques,ons Project 1 is out

More information

Convolutional Codes. COS 463: Wireless Networks Lecture 9 Kyle Jamieson. [Parts adapted from H. Balakrishnan]

Convolutional Codes. COS 463: Wireless Networks Lecture 9 Kyle Jamieson. [Parts adapted from H. Balakrishnan] Convolutional Codes COS 463: Wireless Networks Lecture 9 Kyle Jamieson [Parts adapted from H. Balakrishnan] Today 1. Encoding data using convolutional codes Encoder state Changing code rate: Puncturing

More information

Chapter 9: Data Transmission

Chapter 9: Data Transmission Chapter 9: Data Transmission MULTIPLE CHOICE 1. In practical terms, parallel data transmission is sent: a. over short distances only c. over any distance b. usually over long distances d. usually over

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

Forward Error Correction Codes

Forward Error Correction Codes Appendix 6 Wireless Access Networks: Fixed Wireless Access and WLL Networks Ð Design and Operation. Martin P. Clark Copyright & 000 John Wiley & Sons Ltd Print ISBN 0-471-4998-1 Online ISBN 0-470-84151-6

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Last time How protocols are organized & why Network layer Data-link

More information

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into

More information

CS Computer Architecture

CS Computer Architecture CS 35101 Computer Architecture Section 600 Dr. Angela Guercio Fall 2010 Computer Systems Organization The CPU (Central Processing Unit) is the brain of the computer. Fetches instructions from main memory.

More information

Error Correction and Detection using Cyclic Redundancy Check

Error Correction and Detection using Cyclic Redundancy Check Error Correction and Detection using Cyclic Redundancy Check Dr. T. Logeswari Associate Professor, Dept of Computer Science, New Horizon College, Banglore, Karnataka, India ABSTRACT: In this paper Cyclic

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due Thursday!

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due Thursday! CSE 123: Computer Networks Alex C. Snoeren HW 1 due Thursday! Error handling through redundancy Adding extra bits to the frame Hamming Distance When we can detect When we can correct Checksum Cyclic Remainder

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Chapter 6 Digital Data Communications Techniques

Chapter 6 Digital Data Communications Techniques Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit

More information

Due dates are as mentioned above. Checkoff interviews for PS2 and PS3 will be held together and will happen between October 4 and 8.

Due dates are as mentioned above. Checkoff interviews for PS2 and PS3 will be held together and will happen between October 4 and 8. Problem Set 3 Your answers will be graded by actual human beings (at least that ' s what we believe!), so don' t limit your answers to machine-gradable responses. Some of the questions specifically ask

More information

1. Which of the following Boolean operations produces the output 1 for the fewest number of input patterns?

1. Which of the following Boolean operations produces the output 1 for the fewest number of input patterns? This is full of Test bank for Computer Science An Overview 12th Edition by Brookshear SM https://getbooksolutions.com/download/computer-science-an-overview-12th-editionby-brookshear-sm Test Bank Chapter

More information

ECE 333: Introduction to Communication Networks Fall Lecture 6: Data Link Layer II

ECE 333: Introduction to Communication Networks Fall Lecture 6: Data Link Layer II ECE 333: Introduction to Communication Networks Fall 00 Lecture 6: Data Link Layer II Error Correction/Detection 1 Notes In Lectures 3 and 4, we studied various impairments that can occur at the physical

More information

Advanced Modulation and Coding Challenges

Advanced Modulation and Coding Challenges WHITE PAPER Accelerating from 100GE to 400GE in the Data Center Advanced Modulation and Coding Challenges Ever increasing demands for a connected world with instant data access continues to drive data

More information

5 Binary Coding In Noisy Channels

5 Binary Coding In Noisy Channels 5 Binary Coding In Noisy Channels 5. Introduction We have seen previously that in a communication system we may be concerned either with the speed of transmission of information, or with the accuracy of

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1, CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet

More information

Advanced Computer Architecture

Advanced Computer Architecture 18-742 Advanced Computer Architecture Test 2 April 14, 1998 Name (please print): Instructions: DO NOT OPEN TEST UNTIL TOLD TO START YOU HAVE UNTIL 12:20 PM TO COMPLETE THIS TEST The exam is composed of

