Professional Documents
Culture Documents
CHAPTER 3
ERROR DETECTION, CORRECTION & WIRELESS COMMUNICATION
Syllabus Topics
3.1 Types of Errors: Single Bit Error, & Burst Error, Redundancy
3.2 Error Detection: Longitudinal Redundancy Check(LRC), Vertical Redundancy Check(VRC), Cyclic
Redundancy Check(CRC)
3.3 Error Correction: Forward Error Correction
3.4 IEEE Standards: 802.1, 802.2, 802.3,802.4, 802.5
3.5 Wireless LANs: 802.11 Architecture, MAC Sub layer, Addressing Mechanism
3.6 Bluetooth Architecture: Piconet, Scatternet
3.7 Mobile Generations: 1G,2G,3G,4G & 5G
3.1.3 Redundancy
Network redundancy is a process through which additional or alternate instances of network devices,
equipment and communication mediums are installed within network infrastructure.
It is a method for ensuring network availability in case of a network device or path failure and
unavailability.
In engineering, redundancy is the duplication of critical components or functions of a system with the
intention of increasing reliability of the system, usually in the form of a backup or fail-safe, or to
improve actual system performance, like multi-threaded computer processing.
Transmission of extra bit along data bits (Redundant Bits)
1
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
1. Add all bytes in messages excluding the starting colon and the ending the carriage return line feed
2. Add this to the eight-bit field and discard the carries
3. Subtract the final field value from FF hex, producing one‟s complement
4. Add one, producing two‟s complement
2
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
Cyclic Cyclic Redundancy Check (CRC) is another error detection technique to detect errors in data that
has been transmitted on a communications link.
Redundancy Check (CRC) is an error detection method.
It is based on binary division.
CRC Generator-
CRC generator is an algebraic polynomial represented as a bit pattern.
Bit pattern is obtained from the CRC generator using the following rule-
Thus, for the given CRC generator, the corresponding binary pattern is 11011011.
Rule-02:
It should be divisible by x+1.
This condition guarantees that all the burst errors affecting an odd number of bits are detected.
Important Notes-
If the CRC generator is chosen according to the above rules, then-
CRC can detect all single-bit errors
CRC can detect all double-bit errors provided the divisor contains at least three logic 1‟s.
CRC can detect any odd number of errors provided the divisor is a factor of x+1.
CRC can detect all burst error of length less than the degree of the polynomial.
CRC can detect most of the larger burst errors with a high probability.
Steps Involved-
Error detection using CRC technique involves the following steps-
At sender side,
The CRC is obtained after the binary division.
The string of n 0‟s appended to the data unit earlier is replaced by the CRC remainder.
The newly formed code word (Original data + CRC) is transmitted to the receiver.
At receiver side,
The transmitted code word is received.
The received code word is divided with the same CRC generator.
On division, the remainder so obtained is checked.
Case-01: Remainder = 0
Case-02: Remainder ≠ 0
Problem-01:
A bit stream 1101011011 is transmitted using the standard CRC method. The generator polynomial is
x4+x+1. What is the actual bit string transmitted?
Solution-
4
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
LRC CRC
Longitudinal Redundancy Check (LRC) is a Cyclic Redundancy Check (CRC) is
method in which a block of bits is one of the most common and
organized in table (rows and columns) powerful error detecting codes in
calculate the parity bit for each column and which a sequence of redundant bits,
the set of this parity bit is also sending with called the CRC is appended to the
original data. From the block of parity we end of the unit so that the resulting
can check the redundancy data unit become exactly divisible by
a second, predetermined binary
number.
LRC of n bits can easily detect CRC is more powerful
Burst error of n bits. VRC and LRC in detecting
5
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
errors
A longitudinal redundancy check (LRC) is CRC is based on binary division.
an error detection method based on binary
addition
Advantages
1) No retransmission requires
2) Extends operating range
3) Reduces more power requirement
4) Increases throughput
Application Area
1) In digital communication
2) Cellular telephone
3) Radio
4) Spread Spectrum
5) Satellite communication
The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) is an organization
within IEEE that develops global standards in a broad range of industries,
including: power and energy, biomedical and health care, information
technology and robotics, telecommunication and home
automation, transportation, nanotechnology, information assurance, and many more.
