Professional Documents
Culture Documents
to interference and
network problems. The corrupted bits leads to spurious data being received by the destination and are called errors.
Types of Errors: Single bit error − In the received frame, only one bit has been corrupted, i.e. either changed from 0 to 1
or from 1 to 0. Multiple bits error − In the received frame, more than one bits are corrupted. Burst error − In the
received frame, more than one consecutive bits are corrupted.
Error Control: Error detection − Error detection involves checking whether any error has occurred or not. The number
of error bits and the type of error does not matter. Error correction − Error correction involves ascertaining the exact
number of bits that has been corrupted and the location of the corrupted bits. For both error detection and error
correction, the sender needs to send some additional bits along with the data bits. The receiver performs necessary
checks based upon the additional redundant bits. If it finds that the data is free from errors, it removes the redundant
bits before passing the message to the upper layers.
Error Detection Techniques:
Parity Check or Vertical Redundancy Check (VRC): The parity check
is done by adding an extra bit, called parity bit to the data to make
a number of 1s either even in case of even parity or odd in case of
odd parity. While creating a frame, the sender counts the number
of 1s in it and adds the parity bit in the following way. 1) In case of
even parity: If a number of 1s is even then parity bit value is 0. If
the number of 1s is odd then parity bit value is 1. 2) In case of odd
parity: If a number of 1s is odd then parity bit value is 0. If a number
of 1s is even then parity bit value
is 1. On receiving a frame, the receiver counts the number of 1s in it. In case of even parity check, if the count of 1s is
even, the frame is accepted, otherwise, it is
rejected. A similar rule is adopted for odd parity
check. The parity check is suitable for single bit
error detection only.
Longitudinal Redundancy Check (LRC) is also
known as 2-D parity check. In this method, data
which the user want to send is organized into
tables of rows and columns. A block of bit is
divided into table or matrix of rows and columns.
In order to detect an error, a redundant bit is
added to the whole block and this block is transmitted to receiver. The receiver uses this redundant row to detect
error. After checking the data for errors, receiver accepts the data and discards the redundant row of bits. Advantage:
LRC is used to detect burst errors. Disadvantage: The
main problem with LRC is that, it is not able to detect
error if two bits in a data unit are damaged and two bits
in exactly the same position in other data unit are also
damaged.
Frequency Division Multiple Access (FDMA) – The available bandwidth is divided into equal bands so that each
station can be allocated its own band. Guard bands are also added so that no two bands overlap to avoid
crosstalk and noise.
Time Division Multiple Access (TDMA) – In this, the bandwidth is shared between multiple stations. To avoid
collision time is divided into slots and stations are allotted these slots to transmit data. However there is a
overhead of synchronization as each station needs to know its time slot. This is resolved by adding
synchronization bits to each slot. Another issue with TDMA is propagation delay which is resolved by addition of
guard bands.
Code Division Multiple Access (CDMA) – One channel carries all transmissions simultaneously. There is neither
division of bandwidth nor division of time. For example, if there are many people in a room all speaking at the
same time, then also perfect reception of data is possible if only two person speak the same language. Similarly,
data from different stations can be transmitted simultaneously in different code languages.
Orthogonal Frequency Division Multiple Access (OFDMA) – In OFDMA the available bandwidth is divided into
small subcarriers in order to increase the overall performance, Now the data is transmitted through these small
subcarriers. it is widely used in the 5G technology. Advantages: 1) Increase in efficiency. 2) High data rates. 3)
Good for multimedia traffic. Disadvantages: 1) Complex to implement 2) High peak to power ratio
Spatial Division Multiple Access (SDMA) – SDMA uses multiple antennas at the transmitter and receiver to
separate the signals of multiple users that are located in different spatial directions. This technique is commonly
used in MIMO (Multiple-Input, Multiple-Output) wireless communication systems. Advantages: 1) Frequency
band uses effectively. 2) The overall signal quality will be improved. 3) The overall data rate will be increased
Disadvantages: 1) It is complex to implement. 2) It require the accurate information about the channel
FDDI stands for Fiber Distributed Data Interface. It is a set of ANSI and ISO guidelines for information
transmission on fiber-optic lines in Local Area Network (LAN) that can expand in run upto 200 km (124 miles).
The FDDI convention is based on the token ring protocol. In expansion to being expansive geographically, an
FDDI neighborhood region arranges can support thousands of clients. FDDI is habitually utilized on the spine for
a Wide Area Network(WAN). An FDDI network contains two token rings, one for possible backup in case the
essential ring falls flat. The primary ring offers up to 100 Mbps capacity. In case the secondary ring isn’t required
for backup, it can also carry information, amplifying capacity to 200 Mbps. The single ring can amplify the most
extreme remove; a double ring can expand 100 km (62 miles).
