You are on page 1of 14

Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

CHAPTER 3
ERROR DETECTION, CORRECTION & WIRELESS COMMUNICATION

Syllabus Topics
3.1 Types of Errors: Single Bit Error, & Burst Error, Redundancy
3.2 Error Detection: Longitudinal Redundancy Check(LRC), Vertical Redundancy Check(VRC), Cyclic
Redundancy Check(CRC)
3.3 Error Correction: Forward Error Correction
3.4 IEEE Standards: 802.1, 802.2, 802.3,802.4, 802.5
3.5 Wireless LANs: 802.11 Architecture, MAC Sub layer, Addressing Mechanism
3.6 Bluetooth Architecture: Piconet, Scatternet
3.7 Mobile Generations: 1G,2G,3G,4G & 5G

3.1 Types of Errors

MSBTE QUE. State types of Errors (Summer-2019)

3.1.1 Single Bit Error


 Network is responsible for transmission of data from one device to another device.
 The term single bit error means that only one bit of the data unit was changed from 1 to 0 and 0 to 1.
 As name suggests single-bit errors occur when a single bit gets changed during transmission of data due
to interference in network communication.
 Single-bit errors are least likely type of error because their duration or noise is normally longer than
duration of 1 bit.
 “The Term Single-Bit error means that only 1 bit of a given data unit (such as a byte, character, or
packet) is changed from 1 to 0 or from 0 to 1”.

3.1.2 Burst Error


 In term burst error means that two or more bits in the data unit were changed.
 In telecommunication, a burst error or error burst is a contiguous sequence of symbols, received over a
communication channel, such that the first and last symbols are in error and there exists no contiguous
subsequence of m correctly received symbols within the error burst.
 When more than a single bit of data unit gets corrupted it is known as Burst error.
 In comparison of single-bit errors, burst errors are more likely to occur.

3.1.3 Redundancy
 Network redundancy is a process through which additional or alternate instances of network devices,
equipment and communication mediums are installed within network infrastructure.
 It is a method for ensuring network availability in case of a network device or path failure and
unavailability.
 In engineering, redundancy is the duplication of critical components or functions of a system with the
intention of increasing reliability of the system, usually in the form of a backup or fail-safe, or to
improve actual system performance, like multi-threaded computer processing.
 Transmission of extra bit along data bits (Redundant Bits)

3.2 Error Detection


 In networking, error detection refers to the techniques used to detect noise or other impairments
introduced into data while it is transmitted from source to destination.
 Error detection ensures reliable delivery of data across vulnerable networks.

1
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

3.2.1 Longitudinal Redundancy Check (LRC)


 Longitudinal redundancy check (LRC) is an error-detection method for determining the correctness of
transmitted and stored data. LRC verifies the accuracy of stored and transmitted data using parity bits.

 It is a redundancy check applied to a parallel group of bit streams.


 Horizontal-Operate on group of characters
 Uses even parity
 Data divided in transmission block with additional check data

LRC is generated through the following steps:

1. Add all bytes in messages excluding the starting colon and the ending the carriage return line feed
2. Add this to the eight-bit field and discard the carries
3. Subtract the final field value from FF hex, producing one‟s complement
4. Add one, producing two‟s complement

3.2.2 Vertical Redundancy Check (VRC)


 Vertical redundancy check (VRC) is an error-checking method used on an eight-bit ASCII character.
 A vertical redundancy check is also called a transverse redundancy check when used in combination
with other error-controlling codes such as a longitudinal redundancy check.
 VRC is a redundancy check meant for parallel synchronized bits applied one bit at a time.
 It uses additional parallel channels for check bits and refers to single-parity bits or larger hamming
codes.
 Although parities are only meant for error detection and not error correction, they still can remain part
of a system for correcting errors.
 Uses odd parity

3.2.3 Cyclic Redundancy Check (CRC)


 A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and
storage devices to detect accidental changes to raw data.
 Blocks of data entering these systems get a short check value attached, based on the remainder of a
polynomial division of their contents.
 CRC (Cyclic Redundancy Check) is a checksum algorithm to detect inconsistency of data, e.g. bit
errors during data transmission.
 A checksum, calculated by CRC, is attached to the data to help the receiver to detect such errors.
 CRC is based on division.

What is Cyclic Redundancy Check?


Error detection is a technique that is used to check if any error occurred in the data during the transmission.

