Professional Documents
Culture Documents
(i) User mobility – Has access to the same or similar telecommunication services at different places i.e ; the user can
(ii) Device portability – The communication device moves (with or without a user)
Eg : Mobile phone system ; System itself handles the device from one radio transmitter to
(i) Fixed and wired – Describes the typical desktop computer in an office
(ii) Mobile and wired – Eg : Users carry the laptop from one place to other, reconnecting to the company’s network
(ii) Interference
(iii) Bandwidth
. Medium Access Control comprises all mechanisms that regulate access to a medium using SDM, TDM, FDM, or
CDM
. MAC belongs to layer 2 Data link layer of the OSI Reference Model
. Transmission range of A reaches B but not C and the transmission range of C reaches B but not A
. A starts sending to B, C does not receive this transmission. C also wants to send something to B and senses the
medium.
. C also starts sending causing a collision at B. But A cannot detect this collision at B and continues with its
transmission.
. Hidden terminals may cause collisions but the next effect only causes unnecessary delay
. Consider the situation that B sends something to A and C wants to transmit data to some other mobile phone outside
. C postpones its transmission until it detects the medium as being idle again.
. As the signal strength decreases proportionally to the square of the distance, B’s signal drowns out A’s signal.
. Precise power control is needed to receive all senders with the same strength at a receiver.
. Single bit error – Isolated error condition that alters one bit but does not affect nearby bits
. Burst error – First and last bits and any number of intermediate bits are received in this error.
. Assume that data are transmitted as one or more contiguous sequence of bits, called Frames.
(i) Pb : Probability that a bit is received in error also known as Bit Error Rate (BER)
(iii) P2 : Probability that, with an error detecting algorithm in use, a frame arrives with one or more undetected errors
. First consider the case in which no means are taken to detect errors
. Therefore, P3 = 0
. To express the remaining probabilities, assume that P b is constant and independent for each bit
P 1 = (1- Pb)F
P 2 = 1 – P1
where, F = Number of bits per frame
. Probability that a frame arrives with no bit errors decreases when the probability of a single bit error increases
. Probability that a frame arrives with no bit errors decreases with increasing frame length.
. For a given frame of bits, additional bits that constitute an error detecting code are added by the transmitter.
. For a data block of k bits, the error detecting algorithm yields an error detecting code of (n-k) bits, where (n-k) < k
. The error detecting code also referred to as check bits, is appended to the data block to produce a frame of n bits
which is then transmitted.
. The receiver separates the incoming frame into the k bits of data and (n-k) bits of the error detecting code
. The receiver performs the same error detecting calculation on the data bits and compares with the incoming error
detecting code.
. Generally,
(i) Even parity is used for synchronous transmission
. Given a k-bit block of bits, or message, the transmitter generates an (n-k) bit sequence, known as a
Frame Check Sequence (FCS)
. The receiver then divides the incoming frame by that number, and if there was no remainder, assumes there was no
error.
(ii) Polynomials
(ii) Binary subtraction with no carries, which is just the XOR operation.
. For eg :
1
. Divide by 2 n-k D by P,
2
.>
. As the division is Modulo 2, the remainder is always 1 bit shorter than the divisor.
. Divide the equation by P so that we can see whether there is a remainder or not.
.
Department of CSE,GIT EID 362, Mobile Computing
. Here there is no remainder.
. This is another method to express all values as variables in a dummy variable X with binary coefficients
D (X) = X 5 + X 4 + X + 1
. For P = 11001,
P (X) = X 4 + X 3 + 1
. It can be shown that all of the following errors are not divisible by a suitably chosen P(X) and hence they are
detectable.
. All single bit errors , if P(X) has more than one non zero term
. All double bit errors, as long as P(X) is a special type of polynomial, called a primitive polynomial, with maximum
. Any burst error for which the length of the burst is <= n-k (or) length of the FCS
. A fraction of error bursts of length n- k +1 ; the fraction equals 1- 2 - (n-k-1)
. CRC-12 system is used for transmission of streams of 6-bit characters and generates 12 bit FCS (Frame Check
Sequence).
. CRC-16 & CRC-CCITT systems are used for transmission of streams of 8-bit characters and generates 16 bit FCS
. CRC process can be implemented as a dividing circuit consisting of XOR gates & a shift register
. The shift register is a string of 1 bit storage device
. Each device has an output line, which indicates the value currently stored, and an input line.
. At discrete time instants, known as clock times, the value in the storage device is replaced by the value indicated
(i) Register contains (n-k) bits equal to the length of the FCS
Data D : 1010001101
Divisor P : 110101
Then ,
. The message is entered, one bit at a time starting with the MSB
. The Truth table shows the step-by-step operation as the input is applied one bit at a time
. After the last data bit is processed, the shift register contains the remainder as FCS
. As soon as the last data bit is provided to the shift register, both switches are fed to B position
(i) All of the XOR gates become simple pass-throughs , i.e ; no bits are changed
(ii) As the shifting process continues, the 5 CRC bits are output
(i) Data link control protocols such as HDLC (High level Data Link Control)
. However, correction of errors using an error detecting code, requires that block of data be retransmitted
. For wireless applications, this process does not hold good for the following reasons,
(i) BER on a wireless link can be quite high, resulting in a large number of retransmissions
(ii) In satellite links, Propagation delay > Transmission time of a single frame. This results in an inefficient system.
with a long data link, an error in a single frame necessitates retransmitting many frames
Instead, it is desirable to enable the receiver to correct errors in an incoming transmission on the basis of bits in that
transmission.
