You are on page 1of 66

Unit 3 :Error Detection, Correction and Wireless

Communication (Total Marks-12)


• Unit Outcomes (UOs) (in cognitive domain):
1. Explain working of the given error detection and correction method.
2. Explain features of the given IEEE communication standard.
3. Explain characteristics of the given layer in IEEE 802 11 architecture.
4. Compare the specified generations of mobile telephone system on the given
parameter.
5. Explain with sketches the process of creating Bluetooth environment using the given
architecture.
• Sub Points:
3.1Types of Errors: Single Bit Error and Burst Error, Redundancy
3.2 Error Detection: Longitudinal Redundancy Check(LRC),Vertical Redundancy
Check(VRC),Cyclic Redundancy Check(CRC)Forward
3 3 Error Correction: Forward error Correction
3.4IEEE standards: 802 1, 802 2, 802 3, 802 4, 802 5
3.5 Wireless LANs: 802 11 Architecture, MAC Sub layer, Addressing Mechanism
3.6 Bluetooth Architecture: Piconet, Scatternet
3.7 Mobile Generations: 1G, 2G, 3G, 4G and 5G
Assignment No.3
1) What is error? Enlist different types of errors.
2) Write a note on checksum error detection.
3)Explain the VRC, CRC & LRC techniques.
4)Write a short note on physical layer specifications of IEEE
802.11.
5)With neat diagram explain the ESS architecture & BSS architecture
of IEEE 802.11
6)Explain hidden station problem and exposed station problem.
7)Explain address mechanism of wireless LAN 802.11
8) Describe the architecture of Bluetooth technology.
9)Write a short note on MAC layer specification for IEEE 802.11
10) Explain mobile generation in brief.
About title of the chapter
Error Detection, correction &wireless
communication.
Errors detection in transmitted data &
correcting these error.
As there is wired & wireless medium is there
for transmission of data, now a days wireless
medium is also widely used for communication
Central Idea of the Chapter
In this chapter there are different data
transmission errors detection & correcting
types are discussed. So that data can be
transferred error free.
Also in this chapter different IEEE standards
are discussed for wireless communication &
mobile generation are also discussed.
Importance of the chapter
This chapter is included in the syllabus
because different error detection & correction
methods are discussed in this chapter which
are necessary for integrity of data transmitted.
Also student will get knowledge about
different IEEE standards of wireless
communication & different mobile
generations.
3.1Types of Errors: Single Bit Error and Burst Error

Basic concepts
• Networks must be able to transfer data from one device to another
with complete accuracy.
• Data can be corrupted during transmission.
• For reliable communication, errors must be detected and corrected.
• Error detection and correction are implemented either at the data
link layer or the transport layer of the OSI model.
Types of Errors
1) Single-bit error
• Single bit errors are the least likely type of errors in serial data
transmission because the noise must have a very short duration
which is very rare.
• However this kind of errors can happen in parallel transmission.
Example:
• If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1
μs.
• For a single-bit error to occur, the noise must have a duration of
only 1 μs, which is very rare.
2) Multiple-bit error
If there is change in two or more bits of data sequence of
transmitter to receiver, it is called “Multiple bit error”.
This type of error occurs in both serial type and parallel
type data communication networks.
3)Burst error
• The term burst error means that two or more bits in the data unit
have changed from 1 to 0 or from 0 to 1.
• Burst errors does not necessarily mean that the errors occur in
consecutive bits, the length of the burst is measured from the first
corrupted bit to the last corrupted bit. Some bits in between may
not have been corrupted.
• Burst error is most likely to happen in serial transmission since
the duration of noise is normally longer than the duration of a bit.
• The number of bits affected depends on the data rate and duration
of noise.
Example:
• If data is sent at rate = 1Kbps then a noise of 1/100 sec can affect 10 bits.
(1/100*1000)

• If same data is sent at rate = 1Mbps then a noise of 1/100 sec can affect 10,000
bits.(1/100*106)
3.2 Error Detection: Longitudinal Redundancy Check(LRC),
Vertical Redundancy Check(VRC),Cyclic Redundancy
Check(CRC)Forward

Error Detection:
Error detection means to decide whether the received data is correct
or not without having a copy of the original message.

Error detection uses the concept of redundancy, which means


adding extra bits for detecting errors at the destination.
Redundancy
 Four types of redundancy checks are used
in data communications
1) Vertical Redundancy Check
VRC
Working

• It can detect single bit error


• It can detect burst errors only if the total
number of errors is odd.
2) Longitudinal Redundancy Check
LRC
working
• LCR increases the likelihood of detecting
burst errors.
• If two bits in one data units are damaged and
two bits in exactly the same positions in
another data unit are also damaged, the LRC
checker will not detect an error.
VRC and LRC
3) Cyclic Redundancy Check
CRC
Working :Cyclic Redundancy Check
• Given a k-bit frame or message, the transmitter
generates an n-bit sequence, known as a frame
check sequence (FCS), so that the resulting frame,
consisting of (k+n) bits, is exactly divisible by some
predetermined number.