2
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

Cyclic Redundancy Check-

Cyclic Cyclic Redundancy Check (CRC) is another error detection technique to detect errors in data that
has been transmitted on a communications link.
Redundancy Check (CRC) is an error detection method.
It is based on binary division.

CRC Generator-
CRC generator is an algebraic polynomial represented as a bit pattern.
Bit pattern is obtained from the CRC generator using the following rule-

Consider the CRC generator is x7 + x6 + x4 + x3 + x + 1.


The corresponding binary pattern is obtained as-

Thus, for the given CRC generator, the corresponding binary pattern is 11011011.

Properties Of CRC Generator-


The algebraic polynomial chosen as a CRC generator should have at least the following properties-
Rule-01:
It should not be divisible by x.
This condition guarantees that all the burst errors of length equal to the length of polynomial are detected.

Rule-02:
It should be divisible by x+1.
This condition guarantees that all the burst errors affecting an odd number of bits are detected.

Important Notes-
If the CRC generator is chosen according to the above rules, then-
 CRC can detect all single-bit errors
 CRC can detect all double-bit errors provided the divisor contains at least three logic 1‟s.
 CRC can detect any odd number of errors provided the divisor is a factor of x+1.
 CRC can detect all burst error of length less than the degree of the polynomial.
 CRC can detect most of the larger burst errors with a high probability.

Steps Involved-
Error detection using CRC technique involves the following steps-

Step-01: Calculation Of CRC At Sender Side-


At sender side,
 A string of n 0‟s is appended to the data unit to be transmitted.
 Here, n is one less than the number of bits in CRC generator.
 Binary division is performed of the resultant string with the CRC generator.
 After division, the remainder so obtained is called as CRC.
 It may be noted that CRC also consists of n bits.
3
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

Step-02: Appending CRC To Data Unit-

At sender side,
 The CRC is obtained after the binary division.
 The string of n 0‟s appended to the data unit earlier is replaced by the CRC remainder.

Step-03: Transmission To Receiver-

 The newly formed code word (Original data + CRC) is transmitted to the receiver.

Step-04: Checking at Receiver Side-

At receiver side,
 The transmitted code word is received.
 The received code word is divided with the same CRC generator.
 On division, the remainder so obtained is checked.

The following two cases are possible-

Case-01: Remainder = 0

If the remainder is zero,


 Receiver assumes that no error occurred in the data during the transmission.
 Receiver accepts the data.

Case-02: Remainder ≠ 0

If the remainder is non-zero,


 Receiver assumes that some error occurred in the data during the transmission.
 Receiver rejects the data and asks the sender for retransmission.

Problem-01:

A bit stream 1101011011 is transmitted using the standard CRC method. The generator polynomial is
x4+x+1. What is the actual bit string transmitted?
Solution-

 The generator polynomial G(x) = x4 + x + 1 is encoded as 10011.


 Clearly, the generator polynomial consists of 5 bits.
 So, a string of 4 zeroes is appended to the bit stream to be transmitted.
 The resulting bit stream is 11010110110000.

Now, the binary division is performed as-

4
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

From here, CRC = 1110.


Now,
 The code word to be transmitted is obtained by replacing the last 4 zeroes of 11010110110000 with the
CRC.
 Thus, the code word transmitted to the receiver = 11010110111110.

MSBTE QUE. Compare LRC and CRC (Winter-2019)

LRC CRC
Longitudinal Redundancy Check (LRC) is a Cyclic Redundancy Check (CRC) is
method in which a block of bits is one of the most common and
organized in table (rows and columns) powerful error detecting codes in
calculate the parity bit for each column and which a sequence of redundant bits,
the set of this parity bit is also sending with called the CRC is appended to the
original data. From the block of parity we end of the unit so that the resulting
can check the redundancy data unit become exactly divisible by
a second, predetermined binary
number.
LRC of n bits can easily detect CRC is more powerful
Burst error of n bits. VRC and LRC in detecting

5
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3
errors
A longitudinal redundancy check (LRC) is CRC is based on binary division.
an error detection method based on binary
addition

3.3 Error Correction


 Error correction is the detection of errors and reconstruction of the original, error-free data.
 Both error detection and error correction require some amount of redundant data to be sent with the
actual data; correction requires more than detection.
 Parity bits are a simple approach for the detection of errors.
 This fails, however, to detect errors such as transposed bytes or double bit errors.