6
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
The MAC layer varies for different network types and is defined by standards IEEE 802.3 through IEEE
802.5.
IEEE 802.3: Defines the MAC layer for bus networks that use CSMA/CD. This is the basis of the
Ethernet standard.
EEE 802.4: Defines the MAC layer for bus networks that use a token passing mechanism (token bus
networks).
IEEE 802.5: Defines the MAC layer for token-ring networks.
IEEE 802.6: Standard for Metropolitan Area Networks (MANs).
IEEE 802.11: Wireless Network Standards: 802.11 is the collection of standards setup for wireless
networking.
7
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
On a Token Ring network, only one computer at a time can transmit data.
When a computer has data to send, it must use a special type of packet known as a token.
The token travels around the network looking for computers with data to send.
In IEEE 802.5, the token passing scheme is used in place of Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) on a ring topology local area network (LAN).
A token is circulated around a network. The computer that has possession of the token has the right to
transmit packets for a certain period of time.
MSBTE QUE. With neat diagram explain the ESS architecture of IEEE 802.11
(Summer-2017, Winter-2019 )
Wireless LANs are those Local Area Networks that use high frequency radio waves instead of cables
for connecting the devices in LAN.
Users connected by WLANs can move around within the area of network coverage.
Most WLANs are based upon the standard IEEE 802.11 or WiFi.
The components of an IEEE 802.11 architecture are as follows:
802.11 Architecture:
The 802.11architecture defines two types of services:
1. Basic services set (BSS)
2. Extended Service Set (ESS)
8
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
Advantages of WLANs
1. They provide clutter free homes, offices and other networked places.
2. The LANs are scalable in nature, i.e. devices may be added or removed from the network at a
greater ease than wired LANs.
3. The system is portable within the network coverage and access to the network is not bounded by the
length of the cables.
4. Installation and setup is much easier than wired counterparts.
5. The equipment and setup costs are reduced.
9
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
Disadvantages of WLANs
1. Since radio waves are used for communications, the signals are noisier with more interference from
nearby systems.
2. Greater care is needed for encrypting information. Also, they are more prone to errors. So, they
require greater bandwidth than the wired LANs.
3. WLANs are slower than wired LANs.
Bluetooth is, with the infrared, one of the major wireless technologies developed to achieve WPAN.
Bluetooth is a wireless LAN technology used to connect devices of different functions such as
telephones, computers (laptop or desktop), notebooks, cameras, printers and so on.
Bluetooth is an example of personal area network.
Data rate- 1 MBPS
Bandwidth- 2.4 GHz
Also called as Short range radio links
Bluetooth Technology Applications:
1. It i s used for Provide communication to peripheral devices-wireless mouse or keyboard to PC.
2. It is used by modern healthcare devices to send signals to monitors.
3. It is used by modern communicating devices- mobile phone, PDAs, palmtops to transfer data rapidly.
4. It is used for dial up networking. Thus allowing a notebook computer to call via a mobile phone.
5. It is used for cordless telephoning to connect a handset and its local base station.
6. It also allows hands-free voice comml1nication with headset.
7. It also enables a mobile computer to connect to a fixed LAN.
8. It can also be used for file transfer operations from one mobile phone to another.
9. Bluetooth uses omnidirectional radio waves that can go through walls or other non-metal barriers.
10
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
Bluetooth Architecture
Bluetooth architecture defines two types of networks: 1. Piconet 2. Scattemet
3.6.1 Piconet
It is a Bluetooth network that consists of one primary (master) node and seven active secondary (slave)
nodes.
Thus, piconet can have upto eight active nodes (1 master and 7 slaves) or stations within the distance of
10 meters.
There can be only one primary or master station in each piconet.
The communication between the primary and the secondary can be one-to-one or one-to-many.
All communication is between master and a slave. Salve-slave communication is not possible.
In addition to seven active slave station, a piconet can have upto 255 parked nodes.