• The receiver then divides the incoming frame by the


same number and, if there is no remainder, assumes
that there was no error.
Beyond the syllabus…..
Checksum
At the sender
• The unit is divided into k sections, each of n
bits.
• All sections are added together using one’s
complement to get the sum.
• The sum is complemented and becomes the
checksum.
• The checksum is sent with the data
At the receiver

• The unit is divided into k sections, each of n


bits.
• All sections are added together using one’s
complement to get the sum.
• The sum is complemented.
• If the result is zero, the data are accepted:
otherwise, they are rejected.
Working
• The checksum detects all errors involving an
odd number of bits.
• It detects most errors involving an even number
of bits.
• If one or more bits of a segment are damaged
and the corresponding bit or bits of opposite
value in a second segment are also damaged, the
sums of those columns will not change and the
receiver will not detect a problem.
3 3 Error Correction: Forward error Correction

Error Correction
It can be handled in two ways:
• Receiver can have the sender retransmit the
entire data unit.
• The receiver can use an error-correcting code,
which automatically corrects certain errors.
Forward error correction
• Forward error correction An error-correcting code
(ECC) or forward error correction (FEC) code is
redundant data that is added to the message on the
sender side.
• If the number of errors is within the capability of the
code being used, the receiver can use the extra
information to discover the locations of the errors
and correct them.
• Since the receiver does not have to ask the sender for
retransmission of the data, a back-channel is not
necessary in forward error correction, so it is suitable
for simplex communication such as broadcasting.
• Error correcting codes are used in computer data
storage, for example CDs, DVDs and in dynamic RAM.
• It is also used in digital transmission, especially wireless
communication, since wireless communication without
FEC often would suffer from packet-error rates close to
100%, and conventional automatic repeat request error
control would yield a very low goodput.
Single-bit error correction
• To correct an error, the receiver reverses the value
of the altered bit.
• To do so, it must know which bit is in error.
• Number of redundancy bits needed
• Let data bits = m
• Redundancy bits = r
Total message sent = m+r
• The value of r must satisfy the following relation:
• 2r ≥ m+r+1
3.4IEEE standards: 802 1, 802 2, 802 3, 802 4, 802 5
There are several Standards, but most common ones are:
• ISO (International organization of Standardization)
• IEEE (Institute of Electrical and Electronic Engineers)
IEEE:
• The institute of electrical and electronic Engineers (IEEE)
publishes several widely accepted LANrecommended
standards.
• These standards, collectively known as IEEE.Various IEEE
802 standards are:
• IEEE 802.1 High Level Interface
• IEEE 802.2 Logical Link Control(LLC)
• IEEE 802.3 Ethernet
• IEEE 802.4 Token Bus
• IEEE 802.5 Token Ring
• IEEE 802.6 Metropolitan Area Networks
• IEEE 802.7 Broadband LANs
• IEEE 802.8 Fiber Optic LANS
• IEEE 802.9 Integrated Data and Voice Network
• IEEE 802.10 Security
• IEEE 802.11 Wireless Network
802.1 (Bridging)
802.1 (Bridging):
• Overall picture of LAN and connectivity
• addressing network management
• Standards for Bridges.
802.2 (LLC)
• Logical Link Control
• Communication of packets from one device to another
device.
• It deals with communication.
802.3(Ethernet)
Ethernet Mainly
• CSMA/CD- (Carrier sense multiple
access/collision detection.)
• Speed of 10MB/s
IEEE 802.4 Token Bus
Token Bus (IEEE 802.4) is a standard for implementing
token ring over the virtual ring in LANs.
The physical media has a bus or a tree topology and uses
coaxial cables.
A virtual ring is created with the nodes/stations and the
token is passed from one node to the next in a sequence
along this virtual ring.
Each node knows the address of its preceding station and
its succeeding station.
A station can only transmit data when it has the
token.
The working principle of the token bus is similar
to Token Ring.
IEEE 802.5 Token Ring

• Token Ring
• Speed of 4Mbps or 16Mbps.
3.5 Wireless LANs: 802 11 Architecture, MAC Sub
layer, Addressing Mechanism
IEEE has defined the specifications for a wireless LAN,
called IEEE 802.11, which covers the physical and data link
layers.
Architecture:
The standard defines two kinds of services:
1. The basic service set (BSS)
2. The extended service set (ESS)
• IEEE 802.11 defines the basic service set (BSS) as the
building block of a wireless LAN.
1) The basic service set (BSS)
• A basic service set is made of stationary or mobile wireless
stations and an optional central base station, known as the
access point (AP).
• The BSS without an AP is a stand-alone network and
cannot send data to other BSSs. It is called an ad hoc
architecture.
• In this architecture, stations can form a network without
the need of an AP; they can locate one another and agree
to be part of a BSS.
• A BSS with an AP is sometimes referred to as an
infrastructure network.