3.3.1 Forward Error Correction


 Forward error correction (FEC) is a method of obtaining error control in data transmission in which the
source (transmitter) sends redundant data and the destination (receiver) recognizes only the portion of
the data that contains no apparent errors.
 Forward error correction (FEC) is a digital signal processing technique used to enhance data reliability.
 It does this by introducing redundant data, called error correcting code, prior to data transmission or
storage.
 FEC provides the receiver with the ability to correct errors without a reverse channel to request the
retransmission of data.
 Adds extra information (check bits) to data stream, receiver analyzes check bit information to locate &
correct the errors

 Advantages
1) No retransmission requires
2) Extends operating range
3) Reduces more power requirement
4) Increases throughput

 Application Area
1) In digital communication
2) Cellular telephone
3) Radio
4) Spread Spectrum
5) Satellite communication

3.4 IEEE Standards

MSBTE QUE. List IEEE 802 X standards for networks (Summer-2019)


MSBTE QUE. Describe various IEEE standards for network topologies. (Summer-2019)
MSBTE QUE. Explain various IEEE communication standards. (Winter-2019)

The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) is an organization
within IEEE that develops global standards in a broad range of industries,
including: power and energy, biomedical and health care, information
technology and robotics, telecommunication and home
automation, transportation, nanotechnology, information assurance, and many more.

IEEE standards for network topologies-


IEEE 802.1: Standards related to network management.
IEEE 802.2: General standard for the data link layer in the OSI Reference Model. The IEEE divides this
layer into two sublayers -- the logical link control (LLC) layer and the media access control (MAC) layer.

6
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

The MAC layer varies for different network types and is defined by standards IEEE 802.3 through IEEE
802.5.
IEEE 802.3: Defines the MAC layer for bus networks that use CSMA/CD. This is the basis of the
Ethernet standard.
EEE 802.4: Defines the MAC layer for bus networks that use a token passing mechanism (token bus
networks).
IEEE 802.5: Defines the MAC layer for token-ring networks.
IEEE 802.6: Standard for Metropolitan Area Networks (MANs).
IEEE 802.11: Wireless Network Standards: 802.11 is the collection of standards setup for wireless
networking.

3.4.1 802.1 Standard


The IEEE 802.1 Working Group (IEEE 802.1) is an IEEE Standards Association (IEEE-SA) group
established to ensure network management and monitoring capabilities in networks developed according to
IEEE 802 standards.
The following are key IEEE 802.1 tasks:
 Designs and implements standards that regulate network management practices
 Provides services, including LAN/MAN management, media access control (MAC) bridging, data
encryption/encoding and network traffic management
IEEE 802.1 is comprised of four groups that focus on different standards and policies in the following
areas:
 Internetworking
 Audio/video (A/V) bridging
 Data center bridging
 Security

3.4.2 802.2 Standard


 IEEE 802.2 is the original name of the ISO/IEC 8802-2 standard which defines logical link control
(LLC) as the upper portion of the data link layer of the OSI Model.
 LLC is a software component that provides a uniform interface to the user of the data link service,
usually the network layer.

3.4.3 802.3 Standard


 Ethernet, IEEE 802.3 is a key part of wired connectivity & networking for computer and data
applications.
 Ethernet, IEEE 802.3, is one of the most widely used standards for computer networking and general
data communications.
 802.3 is a standard specification for Ethernet, a method of physical communication in a local area
network (LAN), which is maintained by the Institute of Electrical and Electronics Engineers (IEEE).
 In general, 802.3 specifies the physical media and the working characteristics of Ethernet.

3.4.4 802.4 Standard


 The IEEE 802.4 Committee has defined token bus standards as broadband computer networks, as
opposed to Ethernet's baseband transmission technique.
 Physically, the token bus is a linear or tree-shape cable to which the stations are attached.
 IEEE 802.4 Token Bus : In token bus Computer network station must have possession of a token before
it can transmit on the computer network.
 The IEEE 802.4 Committee has defined token bus standards as broadband computer networks, as
opposed to Ethernet's baseband transmission technique.

3.4.5 802.5 Standard


 Access method 802.5 specifies an access method known as token passing.

7
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

 On a Token Ring network, only one computer at a time can transmit data.
 When a computer has data to send, it must use a special type of packet known as a token.
 The token travels around the network looking for computers with data to send.
 In IEEE 802.5, the token passing scheme is used in place of Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) on a ring topology local area network (LAN).
 A token is circulated around a network. The computer that has possession of the token has the right to
transmit packets for a certain period of time.

