Forward Error Correction Using Reed-Solomon Codes

Size: px
Start display at page:

Download "Forward Error Correction Using Reed-Solomon Codes"

Transcription

1 Exercise 5 Forward Error Correction Using Reed-Solomon Codes EXERCISE OBJECTIVE When you have completed this exercise, you will be familiar with the concept of forward error correction (FEC). You will also be able to demonstrate how FEC can be achieved using Reed-Solomon codes. DISCUSSION OUTLINE The Discussion of this Exercise covers the following points: Introduction to Error Control Error Detection Error Correction Forward Error Correction FEC using Reed-Solomon Codes Reed-Solomon Error Correction in ADSL Applications Total Data Rate versus Aggregate Data Rate DISCUSSION Introduction to Error Control When data is transmitted, there may be errors in the data recovered at the receiver because noise, interference, and other perturbations present in the transmission medium impair the transmitted signal. These errors would render any data transmission system useless unless some error control is performed to manage the errors. The error control schemes used in most data transmission systems generally include the following two functions: error detection and error correction. Whatever means is used to implement error control, it always involves adding extra information to the data to be transmitted, thereby decreasing the net data rate of a transmission system. In other words, error control improves the reliability of a data transmission system at the expense of the net data rate achieved with this system. Error Detection The purpose of error detection is to automatically detect errors happening during data transmission. Error detection is usually performed by systematically checking the data recovered in the receiver at regular intervals to detect whether or not transmission errors occurred during the corresponding intervals. Festo Didactic

2 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Discussion Two types of parity can be used: even parity or odd parity. With even parity, the parity bit is set to 1 when the number of bits in a block is odd (to make the total number of ones in this block an even number). Conversely, with odd parity, the parity bit is set to 1 when the number of bits in a block is even (to make the total number of ones in this block an odd number). Several methods can be used to check the integrity of the data recovered at the receiver. One of the simplest ways to implement error detection is to use parity bits. In brief, the data to be transmitted is separated into blocks of bits, the number of ones (1) in each block is counted, and a parity bit is added to each data block to indicate whether the number of bits in the block is odd or even. At the receiver, the number of ones in each data block received is counted to determine the parity bit. When the parity bit determined by the receiver differs from the parity bit included in the data block, this reveals that there is one or several bits in error in the received data block, and that some action has to be taken to manage the situation. Note that using parity bits to implement error detection has one major weakness no error is detected when an even number of bits in a data block have errors. This is because the parity bit has the same value even if there is no error or an even number of errors in a data block. In ADSL, CRC codes are used to implement error detection. Using CRC codes is more complex than using parity bits, but ensures highly reliable error detection. In brief, the ATU transmitter calculates a CRC code using the data transmitted during a superframe. Similarly, the ATU receiver calculates the CRC code using the data received during this superframe. Then, at the beginning of the next superframe, the ATU transmitter includes the CRC code it calculated with the data transmitted during the previous superframe. At the other end of the transmission path, the ATU receiver recovers the CRC code transmitted by the ATU transmitter and compares its value with the value of the CRC code it has calculated with the data received during the previous superframe. When both CRC values differ, this reveals that one or several errors occurred during the transmission of this superframe. The previous exercise of this manual covers error detection using CRC codes in detail. Error Correction Error detection reveals when errors occur during a data transmission. However, it does not allow these errors to be corrected unless an error correction function is added to the error control scheme. One simple way of providing an error control scheme with error correction is to use an Automatic Repeat Request (ARQ) function in conjunction with an error detection function. In brief, the transmitter separates the data to be transmitted into blocks (e.g., superframes) and adds error detection information to each block before transmission. At the other end of the transmission path, the receiver uses the error detection information included in each data block received to determine whether or not transmission errors occurred in a block. If so, the receiver requests (via a return communication channel) the transmitter to resend the corrupted data block until it is received without any error. In ADSL, error detection with CRC codes is used but no ARQ function is implemented to ask retransmission of a data block when errors are detected. In place, ADSL uses FEC to ensure reliable data transmission. Error correction using the error detection and ARQ functions together is efficient as long as data blocks are received with errors only occasionally. When noise and interference increase in the data transmission path, more and more data blocks are received with errors. This increases the number of requests to resend a data block, thereby rapidly decreasing the effective data transmission rate. At a certain point, the effective data transmission rate becomes so low that this means of implementing error correction is ineffective. In this case, one must resort to other techniques, such as forward error correction (FEC) and data interleaving (this technique is covered in the next exercise of this manual), to ensure reliable data transmission. 108 Festo Didactic