Characteristics of FDDI:
1) FDDI gives 100 Mbps of information throughput. 2) FDDI incorporates two interfaces.
3) It is utilized to associate the equipment to the ring over long distances. 4) FDDI could be a LAN with Station
Management. 5) Allows all stations to have broken even with the sum of time to transmit information.
5) FDDI defines two classes of traffic viz. synchronous and asynchronous.
Advantages of FDDI: 1) Fiber optic cables transmit signals over more noteworthy separations of approximately
200 km. 2) It is conceivable to supply the need to the work stations associated within the chain. Consequently,
based on the prerequisite a few stations are bypassed to supply speedier benefit to the rest. 3) FDDI
employments different tokens to make strides organize speed. 4) It offers a higher transmission capacity (up to
250 Gbps). Thus, it can handle information rates up to 100 Mbps. 5) It offers tall security because it is
troublesome to spy on the fiber-optic link. 6) Fiber optic cable does not break as effectively as other sorts of
cables.
Disadvantages of FDDI: 1) FDDI is complex. Thus establishment and support require an incredible bargain of
expertise. 2) FDDI is expensive.
ISDN stands for Integrated Services Digital Network. It is used to bridge the Central Office's local loop and the
premise connection (home). ISDN uses the existing wiring so that no new cabling is required. It is a digital service that
restores the analog plain old telephone set. An Integrated Digital Network (ISDN) is a network in which digital switching
connections are used to transmit digital signals. Integrated Services refers to ISDNs ability to deliver two simultaneous
connections, in any merging of data, voice, video and fax, over an individual line. Multiple devices can be connected to
the line and sent as needed. An ISDN is a network, in general evolving from telephony ISDN, which provides end-to-end
digital connectivity to provide a broad range of services such as voice and non-voice services, to which customers have
to create by a limited set of standard multipurpose user network interfaces.
Advantages: 1) ISDN is a mature technology, and it has been around since the late 1980s. It has been tried, tested and
works. 2) A worldwide set of standards governs it. 3) It offers symmetrical transfer rates− the transmit rate is the same
as the receiving rate. 3) It is a competitive price compared to other technologies.
Disadvantages: 1) An external power supply is required. The telecommunication doesn't supply power for ISDN lines. If
the power fails, the mobile phones won't work.
2) Unique digital phones are necessary or a terminal adapter to talk to the existing plain old telephone set devices.
3) It is costly to upgrade a central office switch ($500,000+) to ISDN. 4) If the ISDN fails-the phone fails.
Hamming Code: Hamming code is a block code that is capable of detecting up to two simultaneous bit errors and
correcting single-bit errors. It was developed by R.W. Hamming for error correction.
In this coding method, the source encodes the message by inserting redundant bits within the message. These
redundant bits are extra bits that are generated and inserted at specific positions in the message itself to enable error
detection and correction. When the destination receives this message, it performs recalculations to detect errors and
find the bit position that has error.
Encoding a message by Hamming Code: The procedure used by the sender to encode the message encompasses the
following steps −
Step 1 − Calculation of the number of redundant bits.
Step 2 − Positioning the redundant bits.
Step 3 − Calculating the values of each redundant bit.
Decoding a message in Hamming Code: Once the receiver gets an incoming message, it performs re-calculations to
detect errors and correct them. The steps for recalculation are −
Step 1 − Calculation of the number of redundant bits.
Step 2 − Positioning the redundant bits.
Step 3 − Parity checking.
Step 4 − Error detection and correction
Linear Block Codes: It is a simple error control coding technique used for error detection and correction.
Information data is partitioned into blocks of length K pieces for example Information word.
Every information word is then coded into a block of length n bits called a codeword. Here, n > k
Also, n = k + r, where ‘r ‘ denotes the parity bits or check bits added to every information word.
Vector documentation is utilized for the Data word and Codeword: message m = (m1, m2 mn ),
Codeword c = (c1, c2 cn).
Cyclic Codes
The cyclic property of code words is that any cyclic-shift of a code word is also a code word. Cyclic codes follow
this cyclic property.
Cyclic codes are used for error correction. They are mainly used to correct double errors and burst errors.
Hence, these are a few error correcting codes, which are to be detected at the receiver. These codes prevent the
errors from getting introduced and disturb the communication. They also prevent the signal from getting tapped
by unwanted receivers.