3.5 Wireless LANs (IEEE 802.11)


 A wireless local area network (WLAN) is a wireless distribution method for two or more devices that
use high-frequency radio waves and often include an access point to the Internet.
 A WLAN allows users to move around the coverage area, often a home or small office, while
maintaining a network connection.
 While wireless LANs refer to any local area network (LAN) that a mobile user can connect to through
a wireless (radio) connection.
 Wi-Fi (short for "wireless fidelity") is a term for certain types of WLANs that use specifications in
the 802.11 wireless protocol family.
 RF waves

3.5.1 802.11 Architecture

MSBTE QUE. With neat diagram explain the ESS architecture of IEEE 802.11
(Summer-2017, Winter-2019 )

 Wireless LANs are those Local Area Networks that use high frequency radio waves instead of cables
for connecting the devices in LAN.
 Users connected by WLANs can move around within the area of network coverage.
 Most WLANs are based upon the standard IEEE 802.11 or WiFi.
 The components of an IEEE 802.11 architecture are as follows:

Wireless LAN 802.11:


The IEEE 802.11 standard defines the physical layer and media access control (MAC) layer for a wireless
local area network. Wireless LANs transmit and receive data over the atmosphere, using radio frequency
(RF) or infrared optical technology, thereby; eliminating the need for fixed wired connections.

802.11 Architecture:
The 802.11architecture defines two types of services:
1. Basic services set (BSS)
2. Extended Service Set (ESS)

1. Basic Services Set (BSS)


• The basic services set contain stationary or mobile wireless stations and a central base station called
access point (AP).
• The use of access point is optional.
• If the access point is not present, it is known as stand-alone network. Such a BSS cannot send data to
other BSSs. This type of architecture is known as adhoc architecture.
• The BSS in which an access point is present is known as an infrastructure network.

8
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

2. Extend Service Set (ESS)


An extended service set is created by joining two or more basic service sets (BSS) having access points (APs).
These extended networks are created by joining the access points of basic services sets through a wired LAN known
as distribution system.

There are two types of stations in ESS:


(i) Mobile stations: These are normal stations inside a BSS.
(ii) Stationary stations: These are AP stations that are part of a wired LAN.

Advantages of WLANs
1. They provide clutter free homes, offices and other networked places.
2. The LANs are scalable in nature, i.e. devices may be added or removed from the network at a
greater ease than wired LANs.
3. The system is portable within the network coverage and access to the network is not bounded by the
length of the cables.
4. Installation and setup is much easier than wired counterparts.
5. The equipment and setup costs are reduced.

9
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

Disadvantages of WLANs
1. Since radio waves are used for communications, the signals are noisier with more interference from
nearby systems.
2. Greater care is needed for encrypting information. Also, they are more prone to errors. So, they
require greater bandwidth than the wired LANs.
3. WLANs are slower than wired LANs.

3.5.2 MAC Sublayer


 The MAC sublayer acts as an interface between the logical link control (LLC) Ethernet sublayer and
Layer 1 (the physical layer).
 The MAC sublayer emulates a full-duplex logical communication channel in a multipoint network.
The MAC sublayer uses MAC protocols to prevent collisions.
 The Media Access Control Layer is one of two sublayers that make up the Data Link Layer of the OSI
model.
 The MAC layer is responsible for moving data packets to and from one Network Interface Card (NIC)
to another across a shared channel.
 In the Open Systems Interconnection (OSI) model of communication, the Media Access Control layer
is one of two sublayers of the Data Link Control layer and is concerned with sharing the physical
connection to the network among several computers.
 Each computer has its own unique MAC address.

3.5.3 Addressing Mechanism


 MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and
therefore it is often referred to as hardware or physical address.
 MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format.
 A MAC address is a hardware identification number that uniquely identifies each device on a network.
 The MAC address is manufactured into every network card, such as an Ethernet card or Wi-Fi card,
and therefore cannot be changed.