3 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Discussion Forward Error Correction Forward error correction (FEC), also referred to as forward-acting error correction, is an advanced type of error correction function that does not require retransmission of corrupted data blocks. In brief, FEC adds extra information to the data to be transmitted. This extra information provides a certain level of data redundancy that allows errors in the data recovered at the receiver to be automatically detected and corrected (within certain limits). FEC is separated into two main categories: block-coding FEC and convolutional-coding FEC. The codewords resulting from block-coding FEC are said to be systematic because they contain the original data to be transmitted, without any modification. The coded data that results from convolutional-coding FEC can be either systematic or non-systematic. This depends on whether or not the original data to be transmitted is integrally included in the coded data. Block-coding FEC separates the data to be transmitted into blocks and adds extra information (data redundancy) to each block to form codewords, which are often simply referred to as codes. At the receiver, the extra information included in each codeword received is used to automatically detect and correct transmission errors that may affect the data contained in this codeword. Reed- Solomon codes are widely used to implement block-coding FEC, notably in ADSL applications. FEC using Reed-Solomon codes, as used in ADSL applications, is discussed later in this discussion. Convolutional-coding FEC applies a convolutional encoding algorithm, working at the bit level, to the data to be transmitted. In brief, the convolutional coding converts the data to be transmitted into coded data that includes extra information (data redundancy) for error detection and correction purposes. The coded data transmitted is thus longer than the original data to be transmitted because of the extra information added. At the receiver, a decoding algorithm, also working at the bit level, recovers the original data and automatically detects and corrects errors that may have occurred during transmission. Convolutionalcoding FEC can be used together with block-coding FEC in ADSL applications to obtain a powerful error control scheme. Convolutional-coding FEC, as used in ADSL applications, is discussed later in this manual. FEC using Reed-Solomon Codes The use of Reed-Solomon codes to implement FEC is commonly called Reed- Solomon error correction. Reed-Solomon codes can be used to encode data blocks in such a way that if certain elements (e.g. bytes) in a block are received with errors after transmission through a communication channel, it is possible to correct the errors directly in the receiver without having to request the transmitter to resend the corrupted data block. As long as a sufficient number of elements in a block are received without errors, the data redundancy provided by the Reed-Solomon codes ensures complete corrections of all errors in this block. The number N of elements in a block of Reed-Solomon encoded data depends on the number m of bits in each element of the block, and is calculated using the following equation: N = 2 m 1 Festo Didactic

4 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Discussion Reed-Solomon codes are commonly denoted as a function of N and K. For instance a (255, 223) Reed- Solomon code is one that works on data blocks of 255 elements, 223 of these elements being original data and the remaining 32 elements being redundant check elements. The higher the number R of redundant check elements, the greater the errorcorrection capability of a Reed-Solomon code, and thus, the reliability of a data transmission system. Therefore, when 8-bit elements (bytes) are used, each Reed-Solomon encoded data block contains 255 elements. This value of N is very common in digital communications system due to the prevalence of byte-oriented computer systems. The N elements in a Reed-Solomon encoded data block are divided into K elements that are the original data itself, plus R redundant check elements that result from the Reed-Solomon code computation (i.e., the Reed-Solomon encoding). This translates into the following equation: N = K + R The redundant check elements included in each Reed-Solomon encoded data block contains the extra information required to automatically detect and correct errors in this block at reception. The properties of Reed-Solomon codes are such that the maximum number of erroneous elements in a data block that can be corrected is equal to half the number R of redundant check elements. For instance, when R equals 8, up to 4 erroneous elements can be corrected, regardless of the number of bits in error within these elements. This particular feature of Reed-Solomon codes makes them especially efficient in correcting errors that occur in bursts. Burst errors occurring during data transmissions generally cause several consecutive bits to be in error. This does not matter to Reed-Solomon error correction because any erroneous element counts as a single error no matter what the number of bits in error in this element. Figure 65 illustrates Reed-Solomon error correction in the context of a byteoriented data transmission system. At the transmitter, blocks of data to be transmitted that contain K bytes each are input to the Reed-Solomon encoder. The encoder computes R redundant check bytes for each block of data to be transmitted, and appends these check bytes to the original data to be transmitted to form a Reed-Solomon encoded data block of N bytes. At the receiver, the Reed-Solomon decoder uses the R redundant check bytes in each Reed- Solomon encoded data block to detect and correct any error that occurred during transmission. The decoder then discards the R redundant check bytes leaving only the recovered data blocks free of errors. Figure 65. Reed-Solomon error correction. 110 Festo Didactic

5 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Discussion Reed-Solomon Error Correction in ADSL Applications Note that Reed-Solomon error correction is performed on a data frame basis as long as data interleaving is not used. Data interleaving is discussed later in this manual. Reed-Solomon error correction is used in ADSL applications to improve the reliability of data transmission. Since ADSL is a byte-oriented data transmission system, each byte in a data frame becomes an element of the Reed-Solomon encoded data blocks. In ADSL applications, Reed-Solomon error correction is performed on a data frame basis, i.e., once every data frame. This implies that each ADSL data frame contains a complete Reed-Solomon encoded data block. More specifically, each ADSL data frame contains K bytes of data to be transmitted and R redundant check bytes, for a total number N of bytes equal to K + R. Since the number N of bytes per ADSL data frame is strictly dependent on the total number of bits allocated to tones and that the number R of redundant check bytes is determined at the initialization of the DSL, it is the number K of data bytes per ADSL frame that is adjusted to meet the above requirement. Since ADSL is a byte-oriented data transmission system, the number m of bits per elements is 8, thereby leading to Reed-Solomon encoded data blocks that should contain a number N of bit elements (bytes). However, the number of bytes in each ADSL data frame is generally less than 255. This problem is solved within Reed-Solomon encoders and decoders by adding a certain number of data bytes containing 00h to the K bytes of data and R redundant check bytes so that N is equal to 255. This technique is often referred to as shortening because it results in shortened Reed-Solomon codes. For instance, shortened (144,128) Reed-Solomon codes are obtained when 111 bytes containing 00h are added to complete each data block. According to ITU-T Recommendation G.992.1, the number R of redundant check bytes in ADSL applications can be set to any one of the following values: 0 (no Reed-Solomon error correction), 2, 4, 6, 8, 10, 12, 14, and 16. However, due to technical constraints, R can only be set to 0 or 2 (by turning the Reed Solomon Encoder/Decoder on and off) in our ADSL application. Therefore, the Reed- Solomon error correction in our ADSL application can correct one data byte received with errors per data frame. Figure 66 shows an example of the data at the input and output (DP3 and DP4 respectively) of the Reed-Solomon Encoder of the ATU-R Transmitter in our ADSL application. In this example, the number N of bytes per data frame is 18. Sixteen bytes of data to be transmitted are input to the Reed-Solomon Encoder every ADSL data frame. The Reed-Solomon Encoder computes two redundant check bytes and adds them after the 16 bytes of data to be transmitted. This results in shortened (18, 16) Reed-Solomon codes. Festo Didactic