Fig.:Basic Service Sets (Bsss)


2) Extended Service Set:
• An extended service set (ESS) is made up of two or
more BSSs with APs.
• In this case, the BSSs are connected through a
distribution system, which is usually a wired LAN.
• The distribution system connects the APs in the BSSs.
IEEE 802.11 does not restrict the distribution system;
it can be any IEEE LAN such as an Ethernet.
• Note that the extended service set uses two types of
stations: mobile and stationary.
• The mobile stations are normal stations inside a BSS.
• The stationary stations are AP stations that are part of
a wired LAN.
When BSSs are connected, the stations within reach of one
another can communicate without the use of an AP.
However, communication between two stations in two different
BSSs usually occurs via two APs.
MAC Sublayer:
IEEE 802.11 defines two MAC sublayers: the distributed
coordination function (DCF) and point coordination
function (PCF).

Figure: MAC layers in IEEE 802.11 standard


Addressing Mechanism:
The IEEE 802.11 addressing mechanism specifies four
cases, defined by the value of the two flags in the FC field,
To DS and From DS.
Each flag can be either 0 or 1, resulting in four different
situations.
The interpretation of the four addresses (address 1 to
address 4) in the MAC frame depends on the value of
these flags.
1)Hidden and Exposed Station Problems:

Figure: Hidden station problem


Above Figure shows an example of the hidden station problem. Station B has a
transmission range shown by the left oval (sphere in space); every station in this
range can hear any signal transmitted by station B. Station C has a transmission
range shown by the right oval (sphere in space); every station located in this
range can hear any signal transmitted by C. Station C is outside the transmission
range of B; likewise, station B is outside the transmission range of C. Station A,
however, is in the area covered by both Band C; it can hear any signal
transmitted by B or C.
2) Exposed Station Problem:

Figure: Exposed station problem


In this problem a station refrains from using a channel when it is, in
fact, available.
In the above figure, station A is transmitting to station B. Station C
has some data to send to station D, which can be sent without
interfering with the transmission from A to B. However, station C is
exposed to transmission from A; it hears what A is sending and thus
refrains from sending. In other words, C is too conservative and
wastes the capacity of the channel.
3.6 Bluetooth Architecture: Piconet, Scatternet
Why the name Bluetooth?
The name was adopted as a tribute to the tenth-century
Viking king Harald Blatand who peacefully united
Denmark and Norway .
Harald liked to eat Blueberries, which gave his teeth the
coloration that lead to the nickname Bluetooth.
What is Bluetooth?
Ans. Bluetooth is a method for data communication that
uses short range radio links to replace cables between
computers and their connected units.
• Bluetooth is wireless high speed data transfer
technology.
• Bluetooth Wireless Technology (BWT) was developed
in 1994 at Ericsson in Sweden.
• Ericsson on the advent of BWT conceptualized a Radio
Technology through a Wireless Personal Area Network
(WPAN).
• Group called Bluetooth Special Interest Group (SIG) was
formed in 1998 to develop the standard of IEEE 802.15.
• This specification standarized the Bluetooth technology
world wide
Bluetooth Specifications
• Developed by : J.Haarsten and S.Mattisson in Sweden
• Standard : IEEE 802.15
• ISM band frequency : 2.4 GHz
• Range : 10 – 100 meters.
• Channel Band width : 1 Mbps
Bluetooth Topology
• Depending upon the type of connection established
between the various bluetooth devices, there are two
main topologies :
• 1. Piconet Topology
• 2. Scatternet topology.
To any topology,there are two prime components :
1. Master Device
2. Slave Device.
Piconet topology :
• Piconet. A collection of devices connected via Bluetooth
technology.
• A Piconet consists of up to 8 BWT(Bluetooth Wireless Technology)
enabled devices.
• When piconet is established , one device sets up frequency hopping
pattern and other devices synchronize their signals to same pattern.
• The device that sets the frequency hopping pattern is called master
device.
• The devices that get synchronized are called slave
devices.
• Each piconet has different frequency pattern.
• Each piconet has 1 master for establishment of
piconet and up to 7 slave devices.
• Master’s Bluetooth address is used for defining
frequency hopping sequence.
• Slave devices use Master’s clock to synchronize their
clocks so as to hop simultaneously.
• For establishing PICONET , other bluetooth devices
are discovered by an inquiry procedure.
Scatternet Topology:
• Scatternet consists of several piconets connected by devices participating in
multiple piconets.
• Master Node − It is the primary station in each piconet that controls the
communication within that piconet.
• Slave Node − A slave is a secondary station in a piconet that communicates
with the master for data transfer. There can be a maximum of 7 slaves in a
piconet.
• Bridge Node − It is a node in a piconet, whether a master or a slave, that acts
as a slave in another piconet. A bridge connects the individual piconets to form
the scatternet.
Advantages and Disadvantages Of Bluetooth :
Advantages:
• Low cost
• Low power consumption
• Wireless technology
• Low maintenance cost
• Easy link establishment
• Reasonable throughput
Disadvantages :
• Short range (10 – 100m)
• Short life higher throughput.
Bluetooth Based Devices
• Bluetooth In Electronics
Bluetooth In Medical Devices