3.6 Bluetooth Architecture (Wireless PAN-IEEE 802.15 standard)

MSBTE QUE. Explain in brief the functioning of Bluetooth. (Summer-2015)


MSBTE QUE. Draw the Bluetooth architecture and describe its working. (Summer-2016)
MSBTE QUE. Describe Bluetooth architecture technologies. (Winter-2018, Winter-2019)

 Bluetooth is, with the infrared, one of the major wireless technologies developed to achieve WPAN.
 Bluetooth is a wireless LAN technology used to connect devices of different functions such as
telephones, computers (laptop or desktop), notebooks, cameras, printers and so on.
 Bluetooth is an example of personal area network.
 Data rate- 1 MBPS
 Bandwidth- 2.4 GHz
 Also called as Short range radio links
Bluetooth Technology Applications:
1. It i s used for Provide communication to peripheral devices-wireless mouse or keyboard to PC.
2. It is used by modern healthcare devices to send signals to monitors.
3. It is used by modern communicating devices- mobile phone, PDAs, palmtops to transfer data rapidly.
4. It is used for dial up networking. Thus allowing a notebook computer to call via a mobile phone.
5. It is used for cordless telephoning to connect a handset and its local base station.
6. It also allows hands-free voice comml1nication with headset.
7. It also enables a mobile computer to connect to a fixed LAN.
8. It can also be used for file transfer operations from one mobile phone to another.
9. Bluetooth uses omnidirectional radio waves that can go through walls or other non-metal barriers.
10
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

Bluetooth Architecture
Bluetooth architecture defines two types of networks: 1. Piconet 2. Scattemet
3.6.1 Piconet
 It is a Bluetooth network that consists of one primary (master) node and seven active secondary (slave)
nodes.
 Thus, piconet can have upto eight active nodes (1 master and 7 slaves) or stations within the distance of
10 meters.
 There can be only one primary or master station in each piconet.
 The communication between the primary and the secondary can be one-to-one or one-to-many.

Figure Master-Slave Connection in Piconet

 All communication is between master and a slave. Salve-slave communication is not possible.
 In addition to seven active slave station, a piconet can have upto 255 parked nodes.
 These parked nodes are secondary or slave stations and cannot take part in communication until it is
moved from parked state to active state.

3.6.2 Scatternet
 Scattemet is formed by combining various piconets.
 A slave in one piconet can act as a master or primary in other piconet.
 Such a station or node can receive messages from the master in the first piconet and deliver the
message to its slaves in other piconet where it is acting as master.
 This node is also called bridge slave.
 Thus a station can be a member of two piconets.
 A station cannot be a master in two piconets.

Figure Scatternet formation using Piconet

11
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

3.7 Mobile Generations


 The evolving mobile communications technologies provide us with vastly increasing data rates, faster
response times and increasingly fluent means to access more content than ever in the history of
telecommunications.
 Along with the development of the standards, the commercial solutions keep appearing for our
selection.

MSBTE QUE. Classify mobile generations. (Winter-2019)

Types of Mobile Generations: 1G, 2G, 3G, 4G, 5G

3.7.1 1G: Analog Cellular Networks (1970-1984)


 G or (1-G) refers to the first generation of wireless telephone technology (mobile telecommunications).
These are the analog telecommunications standards that were introduced in 1979 and the early to mid-
1980s and continued until being replaced by 2G digital telecommunications.
 The main difference between the two mobile telephone systems (1G and 2G), is that the radio signals
used by 1G network are analog, while 2G networks are digital.
 Circuit switching
 Frequency band 824-894 MHz
 Speed 2.4 kbps
 Application: Voice or message service

3.7.2 2G (1990)
 In the 1990s, the „second generation‟ (2G) mobile phone systems emerged, primarily using the GSM
standard.
 These 2G phone systems differed from the previous generation in their use of digital transmission
instead of analog transmission, and also by the introduction of advanced and fast phone-to-network
signaling.
 The rise in mobile phone usage as a result of 2G was explosive and this era also saw the advent of
prepaid mobile phones.
 The second generation introduced a new variant to communication, as SMS text messaging became
possible, initially on GSM networks and eventually on all digital networks.
 Picture messages and MMS (Multimedia Message Service) were used too.
 Soon SMS became the communication method of preference for the youth.
 Today in many advanced markets the general public prefers sending text messages to placing voice
calls.
 2G (or 2-G) provides three primary benefits over their predecessors: phone conversations are digitally
encrypted
 Circuit or packet switched
 Frequency band 850-1900 MHz
 Speed- 9.6 kbps
 Application: Digital voice, data & SMS

3.7.3 3G: High speed IP data networks (2001)


 3G technology provides an information transfer rate of at least 200 kbit/s.
 Later 3G releases, often denoted 3.5G and 3.75G, also provide mobile broadband access of
several Mbit/s to smartphones and mobile modems in laptop computers.
 This ensures it can be applied to wireless voice telephony, mobile Internet access, fixed wireless
Internet access, video calls and mobile TV technologies.
 The first 3G networks were introduced in 1998 and fourth generation 4G networks in 2008.