6 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Discussion Figure 66. Data at the input and output of the Reed-Solomon Encoder of the ATU-R Transmitter in our ADSL application. Notice from Figure 66 that Reed-Solomon encoding takes place before the data to be transmitted enters the Constellation Encoder. Conversely, in the ATU receiver, Reed-Solomon decoding is performed after the Constellation Decoder has reconstituted the data contained in the received ADSL signal, as can be observed in Figure 67. Notice that the Reed-Solomon Decoder discards the redundant check bytes once it has performed the error detection and correction. This explains why the number of bytes per data frame at the Reed-Solomon Decoder output is less (2 bytes less) than that at its input. Figure 67. Data at the input and output of the Reed-Solomon Decoder of the ATU-C Receiver in our ADSL application. The mathematics behind Reed-Solomon error correction is quite advanced and beyond the scope of this manual. However, as with CRC calculation used for error detection in ADSL applications, a polynomial is used in the computation related to Reed-Solomon error correction. The following polynomial of degree 8 should be used according to ITU-T Recommendation G.992.1: x 8 + x 4 + x 3 + x Note that the above polynomial is identical to the one stated in ITU-T Recommendation G for the error detection CRC calculation. 112 Festo Didactic

7 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Procedure Outline Total Data Rate versus Aggregate Data Rate The aggregate data rate is the data rate which results from the user data transmission and the necessary system overhead (CRC code for error detection, OAM functions, EOC channel, AOC channel, and synchronization of the bearer channels), according to ITU-T Recommendation G Similarly, the Total Data Rate results from the user data transmission, the necessary system overhead, and the transmission of the redundant data added for FEC purposes. When no FEC is used, the Total Data Rate and the Aggregate Data Rate are equal. However, when Reed-Solomon error-correction is used, the Net Data Rate is higher than the Aggregate Data Rate, the difference being dependent on the number R of redundant check bytes added every data frame. For instance, when 4 redundant check bytes are computed every data frame, the difference between the Net Data Rate and the Aggregate Data Rate is 128 kbit/s (32 bits x 4 kbaud = 128 kbit/s). This difference doubles when both the fast data buffer and the interleaved data buffer are used at the same time because redundant check bytes are calculated for each data buffer. PROCEDURE OUTLINE The Procedure is divided into the following sections: Equipment Setup and Connections Reed-Solomon Encoding of the Transmitted Data Reed-Solomon Error Correction Total Data Rate versus Aggregate Data Rate PROCEDURE Equipment Setup and Connections 1. Turn on the RTM Power Supply and the RTM and make sure the RTM power LED is lit. 2. Turn on the host computer. Make sure that the system has been installed and configured as described in the Communications Technologies Training System User Guide. 3. Start the LVCT software. In the Application Selection dialog box, choose ADSL and click OK. This begins a new session with all settings set to their default values and with all faults deactivated. The System Diagram appears showing the ATU-R Transmitter and the ATU-C Receiver. 4. Make the Default external connections shown on the System Diagram tab of the ADSL application. For details of connections to the Reconfigurable Training Module, refer to the RTM Connections tab of the software. Reed-Solomon Encoding of the Transmitted Data 5. Turn the Scrambler off by changing the Scrambler / Descrambler setting to Off in the ADSL Settings table. Festo Didactic

8 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Procedure Display the block diagram of the ATU-R Transmitter by clicking the corresponding tab in the ADSL application. Display the Bit/Tone Table of the ATU-R Transmitter. Observe that the total number of bits allocated to tones is 96. This corresponds to 12 bytes per data frame. Close the Bit/Tone Table. Use the Pan and Zoom commands to display the portion of the ATU-R Transmitter shown in Figure 68, which includes the Reed-Solomon Encoder. Figure 68. Portion of the ATU-R Transmitter block diagram showing the Reed-Solomon Encoder. 6. Select the Frame Step mode by clicking the Frame Step button ( ) in the ADSL application toolbar. Double click DP2 in the ATU-R Transmitter block diagram to open the corresponding data point window. This window displays the data bytes that are extracted from the Tx Data Table every data frame. Click the Frame Step button twice to transmit two more data frames, while observing the data displayed in the DP2 window. Notice that a string of 12 data bytes is extracted from the Tx Data Table every data frame. This corresponds to the total number of bits (96) allocated to tones. 7. Enable the Reed-Solomon error correction in the ADSL application by setting the Reed-Solomon Encoder / Decoder parameter in the ADSL Settings table to On. b The Reed-Solomon error correction can also be enabled by clicking the ON/OFF button in the Reed-Solomon Encoder of the ATU-R Transmitter or the Reed-Solomon Decoder of the ATU-C Receiver. Click the Frame Step button a few times to transmit a few more data frames, while observing the data displayed in the DP2 window. Notice that a string of 10 data bytes is extracted from the Tx Data Table every data frame. Briefly explain why less data bytes (2 data bytes less) are extracted from the Tx Data Table every data frame when Reed-Solomon error correction is enabled. 114 Festo Didactic

