unit 3
unit 3
Error: A condition when the receiver’s information does not match with the sender’s
information. During transmission, digital signals suffer from noise that can introduce errors in
the binary bits travelling from sender to receiver. That means a 0 bit may change to 1 or a 1 bit
may change to 0.
Redundancy We need to send some extra bits with our data to detect or correct the errors.
(These redundant bits are added by the sender and removed by receiver. Error control
mechanism may involve two possible ways:
1. Error detection: We will check if any error has occurred or not. We are not interested in
the number of errors.
2. Error correction: We have to check exact number of bits that are corrupted and their
location in the message.
Types Of Errors
Single-Bit Error: The only one bit of a given data unit is changed from 1 to 0 or from 0 to 1.
In the above figure, the message which is sent is corrupted as single-bit, i.e., 0 bit is changed
to 1. Single-Bit Error does not appear more likely in Serial Data Transmission. For example,
Sender sends the data at 10 Mbps, this means that the bit lasts only for 1 ?s and for a single-bit
error to occurred, a noise must be more than 1 ?s. Single-Bit Error mainly occurs in Parallel
Data Transmission. For example, if eight wires are used to send the eight bits of a byte, if one
of the wire is noisy, then single-bit is corrupted per byte.
Burst Error:
The two or more bits are changed from 0 to 1 or from 1 to 0 is known as Burst Error.
The Burst Error is determined from the first corrupted bit to the last corrupted bit.
o single Parity checking is the simple mechanism and inexpensive to detect the errors.
o In this technique, a redundant bit is also known as a parity bit which is appended at the
end of the data unit so that the number of 1s becomes even. Therefore, the total number
of transmitted bits would be 9 bits.
o If the number of 1s bits is odd, then parity bit 1 is appended and if the number of 1s bits
is even, then parity bit 0 is appended at the end of the data unit.
o At the receiving end, the parity bit is calculated from the received data bits and
compared with the received parity bit.
o This technique generates the total number of 1s even, so it is known as even-parity
checking.
Consider the data unit to be transmitted is 1001001 and even parity is used. Then,
• So, parity bit = 1 is added to the data unit to make total number of 1’s even.
Checksum
A Checksum is generated at the sending side. Checksum generator subdivides the data into
equal segments of n bits each, and all these segments are added together by using one's
complement arithmetic. The sum is complemented and appended to the original data, known
as checksum field. The extended data is transmitted across the network.
Checksum Checker
A Checksum is verified at the receiving side. The receiver subdivides the incoming data into
equal segments of n bits each, and all these segments are added together, and then this sum is
complemented. If the complement of the sum is zero, then the data is accepted otherwise data
is rejected.
Example:
Cyclic Redundancy Check (CRC):
o In CRC technique, a string of n 0s is appended to the data unit, and this n number is less than
the number of bits in a predetermined number, known as division which is n+1 bits.
o Secondly, the newly extended data is divided by a divisor using a process is known as binary
division. The remainder generated from this division is known as CRC remainder.
o Thirdly, the CRC remainder replaces the appended 0s at the end of the original data. This
newly generated unit is sent to the receiver.
o The receiver receives the data followed by the CRC remainder. The receiver will treat this
whole unit as a single unit, and it is divided by the same divisor that was used to find the CRC
remainder.
If the resultant of this division is zero which means that it has no error, and the data is accepted.
If the resultant of this division is not zero which means that the data consists of an error.
Therefore, the data is discarded.
Suppose the original data is 11100 and divisor is 1001. CRC Generator o A CRC generator
uses a modulo-2 division.
Firstly, three zeroes are appended at the end of the data as the length of the divisor is 4 and we
know that the length of the string 0s to be appended is always one less than the length of the
divisor.
o Now, the string becomes 11100000, and the resultant string is divided by the divisor 1001.
o The remainder generated from the binary division is known as CRC remainder. The
generated value of the CRC remainder is 111.
o CRC remainder replaces the appended string of 0s at the end of the data unit, and the final
string would be 11100111 which is sent across the network.