These parked nodes are secondary or slave stations and cannot take part in communication until it is
moved from parked state to active state.
3.6.2 Scatternet
Scattemet is formed by combining various piconets.
A slave in one piconet can act as a master or primary in other piconet.
Such a station or node can receive messages from the master in the first piconet and deliver the
message to its slaves in other piconet where it is acting as master.
This node is also called bridge slave.
Thus a station can be a member of two piconets.
A station cannot be a master in two piconets.
11
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
3.7.2 2G (1990)
In the 1990s, the „second generation‟ (2G) mobile phone systems emerged, primarily using the GSM
standard.
These 2G phone systems differed from the previous generation in their use of digital transmission
instead of analog transmission, and also by the introduction of advanced and fast phone-to-network
signaling.
The rise in mobile phone usage as a result of 2G was explosive and this era also saw the advent of
prepaid mobile phones.
The second generation introduced a new variant to communication, as SMS text messaging became
possible, initially on GSM networks and eventually on all digital networks.
Picture messages and MMS (Multimedia Message Service) were used too.
Soon SMS became the communication method of preference for the youth.
Today in many advanced markets the general public prefers sending text messages to placing voice
calls.
2G (or 2-G) provides three primary benefits over their predecessors: phone conversations are digitally
encrypted
Circuit or packet switched
Frequency band 850-1900 MHz
Speed- 9.6 kbps
Application: Digital voice, data & SMS
12
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
3.5G is a grouping of disparate mobile telephony and data technologies designed to provide better
performance than 3G systems, as an interim step towards the deployment of full 4G capability.
Core network PSTN
Circuit or packet switched
Frequency band 1.6 -2.5 GHz
Speed 2 mbps
Application: High speed data, voice, video
3.7.5 5G (2020)
5G is a generation currently under development.
It denotes the next major phase of mobile telecommunications standards beyond the current 4G/IMT-
Advanced standards.
Next Generation Mobile Networks Alliance feel that 5G should be rolled out by 2020 to meet business
and consumer demands.
In addition to simply providing faster speeds, they predict that 5G networks will also need to meet the
needs of new use-cases such as the Internet of Things as well as broadcast-like services and lifeline
communications in times of disaster.
Core network internet
Packet switched
Frequency band 15 GHz
Speed > 1 gbps
Application: Interactive multimedia, VoIP, VR, IoT
NGMN Alliance or Next Generation Mobile Networks Alliance define 5G network requirements as:
Data rates of several tens of Mb/s should be supported for tens of thousands of users.
1 Gbit/s to be offered, simultaneously to tens of workers on the same office floor.
Several hundreds of thousands of simultaneous connections to be supported for massive sensor
deployments.
Spectral efficiency should be significantly enhanced compared to 4G.
Coverage should be improved.
Signaling efficiency enhanced.
Latency should be significantly reduced compared to LTE.
13
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
MSBTE Asked
Summer-2015
1) Explain in brief the functioning of Bluetooth.
(Diagram 1 mark, explanation 3 marks) (Refer Section 3.6)
Summer-2016
(1) Draw the Bluetooth architecture and describe its working.
(Piconet - 2 marks; Scatternet - 2 marks) (Refer Section 3.6)
Winter-2016
1) Describe the architecture of bluetooth technology.
(Each architecture: 2 marks) (Refer Section 3.6)
Summer-2017
1) With neat diagram explain the ESS architecture of IEEE 802.11. 4M
(Diagram: 2 marks, Explanation :2 marks) (Refer Section 3.5.1)
Summer-2019
1) State types of Errors 2M (Refer Section 3.1)
2) List IEEE 802 X standards for networks 2M (Refer Section 3.4)
3) Describe various IEEE standards for network topologies. 4M (Refer Section 3.4)
Winter-2019
1) Compare LRC and CRC. (Refer Section 3.1)
2) Explain various IEEE communication standards. (Refer Section 3.4)
3) With neat diagram explain the ESS architecture of IEEE 802.11 (Refer Section 3.5.1)
4) Describe Bluetooth architecture technologies. (Refer Section 3.6)
5) Classify mobile generations. (Refer Section 3.7)
14