9 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Procedure a Recall that no data bytes are extracted from the Tx Data Table during frame 68, and that one byte in frame 0 is dedicated to the system overhead. 8. Close the DP2 window. Double click DP3 and DP4 in the ATU-R Transmitter block diagram to open the corresponding data point windows. The DP3 and DP4 windows display the data at the input and output of the Reed-Solomon Encoder, respectively. Click the Frame Step button a few times to transmit a few more data frames, while observing the data displayed in the DP3 and DP4 windows. Figure 69 shows an example of data at DP3 and DP4. Figure 69. Data at the input and output of the Reed-Solomon Encoder when the total number of bits allocated to tones is 96. Festo Didactic

10 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Procedure Describe the relationship between the data at the input and output of the Reed-Solomon Encoder. What is the type of codes used at the Reed-Solomon Encoder output? 9. Click the Polynomial button in the Reed-Solomon Encoder. This opens a window that displays the polynomial used to perform the calculations related to Reed-Solomon error correction. Is this polynomial as stated in ITU-T Recommendation G.992.1? Yes No Close all open Data Point windows. Close the window that displays the polynomial used in the Reed-Solomon Encoder and Decoder. Reed-Solomon Error Correction 10. Display the block diagram of the ATU-C Receiver by clicking the corresponding tab in the ADSL application. Use the Pan and Zoom commands to display the portion of the ATU-C Receiver shown in Figure 70, which includes the Reed-Solomon Decoder. Notice that a green LED is lit in the Reed-Solomon Decoder. This indicates that the last data frame has been received free of errors. Figure 70. Portion of the ATU-C Receiver block diagram showing the Reed-Solomon Decoder. 116 Festo Didactic

11 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Procedure 11. Double click DP8 and DP9 in the ATU-C Receiver block diagram to open the corresponding data point windows. The DP8 and DP9 windows display the data at the input and output of the Reed-Solomon Decoder, respectively. Describe the relationship between the data at the input and output of the Reed-Solomon Decoder. 12. Click the Frame Step button once to receive one more data frame, while and DP9 windows. Notice that the green LED in the Reed-Solomon Decoder remains lit to indicate that the last data frame has been received free of errors. In the ATU-C Receiver block diagram, click the switch located just before DP8 to open the path between the Deinterleaver and the Reed-Solomon Decoder. Note the values of the first two data bytes in the DP8 window, in the space below. Edit the value of the first data byte in the DP8 window so that the least significant bit is inverted, thereby causing a 1-bit error in one byte of this data frame. For example, if the value of the first byte is F2h, the value should be changed to F3h as shown in Figure 71. Click the Record button in the DP8 window to record the new value of the first data byte. Figure 71. Editing a data byte at the input of the Reed-Solomon Decoder. Click the Frame Step button once to receive the corrupted data frame, while and DP9 windows. Festo Didactic

12 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Procedure Describe what happens when the corrupted data frame is received. 13. Edit the value of the first data byte in the DP8 window so that it recovers its original value (value you noted previously in this exercise). Click the Record button in the DP8 window to record the value of the first data byte. Click the Frame Step button once to receive one more data frame, while and DP9 windows. Notice that the green LED in the Reed-Solomon Decoder lights up to indicate that the last data frame has been received free of errors. Edit the value of the first data byte in the DP8 window so that the two least significant bits are inverted, thereby causing a 2-bit error in one byte of this data frame. For example, if the value of the first byte is F2h, the value should be changed to F1h. Click the Record button in the DP8 window to record the new value of the first data byte. Click the Frame Step button once to receive the corrupted data frame, while and DP9 windows. Describe what happens when the corrupted data frame is received. 14. Edit the value of the first data byte in the DP8 window so that it recovers its original value (value you noted previously in this exercise). Click the Record button in the DP8 window to record the value of the first data byte. Click the Frame Step button once to receive one more data frame, while and DP9 windows. Notice that the green LED in the Reed-Solomon Decoder lights up to indicate that the last data frame has been received free of errors. Edit the value of the first data byte in the DP8 window so that the four least significant bits are inverted, thereby causing a 4-bit error in one byte of this data frame. For example, if the value of the first byte is F2h, the value should be changed to FDh. Click the Record button in the DP8 window to record the new value of the first data byte. 118 Festo Didactic

13 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Procedure Click the Frame Step button once to receive the corrupted data frame, while and DP9 windows. Describe what happens when the corrupted data frame is received. 15. Edit the value of the first data byte in the DP8 window so that it recovers its original value (value you noted previously in this exercise). Click the Record button in the DP8 window to record the value of the first data byte. Click the Frame Step button once to receive one more data frame, while and DP9 windows. Notice that the green LED in the Reed-Solomon Decoder lights up to indicate that the last data frame has been received free of errors. Edit the value of the first data byte in the DP8 window so that all bits are inverted, thereby causing an 8-bit error in one byte of this data frame. For example, if the value of the first byte is F2h, the value should be changed to 0Dh. Click the Record button in the DP8 window to record the new value of the first data byte. Click the Frame Step button once to receive the corrupted data frame, while and DP9 windows. Describe what happens when the corrupted data frame is received. From what you have observed so far, does Reed-Solomon error correction seem to offer an effective protection against burst errors? Explain briefly. Festo Didactic