CRC Checker
o When the string 11100111 is received at the receiving end, then CRC checker performs the
modulo-2 division.
o In this case, CRC checker generates the remainder of zero. Therefore, the data is accepted
Error Correction Technique:
Hamming Code:
Wireless Communication
IEEE Standards:
IEEE 802 an Institute of Electrical and Electronics Engineers (IEEE) standard set that covers
the physical and data link layers of the Open Systems Interconnection (OSI) model. It defines
standards and protocols for local area networks (WLAN), metropolitan area networks (MAN)
and wireless networks.
IEEE 802.2: General standard for the data link layer in the OSI Reference Model. The IEEE
divides this layer into two sublayers -- the logical link control (LLC) layer and the media access
control (MAC) layer.
IEEE 802.3: Defines the MAC layer for bus networks that use CSMA/CD. This is the basis of
the Ethernet standard.
EEE 802.4: Defines the MAC layer for bus networks that use a token passing mechanism
(token bus networks).
802.11 Architecture:
• The basic services set contain stationary or mobile wireless stations and a central base station
called access point (AP).
• If the access point is not present, it is known as stand-alone network. Such a BSS cannot send
data to other BSSs. This type of architecture is known as adhoc architecture.
An extended service set is created by joining two or more basic service sets (BSS) having
access points (APs).
These extended networks are created by joining the access points of basic services sets through
a wired LAN known as distribution system.
Disadvantages of WLAN
1. Installation speed and simplicity.
2. Installation flexibility.
3. Reduced cost of ownership.
4. Reliability.
Bluetooth:
• Bluetooth is universal for short-range wireless voice and data communication. It is a
Wireless Personal Area Network (WPAN) technology and is used for exchanging data
over smaller distances.
• This technology was invented by Ericson in 1994. It operates in the unlicensed,
industrial, scientific, and medical (ISM) band from 2.4 GHz to 2.485 GHz.
• Maximum devices that can be connected at the same time are 7. Bluetooth ranges up to
10 meters. It provides data rates up to 1 Mbps or 3 Mbps depending upon the version.
• A Bluetooth network is called a piconet and a collection of interconnected piconets is
called scatternet. Bluetooth is Wireless.
Bluetooth Architecture
Bluetooth architecture defines two types of networks:
1. Piconet 2. Scatternet
1. Piconet:
• Piconet is a Bluetooth network that consists of one primary (master) node and seven
active secondary (slave) nodes.
• Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or stations
within the distance of 10 meters.
• There can be only one primary or master station in each piconet.
The communication between the primary and the secondary can be one-to-one or one-
to-many/.
communication is between master and a slave. Salve-slave communication is not
possible.
Scatternet:
•Scattemet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station or node can receive messages from the master in the first piconet and
deliver the message to its slaves in other piconet where it is acting as master. This node
is also called bridge slave.
• Thus a station can be a member of two piconets.
• A station cannot be a master in two piconets
Advantage:
Disadvantages:
Applications:
Mobile generation:
When connected to internet, the speed of internet depends on the signal strength that has been
shown in alphabets like 2G, 3G, 4G etc. right next to the signal bar on home screen of mobile
phone. Each Generation is defined as a set of telephone network standards, which detail the
technological implementation of particular mobile phone system.
1G (1st Generation):
2G (2nd Generation) :
• Supported all 4 sectors of the wireless industry namely Digital cellular, Mobile Data, PCS,
WLAN,
• Speed:- 64 kbps.
2.5G came after 2G which used the concept of GPRS. Streaming was also introduced and mail
services too. Then came 2.75G or EDGE which was faster in providing services than 2.5G. It
gave faster internet speed up to 128kbps and also used edge connection.
3G (3rd Generation):
• Speed:- 2mbps.
4G (4th Generation):
• IP-based protocols.
• Freedom and flexibility to select any desired service with reasonable QoS.
• High usability.
• HD Quality Streaming.
• Speed:-100mbps.
5G (5th Generation):
• It is yet to come in many countries but here are some notable points about 5G. • Higher
data rates.