. During transmission, the signal may subject to impairments, which may produce bit errors in the signal
. At the receiver, the signal is demodulated to produce a bit string that is similar to the original code word but may
. This block is passed through FEC decoder with one of the four possible outcomes.
(i)
(ii)
(iv)
. In this, we use a error correcting code known as Block error correcting code
. The Hamming distance d (v1,v2) between two n-bit binary sequences v1 and v2 is the number of bits in which v1
and v2 disagree.
. Problem :
..
. This is NOT a valid code word. Therefore, the receiver will detect an error.
. If an invalid code word is received , then the valid code word that is closest to it i.e; Minimum distance is selected.
. There are 25 = 32 possible code words out of which 4 are valid, leaving 28 invalid code words
.
Department of CSE,GIT EID 362, Mobile Computing
.
. So, here the error is detected but not corrected as the error is of 2 bits.
. This code is capable of correcting all single bit errors but cannot correct double bit errors.
Properties :
. With an (n , k) block code , there are 2k valid code words out of a total of 2n possible code words
Redundancy = (n-k) / k
. If we are concerned only with error detection and not error correction , then the number of errors, ‘t’ that can be
detected satisfies,
(i) For a given values of n and k, we would like the largest possible value of dmin
(ii) The code should be relatively easy to encode and decode , requiring minimal memory and processing time
(iv) We would like the number of extra bits, (n-k), to be large , to reduce the error rate
. (iii) and (iv) objectives are in conflict and tradeoffs must be made
. Coding can be used to reduce the required value to achieve a given BER.
. A smaller BER is achieved for a given , and conversely, for a given BER, a smaller is required.
.
F Fig : How coding improves
system performance
(i) Topology
. Topology - Topology of a datalink refers to the physical arrangement of stations on a transmission medium
. Depending on the number of stations, the links are classified into 2 types,
. In a Half Duplex transmission, only one of two stations on a point - to - point link may transmit at a time.
. This mode is also referred to as Two way alternate suggestive of the fact that 2 stations must alternate
in transmitting.
. Eg : Terminal-to-computer interaction
. For Full Duplex transmission, two stations can simultaneously send and receive data from each other.
. This mode is also referred to as Two way simultaneous suggestive of the fact that 2 stations can simultaneously
transmit.
. It is possible to transmit digital signals simultaneously in both directions on a single transmission line using
Echo Cancellation.
. It provides functions such as Flow control, Error detection & Error control
. Flow control enables a receiver to regulate the flow of data from a sender
. Error control is achieved by retransmission of damaged frames that have not been acknowledged or for which
. HDLC (High-level data link control). It contains virtually all of the features found in other data link control
protocols
. When a data link control protocol is used, the transmission medium between systems is referred to as a Data link
(i) Frame Synchronization – Data are sent in blocks called Frames. The beginning and end of each frame
must be recognizable
(ii) Flow control – The sending station must not send frames at a rate faster than the receiving station
(iii) Error control – Bit errors introduced by the transmission system should be corrected
(iv) Addressing – On a shared link, such as LAN , the identity of two stations involved in a transmission must
be specified
(v) Control and data on same link - It is not desirable to have a separate physical path . The receiver must be able
. In the absence of Flow control, the receiver’s buffer may fill up and overflow while it is processing old data
. Transmission Time : The time it takes for a station to emit all of the bits of a frame onto the medium
. Propagation Time : The time it takes for a bit to traverse the link between source and destination
. A source entity transmits a Frame. After the destination entity receives a frame, it indicates its willingness to
. Therefore, the destination can stop the flow of data simply by withholding acknowledgment.
. Source will breakup a large block of data into smaller blocks and transmit the data in many frames because of the
following reasons,
(ii) The longer the frame, the more likely there will be an error and retransmission is to be done. Error will be detected
quickly incase of small frames, and therefore a small amount of frame can be retransmitted easily
(iii) On a shared medium such as LAN , it is not desirable to permit one station to occupy the medium for
an extended period thus causing long delays at the other sending stations
. With the use of multiple frames for a single message , the stop-and-wait control doesn’t work well.
where,
B Length of a link in bits V Velocity of Propagation in bps
where,
L Number of bits in the frame
. Frame is sufficiently long, that the first bits of the frame have arrived at the destination before the source has
. The sender completes the transmission of the entire frame before the leading bits of that frame arrive at the receiver
. In the figure, the first four indicates the process of transmitting a frame containing data & the last one shows the
. Therefore, for very high data rates , for very long distances between sender and receiver, stop-and-wait flow control
. To overcome this problem and to increase the efficiency , Sliding-Window Flow control is used.
Question :
.Consider a 200 m optical fiber link operating at 1Gbps.The velocity of propagation is 2 x 10 8 m/sec. Find Bit length ?
Answer :