14 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Procedure 16. Edit the value of the first data byte in the DP8 window so that it recovers its original value (value you noted previously in this exercise). Click the Record button in the DP8 window to record the value of the first data byte. Click the Frame Step button once to receive one more data frame, while and DP9 windows. Notice that the green LED in the Reed-Solomon Decoder lights up to indicate that the last data frame has been received free of errors. Edit the value of the first data byte in the DP8 window so that the most significant bit is inverted, thereby causing a 1-bit error in this byte. Do the same for the second byte in the data frame. For example, if the values of the first two bytes are F2h and F3h, the values should be changed to 72h and 73h, respectively, as shown in Figure 72. Click the Record button in the DP8 window to record the new values of the first two data bytes. Figure 72. Editing two data bytes at the input of the Reed-Solomon Decoder. 17. Click the Frame Step button once to receive the corrupted data frame, while and DP9 windows. Describe what happens when the corrupted data frame is received. Briefly explain the behavior of the Reed-Solomon Decoder that you observed in this step. Is the error-correction capability of the Reed-Solomon Decoder as expected? Yes No 120 Festo Didactic

15 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Procedure 18. Edit the values of the first two data bytes in the DP8 window so that they recover their original values (values you noted previously in this exercise). Click the Record button in the DP8 window to record the values of the first two data bytes. Click the Frame Step button once to receive one more data frame, while and DP9 windows. Notice that the green LED in the Reed-Solomon Decoder lights up to indicate that the last data frame has been received free of errors. Total Data Rate versus Aggregate Data Rate 19. Disable the Reed-Solomon error correction in the ADSL application. Select the Continuous mode of operation by clicking the Continuous button ( ) in the ADSL application toolbar. Observe the Performance Display in the ADSL application. Notice that the Net Data Rate is 32 kbit/s lower than the Aggregate Data Rate (352 kbit/s versus 384 kbit/s) because one byte per data frame is dedicated to functions other than user data transmission. Also notice that the Total Data Rate equals the Aggregate Data Rate. Briefly explain why. 20. Enable the Reed-Solomon error correction in the ADSL application while observing the Performance Display. What is the effect on the various data rates displayed? Briefly explain why. 21. When you have finished using the system, exit the LVCT software and turn off the equipment. Festo Didactic

16 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Conclusion CONCLUSION In this exercise, you learned that error control is used to improve the reliability of data transmission systems by detecting and correcting errors that may affect the received data. You saw that error detection can be implemented using parity bits or CRC codes. Similarly, you saw that several techniques can be used to implement error correction. You learned that adding an Automatic Repeat Request (ARQ) function to an error detection function is a simple means to implement error detection. You learned that forward error correction (FEC) is an advanced type of error correction that allows errors to be corrected directly in the receiver without having to ask the transmitter to resend data. You saw that FEC is separated into two main categories: block-coding FEC and convolutionalcoding FEC. You learned how Reed-Solomon error correction, a type of blockcoding FEC, operates. You observed how Reed-Solomon error correction works in an ADSL application, and saw that it is particularly efficient against burst errors. REVIEW QUESTIONS 1. What are the two main functions of the error control scheme in a data transmission system? 2. Briefly explain what forward error correction is. 3. What is the error-correction capability of forward error correction using shortened (112, 80) Reed-Solomon codes? Explain briefly. 122 Festo Didactic

17 Exercise 5 Forward Error Correction Using Reed-Solomon Codes Review Questions 4. Briefly explain why Reed-Solomon error correction is efficient against burst errors. 5. What is the price to pay for the improved reliability that FEC provides to a data transmission system? Festo Didactic

Framing, Synchronization, and Error Detection

Framing, Synchronization, and Error Detection Exercise 4 Framing, Synchronization, and Error Detection EXERCISE OBJECTIVE When you have completed this exercise, you will be familiar with the ADSL superframe structure. You will be able to demonstrate

More information

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

Chapter 6 Digital Data Communications Techniques

Chapter 6 Digital Data Communications Techniques Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

ADSL (Asymmetrical Digital Subscriber Line) details

ADSL (Asymmetrical Digital Subscriber Line) details ADSL (Asymmetrical Digital Subscriber Line) details A D S L Asymmetrical Digital Subscriber Line Central Office Customer premises High- Rate channel Low- Rate channel LP HP Spectrum At the beginning two

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

CS321: Computer Networks Error Detection and Correction

CS321: Computer Networks Error Detection and Correction CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must

More information

ADSL Transmitter Modeling and Simulation. Department of Electrical and Computer Engineering University of Texas at Austin. Kripa Venkatachalam.