More information

ECE 2030D Computer Engineering Spring problems, 5 pages Exam Two 8 March 2012

ECE 2030D Computer Engineering Spring problems, 5 pages Exam Two 8 March 2012 Instructions: This is a closed book, closed note exam. Calculators are not permitted. If you have a question, raise your hand and I will come to you. Please work the exam in pencil and do not separate

More information

Lecture 5: Data Link Layer Basics

Lecture 5: Data Link Layer Basics Lecture 5: Data Link Layer Basics Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Layer 2 PDU: Frame 2 1 Bit-oriented vs. Byte-oriented Layer 2 protocols

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data

More information

FLASH RELIABILITY, BEYOND DATA MANAGEMENT AND ECC. Hooman Parizi, PHD Proton Digital Systems Aug 15, 2013

FLASH RELIABILITY, BEYOND DATA MANAGEMENT AND ECC. Hooman Parizi, PHD Proton Digital Systems Aug 15, 2013 FLASH RELIABILITY, BEYOND DATA MANAGEMENT AND ECC Hooman Parizi, PHD Proton Digital Systems Aug 15, 2013 AGENDA Section 1: Flash Reliability Section 2: Components to Improve Flash Reliability Section 3:

More information

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS Jyoti Sharma Department of ECE Sri Sai College of Engg. & Technology, Badhani, Punjab, India Priya Department of ECE Sri Sai

More information

Some portions courtesy Robin Kravets and Steve Lumetta

Some portions courtesy Robin Kravets and Steve Lumetta CSE 123 Computer Networks Fall 2009 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Administrative updates I m Im out all next week no lectures, but You

More information

Hamming Codes. s 0 s 1 s 2 Error bit No error has occurred c c d3 [E1] c0. Topics in Computer Mathematics

Hamming Codes. s 0 s 1 s 2 Error bit No error has occurred c c d3 [E1] c0. Topics in Computer Mathematics Hamming Codes Hamming codes belong to the class of codes known as Linear Block Codes. We will discuss the generation of single error correction Hamming codes and give several mathematical descriptions

More information

Midterm Exam 2B Answer key

Midterm Exam 2B Answer key Midterm Exam 2B Answer key 15110 Principles of Computing Fall 2015 April 6, 2015 Name: Andrew ID: Lab section: Instructions Answer each question neatly in the space provided. There are 6 questions totaling

More information

Lecture 2 Error Detection & Correction. Types of Errors Detection Correction

Lecture 2 Error Detection & Correction. Types of Errors Detection Correction Lecture 2 Error Detection & Correction Types of Errors Detection Correction Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

Review of Number Systems

Review of Number Systems Review of Number Systems The study of number systems is important from the viewpoint of understanding how data are represented before they can be processed by any digital system including a digital computer.

More information

1.6 Error Control Strategies

1.6 Error Control Strategies 1.6 Error Control Strategies 1.6.1 Introduction ARQ Data Source Encoder Binary Channel Decoder Data Sink {u} {v} {v'} {u'} encoder, decoder, error control; error control strategies: (simple) error detection;

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

Errors. Chapter Extension of System Model

Errors. Chapter Extension of System Model Chapter 4 Errors In Chapter 2 we saw examples of how symbols could be represented by arrays of bits. In Chapter 3 we looked at some techniques of compressing the bit representations of such symbols, or

More information

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. TYPES OF ERRORS There are two types of errors, 1. Single Bit Error The term single-bit error

More information

Design of Convolution Encoder and Reconfigurable Viterbi Decoder

Design of Convolution Encoder and Reconfigurable Viterbi Decoder RESEARCH INVENTY: International Journal of Engineering and Science ISSN: 2278-4721, Vol. 1, Issue 3 (Sept 2012), PP 15-21 www.researchinventy.com Design of Convolution Encoder and Reconfigurable Viterbi

More information

Basic Communication Concepts

Basic Communication Concepts Chapter 3 Basic Communication Concepts 3.1 Introduction This chapter introduces some of the basic concepts of signals and information communication. The following section, 3.2, looks at some of the ways