12
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

 3.5G is a grouping of disparate mobile telephony and data technologies designed to provide better
performance than 3G systems, as an interim step towards the deployment of full 4G capability.
 Core network PSTN
 Circuit or packet switched
 Frequency band 1.6 -2.5 GHz
 Speed 2 mbps
 Application: High speed data, voice, video

3.7.4 4G: Growth of mobile broadband (2010)


 Consequently, the industry began looking to data-optimized 4th-generation technologies, with the
promise of speed improvements up to 10-fold over existing 3G technologies.
 It is basically the extension in the 3G technology with more bandwidth and services offers in the 3G.
 The expectation for the 4G technology is basically the high quality audio/video streaming over end to
end Internet Protocol.
 The first two commercially available technologies billed as 4G were the WiMAX standard and the LTE
standard.
 One of the main ways in which 4G differed technologically from 3G was in its elimination of circuit
switching, instead employing an all-IP network.
 Thus, 4G ushered in a treatment of voice calls just like any other type of streaming audio media,
utilizing packet switching over internet, LAN or WAN networks via VoIP.
 Potential and current applications include amended mobile web access, IP telephony, gaming
services, high-definition mobile TV, video conferencing, 3D television, and cloud computing.
 Packet switched
 Frequency band 2 -8 GHz
 Speed 50 mbps
 Application: Dynamic information access

3.7.5 5G (2020)
 5G is a generation currently under development.
 It denotes the next major phase of mobile telecommunications standards beyond the current 4G/IMT-
Advanced standards.
 Next Generation Mobile Networks Alliance feel that 5G should be rolled out by 2020 to meet business
and consumer demands.
 In addition to simply providing faster speeds, they predict that 5G networks will also need to meet the
needs of new use-cases such as the Internet of Things as well as broadcast-like services and lifeline
communications in times of disaster.
 Core network internet
 Packet switched
 Frequency band 15 GHz
 Speed > 1 gbps
 Application: Interactive multimedia, VoIP, VR, IoT
 NGMN Alliance or Next Generation Mobile Networks Alliance define 5G network requirements as:
 Data rates of several tens of Mb/s should be supported for tens of thousands of users.
 1 Gbit/s to be offered, simultaneously to tens of workers on the same office floor.
 Several hundreds of thousands of simultaneous connections to be supported for massive sensor
deployments.
 Spectral efficiency should be significantly enhanced compared to 4G.
 Coverage should be improved.
 Signaling efficiency enhanced.
 Latency should be significantly reduced compared to LTE.

13
Chapter 3 Error Detection, Correction & Wireless Communication Unit 3

MSBTE Asked
Summer-2015
1) Explain in brief the functioning of Bluetooth.
(Diagram 1 mark, explanation 3 marks) (Refer Section 3.6)

Summer-2016
(1) Draw the Bluetooth architecture and describe its working.
(Piconet - 2 marks; Scatternet - 2 marks) (Refer Section 3.6)

Winter-2016
1) Describe the architecture of bluetooth technology.
(Each architecture: 2 marks) (Refer Section 3.6)

Summer-2017
1) With neat diagram explain the ESS architecture of IEEE 802.11. 4M
(Diagram: 2 marks, Explanation :2 marks) (Refer Section 3.5.1)

Summer-2019
1) State types of Errors 2M (Refer Section 3.1)
2) List IEEE 802 X standards for networks 2M (Refer Section 3.4)
3) Describe various IEEE standards for network topologies. 4M (Refer Section 3.4)

Winter-2019
1) Compare LRC and CRC. (Refer Section 3.1)
2) Explain various IEEE communication standards. (Refer Section 3.4)
3) With neat diagram explain the ESS architecture of IEEE 802.11 (Refer Section 3.5.1)
4) Describe Bluetooth architecture technologies. (Refer Section 3.6)
5) Classify mobile generations. (Refer Section 3.7)

14

You might also like