ADSL Transmitter Modeling and Simulation. Department of Electrical and Computer Engineering University of Texas at Austin. Kripa Venkatachalam. ADSL Transmitter Modeling and Simulation Department of Electrical and Computer Engineering University of Texas at Austin Kripa Venkatachalam Qiu Wu EE382C: Embedded Software Systems May 10, 2000 Abstract

More information

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Additional Interesting Codes m-out-of-n codes - each binary code word has m ones in a length n non-systematic codeword - used for unidirectional errors

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by: T305 T325 B BLOCK 4 T325 Summary Prepared by: Session 3 [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Dr. Saatchi, Seyed Mohsen T325 Error Control Coding

More information

(Refer Slide Time: 2:20)

(Refer Slide Time: 2:20) Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-15 Error Detection and Correction Hello viewers welcome to today s lecture

More information

Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction

Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction Vishal Badole 1, Amit Udawat 2 Department of Electronics and Communication Engg. 1, Acropolis

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy

More information

PART III. Data Link Layer MGH T MGH C I 204

PART III. Data Link Layer MGH T MGH C I 204 PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control

More information

COMPUTER NETWORKS UNIT-3

COMPUTER NETWORKS UNIT-3 COMPUTER NETWORKS UNIT-3 Syllabus: The Data Link Layer - Data Link Layer Design Issues, Services Provided to the Network Layer Framing Error Control Flow Control, Error Detection and Correction Error-Correcting

More information

)454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU

)454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU INTERNATIONAL TELECOMMUNICATION UNION )454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.%47/2+ #/$%).$%0%.$%.4 %22/2#/.42/, 3934%- )454 Recommendation 6 (Extract

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1, CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet

More information

A Hybrid ARQ Scheme for Resilient Packet Header Compression

A Hybrid ARQ Scheme for Resilient Packet Header Compression A Hybrid ARQ Scheme for Resilient Packet Compression Vijay A Suryavanshi and Aria Nosratinia Multimedia Communications Laboratory, The University of Texas at Dallas Richardson, TX 7083-0688, USA E-mail:

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

Errors. Chapter Extension of System Model

Errors. Chapter Extension of System Model Chapter 4 Errors In Chapter 2 we saw examples of how symbols could be represented by arrays of bits. In Chapter 3 we looked at some techniques of compressing the bit representations of such symbols, or

More information

DATA LINK LAYER UNIT 7.

DATA LINK LAYER UNIT 7. DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission

More information

CSEP 561 Error detection & correction. David Wetherall

CSEP 561 Error detection & correction. David Wetherall CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled

More information

UNIT-II 1. Discuss the issues in the data link layer. Answer:

UNIT-II 1. Discuss the issues in the data link layer. Answer: UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

CHANNEL CODING 1. Introduction

CHANNEL CODING 1. Introduction CHANNEL CODING 1. Introduction The fundamental resources at the disposal of a communications engineer are signal power, time and bandwidth. For a given communications environment, these three resources

More information

ET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution

More information

EMI Reduction algorithm using enhanced-harq Implementation for Controller Area Network

EMI Reduction algorithm using enhanced-harq Implementation for Controller Area Network EMI Reduction algorithm using enhanced-harq Implementation for Controller Area Network Cheolsu Han 1 and Hi Seok Kim 2 1,2 Electronic Engineering Department, Cheongju University, Cheongju City, South Korea.

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

Packet-Level Forward Error Correction in Video Transmission

Packet-Level Forward Error Correction in Video Transmission Packet-Level Forward Error Correction in Video Transmission Matteo Mazzotti, Enrico Paolini, Marco Chiani, Davide Dardari, and Andrea Giorgetti University of Bologna Wireless Communications Laboratory

More information

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst EITF25 Internet Techniques and Applications L3: Data Link layer Stefan Höst Communication on physical layer To transmit on the physical medium use signals At each computer it can be seen as transmitting

More information

CHAPTER 2 Data Representation in Computer Systems

CHAPTER 2 Data Representation in Computer Systems CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting

More information

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002 EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

Edits to P802.3bs D1.2 for Alignment Marker Mapping and Insertion

Edits to P802.3bs D1.2 for Alignment Marker Mapping and Insertion 119.2.4.4 Alignment marker mapping and insertion In order to support deskew and reordering of the 16 individual PCS lanes at the receive PCS, alignment markers are added periodically for each PCS lane.

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen Networked Systems and Services, Fall 2018 Chapter 2 Jussi Kangasharju Markku Kojo Lea Kutvonen Outline Physical layer reliability Low level reliability Parities and checksums Cyclic Redundancy Check (CRC)

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

Data and Computer Communications. Protocols and Architecture

Data and Computer Communications. Protocols and Architecture Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or

More information

Data Link Layer. Srinidhi Varadarajan

Data Link Layer. Srinidhi Varadarajan Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request

More information

A Theoretical Evaluation of the G-TOR Hybrid ARQ Protocol

A Theoretical Evaluation of the G-TOR Hybrid ARQ Protocol A Theoretical Evaluation of the G-TOR Hybrid ARQ Protocol Glenn E. Prescott, WB@SKX Phil Anderson, W@X ABSTRACT The recently-introduced G-TOR protocol for HF data communications employs several features

More information

100BASE-Cu Dual Mode Proposal

100BASE-Cu Dual Mode Proposal 100BASE-Cu Dual Mode Proposal Patrick Stanley, Elastic Networks, pstanley@elastic.com (678)297-3103 Baseline Proposal 100 Mbps Dual-Mode Proposal Why Consider this proposal? PHY Driven by Market Requirements