More information

C LDPC Coding Proposal for LBC. This contribution provides an LDPC coding proposal for LBC

C LDPC Coding Proposal for LBC. This contribution provides an LDPC coding proposal for LBC C3-27315-3 Title: Abstract: Source: Contact: LDPC Coding Proposal for LBC This contribution provides an LDPC coding proposal for LBC Alcatel-Lucent, Huawei, LG Electronics, QUALCOMM Incorporated, RITT,

More information

Design Single and Multiple Errors Correction Block Codes

Design Single and Multiple Errors Correction Block Codes Design Single and Multiple Errors Correction Block Codes Zahraa Raad Mayoof Hajiyat Faculty of Engineering Technology & Built Environment, Department of Electrical and Electronic Engineering, B.Eng (Hons)

More information

Digital Fundamentals

Digital Fundamentals Digital Fundamentals Tenth Edition Floyd Chapter 2 2009 Pearson Education, Upper 2008 Pearson Saddle River, Education NJ 07458. All Rights Reserved Decimal Numbers The position of each digit in a weighted

More information

Inst: Chris Davison

Inst: Chris Davison ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

CS/ECE 552: Introduction to Computer Architecture

CS/ECE 552: Introduction to Computer Architecture CS/ECE 552: Introduction to Computer Architecture Prof. David A. Wood Final Exam May 9, 2010 10:05am-12:05pm, 2241 Chamberlin Approximate Weight: 25% CLOSED BOOK TWO SHEETS OF NOTES NAME: DO NOT OPEN THE

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online 1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.

More information

IMPLEMENTATION OF A BIT ERROR RATE TESTER OF A WIRELESS COMMUNICATION SYSTEM ON AN FPGA

IMPLEMENTATION OF A BIT ERROR RATE TESTER OF A WIRELESS COMMUNICATION SYSTEM ON AN FPGA IMPLEMENTATION OF A BIT ERROR RATE TESTER OF A WIRELESS COMMUNICATION SYSTEM ON AN FPGA Lakshmy Sukumaran 1, Dharani K G 2 1 Student, Electronics and communication, MVJ College of Engineering, Bangalore-560067

More information

Module Contact: Dr. Ben Milner Copyright of the University of East Anglia Version 2

Module Contact: Dr. Ben Milner Copyright of the University of East Anglia Version 2 UNIVERSITY OF EAST ANGLIA School of Computing Sciences Main Series Examination 2013-14 COMPUTER NETWORKS CMPSMD22 Time allowed: 3 hours Answer Question 1 and THREE questions from questions 2 to 6. Notes

More information

CHAPTER 7. Copyright Cengage Learning. All rights reserved.

CHAPTER 7. Copyright Cengage Learning. All rights reserved. CHAPTER 7 FUNCTIONS Copyright Cengage Learning. All rights reserved. SECTION 7.1 Functions Defined on General Sets Copyright Cengage Learning. All rights reserved. Functions Defined on General Sets We

More information

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat

More information

Chip Design for Turbo Encoder Module for In-Vehicle System

Chip Design for Turbo Encoder Module for In-Vehicle System Chip Design for Turbo Encoder Module for In-Vehicle System Majeed Nader Email: majeed@wayneedu Yunrui Li Email: yunruili@wayneedu John Liu Email: johnliu@wayneedu Abstract This paper studies design and

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2

15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2 15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2 Name Section Directions: Answer each question neatly in the space provided. Please read each question carefully. You have 50 minutes for this exam. No electronic

More information

S Capacity enhancement methods for radio interface ARQ Schemes

S Capacity enhancement methods for radio interface ARQ Schemes ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control

More information

A Hybrid ARQ Scheme for Resilient Packet Header Compression

A Hybrid ARQ Scheme for Resilient Packet Header Compression A Hybrid ARQ Scheme for Resilient Packet Compression Vijay A Suryavanshi and Aria Nosratinia Multimedia Communications Laboratory, The University of Texas at Dallas Richardson, TX 7083-0688, USA E-mail:

More information