More information

Asymmetrical Digital Subscriber Line (ADSL)

Asymmetrical Digital Subscriber Line (ADSL) Asymmetrical Digital Subscriber Line (ADSL) Asymmetrical Digital Subscriber Line Background motivation for developing ADSL historical development DSL end-to-end environment and reference model Line environment

More information

A NEW H-ARQ SCHEME USING BCH CODES WITH UNEQUAL DATA AND PARITY FRAMES

A NEW H-ARQ SCHEME USING BCH CODES WITH UNEQUAL DATA AND PARITY FRAMES A NEW H-ARQ SCHEME USING BCH CODES WITH UNEQUAL DATA AND ARITY FRAMES K.D.R. JAGATH-KUMARA Institute of Information Sciences & Technology, College of Sciences Massey University, RC2.56, Riddet Building,

More information

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS Jyoti Sharma Department of ECE Sri Sai College of Engg. & Technology, Badhani, Punjab, India Priya Department of ECE Sri Sai

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into

More information

90A John Muir Drive Buffalo, New York Tel: Fax:

90A John Muir Drive   Buffalo, New York Tel: Fax: Reed Solomon Coding The VOCAL implementation of Reed Solomon (RS) Forward Error Correction (FEC) algorithms is available in several forms. The forms include pure software and software with varying levels

More information

CHAPTER 2 Data Representation in Computer Systems

CHAPTER 2 Data Representation in Computer Systems CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting

More information

Communication Systems, 5e Chapter 13: Channel Coding

Communication Systems, 5e Chapter 13: Channel Coding Communication Systems, 5e Chapter 13: Channel Coding A. Bruce Carlson Paul B. Crilly Pop Quiz 1) The sampling rate for CD audio is. a) 22.0 khz b) 44.1 khz 2) CD audio format does not allow for any form

More information

1.6 Error Control Strategies

1.6 Error Control Strategies 1.6 Error Control Strategies 1.6.1 Introduction ARQ Data Source Encoder Binary Channel Decoder Data Sink {u} {v} {v'} {u'} encoder, decoder, error control; error control strategies: (simple) error detection;

More information

Inst: Chris Davison

Inst: Chris Davison ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of

More information

Link Layer: Error detection and correction

Link Layer: Error detection and correction Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability

More information

Advanced Modulation and Coding Challenges

Advanced Modulation and Coding Challenges WHITE PAPER Accelerating from 100GE to 400GE in the Data Center Advanced Modulation and Coding Challenges Ever increasing demands for a connected world with instant data access continues to drive data

More information

EE 387 course information

EE 387 course information EE 387 course information EE 387, Notes 1, Handout #2 Instructor: John Gill, Packard 266 Textbook: Algebraic Codes for Data Transmission by Richard Blahut Weekly homework, including occasional programming

More information

Chapter 9: Data Transmission

Chapter 9: Data Transmission Chapter 9: Data Transmission MULTIPLE CHOICE 1. In practical terms, parallel data transmission is sent: a. over short distances only c. over any distance b. usually over long distances d. usually over

More information

New Method in Error Detection

New Method in Error Detection New Method in Error Detection Shir Mohammad tavangari Department of Computer Engineering, Babol university E-mail address:shmt.researcher@gmail.com Abstract This article is about one of the functions of

More information

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) Data Link Control Contents Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) 2 Flow Control Flow control is a technique for assuring that a transmitting entity

More information

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes

More information

Lecture / The Data Link Layer: Framing and Error Detection

Lecture / The Data Link Layer: Framing and Error Detection Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start

More information

Data Link Layer (1) Networked Systems 3 Lecture 6

Data Link Layer (1) Networked Systems 3 Lecture 6 Data Link Layer (1) Networked Systems 3 Lecture 6 Purpose of Data Link Layer Arbitrate access to the physical layer Structure and frame the raw bits Provide flow control Detect and correct bit errors Perform

More information

TSG-RAN Working Group 2 (Radio layer 2 and Radio layer 3) TSGR2#2(99)085 Stockholm 8th to 11th March 1999

TSG-RAN Working Group 2 (Radio layer 2 and Radio layer 3) TSGR2#2(99)085 Stockholm 8th to 11th March 1999 TSG-RAN Working Group 2 (Radio layer 2 and Radio layer 3) TSGR2#2(99)085 Stockholm 8th to 11th March 1999 Agenda Item: 8.3.2 Source: Title: Document for: Siemens AG ARQ error control techniques Decision

More information

ECE 333: Introduction to Communication Networks Fall Lecture 6: Data Link Layer II

ECE 333: Introduction to Communication Networks Fall Lecture 6: Data Link Layer II ECE 333: Introduction to Communication Networks Fall 00 Lecture 6: Data Link Layer II Error Correction/Detection 1 Notes In Lectures 3 and 4, we studied various impairments that can occur at the physical

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd.

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd. Parity Even parity: Odd parity: Add a bit to make the number of ones (1s) transmitted even. Add a bit to make the number of ones (1s) transmitted odd. Example and ASCII A is coded 100 0001 Parity ASCII

More information

PROXIMITY-1 SPACE LINK PROTOCOL CODING AND SYNCHRONIZATION SUBLAYER

PROXIMITY-1 SPACE LINK PROTOCOL CODING AND SYNCHRONIZATION SUBLAYER Draft Recommendation for Space Data System Standards PROXIMITY-1 SPACE LINK PROTOCOL CODING AND SYNCHRONIZATION SUBLAYER DRAFT RECOMMENDED STANDARD CCSDS 211.2-P-2.1 PINK SHEETS March 2019 Draft Recommendation

More information

CS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos

CS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos CS254 Network Technologies Lecture 2: Network Models & Error Detection and Correction Dr Nikos Antonopoulos Department of Computing University of Surrey Autumn 2006 2.1 Layered Tasks Sender, Receiver,

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies ARQ Schemes, March 26 24 ARQ Schemes, March 26 24 2 Outline Classification of error control strategies S-7263 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 24

More information

The Data Link Layer. Data Link Layer Design Issues

The Data Link Layer. Data Link Layer Design Issues The Data Link Layer Chapter 3 Data Link Layer Design Issues Network layer services Framing Error control Flow control 1 Packets and Frames Relationship between packets and frames. Network Layer Services

More information

Forward Error Correction in Optical Networks

Forward Error Correction in Optical Networks Forward Error Correction in Optical Networks P. Michael Henderson michael.henderson@cox.net P. Michael Henderson, michael.henderson@cox.net 1 Agenda Why FEC? In-band SONET/SDH FEC Digital wrapper Frame

More information

Communication Fundamentals in Computer Networks

Communication Fundamentals in Computer Networks Lecture 7 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07

More information

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES (1) Nallaparaju Sneha, PG Scholar in VLSI Design, (2) Dr. K. Babulu, Professor, ECE Department, (1)(2)

More information

Coding theory for scalable media delivery

Coding theory for scalable media delivery 1 Coding theory for scalable media delivery Michael Luby RaptorQ is a product of Qualcomm Technologies, Inc. Application layer erasure coding complements traditional error coding Forward Error Correction

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

S Capacity enhancement methods for radio interface ARQ Schemes

S Capacity enhancement methods for radio interface ARQ Schemes ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control

More information

An Introduction to G.998.4: Improved Impulse Noise Protection

An Introduction to G.998.4: Improved Impulse Noise Protection An Introduction to G.998.4: Improved Impulse Noise Protection Authors: Sigurd Schelstraete, Ph.D. Manouchehr Rafie, Ph.D. A daunting challenge that confronts DSL service providers worldwide is the issue

More information

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1 Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter

More information

Error correction in Flash memory 1. Error correction in Flash memory. Melissa Worley. California State University Stanislaus.

Error correction in Flash memory 1. Error correction in Flash memory. Melissa Worley. California State University Stanislaus. Error correction in Flash memory 1 Error correction in Flash memory Melissa Worley California State University Stanislaus Senior Seminar 24 October 2010 Error correction in Flash memory 2 Abstract In this

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection 2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow

More information

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Preface p. xi Acknowledgments p. xvii Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Experiments p. 4 Audio

More information

Introduction to Computer Networks. 03 Data Link Layer Introduction

Introduction to Computer Networks. 03 Data Link Layer Introduction Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple

More information

Quality of Service (QoS) Whitepaper

Quality of Service (QoS) Whitepaper Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing

More information

INTELLIS. Modbus Direct Network Monitor

INTELLIS. Modbus Direct Network Monitor INTELLIS Modbus Direct Network Monitor System Installation and Operation Manual Phone: (201) 794-7650 Fax: (201)794-0913 Chapter 1 Modbus Protocol Revision History Revision 1.0 30 April, 2002 Initial Version

More information

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames. Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept

More information

CSE 123: Computer Networks

CSE 123: Computer Networks Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Overview. A Survey of Packet-Loss Recovery Techniques. Outline. Overview. Mbone Loss Characteristics. IP Multicast Characteristics

Overview. A Survey of Packet-Loss Recovery Techniques. Outline. Overview. Mbone Loss Characteristics. IP Multicast Characteristics A Survey of Packet-Loss Recovery Techniques Overview Colin Perkins, Orion Hodson and Vicky Hardman Department of Computer Science University College London (UCL) London, UK IEEE Network Magazine Sep/Oct,

More information

A study of Skype over IEEE networks: voice quality and bandwidth usage

A study of Skype over IEEE networks: voice quality and bandwidth usage Graduate Theses and Dissertations Graduate College 2011 A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Kuan-yu Chen Iowa State University Follow this and additional works

More information

Direct Link Networks. Framing. Lecture - Encoding & Framing 1. Problems. Areas for Discussion

Direct Link Networks. Framing. Lecture - Encoding & Framing 1. Problems. Areas for Discussion Areas for Discussion Direct Link s Joseph Spring School of Computer Science 3COM0271 Computer Protocols & Architecture s Based on Chapter 2, Peterson & Davie, Computer s: A Systems Approach, 4 th Ed Problems

More information

Direct Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems

Direct Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems Areas for Discussion Direct Link s Joseph Spring School of Computer Science 3COM0088 Computer Protocols & Architecture s Based on Chapter 2, Peterson & Davie, Computer s: A Systems Approach, 3 rd Ed Problems

More information

Convolutional Coding for Resilient Packet Header Compression

Convolutional Coding for Resilient Packet Header Compression Convolutional Coding for Resilient Packet Header Compression Vijay A Suryavanshi and Aria Nosratinia Multimedia Communications Laboratory, The University of Texas at Dallas Richardson, TX 75083-0688, USA

More information