With the help of these divices various data can be


collected and can be sent directly to the computer to
keep a daily track of patients heart beat,blood sugar
levels etc
3.7 Mobile Generations: 1G, 2G, 3G, 4G and 5G
1G TECHNOLOGY
1G refers to the first generation of wireless telephone technology, mobile
telecommunications which was first introduced in 1980s and completed
in early 1990s.
It's Speed was upto 2.4kbps.
It allows the voice calls in 1 country.
A MPS was first launched in USA in 1G mobile systems.
• Poor Voice Quality
• Poor Battery life
• Large Phone Size
• No Security
• Limited Capacity
• Poor Hand off Reliability
2G TECHNOLOGY
• 2G technology refers to the 2nd generation which is based on
GSM(Global System for Mobile communication).
• It was launched in Finland in the year 1991.
• 2G network use digital signals.
• It’s data speed was upto 64kbps.
• Features Includes:
• It enables services such as text messages, picture messages
and MMS (multi media message).
• It provides better quality and capacity .
Drawbacks Of 2G
• 2G requires strong digital signals to help mobile phones work.
• These systems are unable to handle complex data such as Videos.
WIRELESS MODELS OF 1G & 2G
2.5G TECHNOLOGY
2.5G is a technology between the second (2G) and third (3G) generation
of mobile telephony.
2.5G is sometimes described as 2G Cellular Technology combined with
GPRS.
Features Includes:
• Phone Calls
• Send/Receive E-mail Messages
• Web Browsing
• Speed : 64-144 kbps
• Camera Phones
• Take a time of 6-9 mins. to download a 3 mins.Mp3 song
3G TECHNOLOGY
3G technology refer to third generation which was introduced in year
2000s.
Data Transmission speed increased from 144kbps- 2Mbps.
Typically called Smart Phones and features increased its bandwidth
and data transfer rates to accommodate web-based applications and
audio and video files.
FEATURES OF 3G TECHNOLOGY
• Providing Faster Communication
• Send/Receive Large Email Messages
• High Speed Web / More Security Video
Conferencing / 3D Gaming
• TV Streaming/ Mobile TV/ Phone Calls
• Large Capacities and Broadband Capabilities
• 11 sec – 1.5 min. time to download a 3 min Mp3 song.
DRAWBACKS OF 3G TECHNOLOGY
Expensive fees for 3G Licenses Services
It was challenge to build the infrastructure for 3G High Bandwidth
Requirement
Expensive 3G Phones.
Large Cell Phones
4G TECHNOLOGY
• 4G technology refer to or short name of fourth Generation which
was started from late 2000s.
• Capable of providing 100Mbps – 1Gbps speed.
• One of the basic term used to describe 4G is MAGIC.
• MAGIC: Mobile Multimedia Anytime Anywhere Global Mobility
Support Integrated Wireless Solution Customized Personal
Services Also known as Mobile Broadband Everywhere.
• The next generations of wireless technology that promises higher
data rates and expanded multimedia services.
• Capable to provide speed 100Mbps-1Gbps. High QOS and High
Security Provide any kind of service at any time as per user
requirements, anywhere.
Features Include:
• More Security
• High Speed
• High Capacity
• Low Cost Per-bit etc.
Drawbacks Of 4G
• Battery uses is more Hard to implement
• Need complicated hardware
• Expensive equipment required to implement next generation
network.
5G TECHNOLOGY
• 5G technology refer to short name of fifth Generation which was
started from late 2010s.
• Complete wireless communication with almost no limitations.
• It is highly supportable to WWWW (Wireless World Wide Web).
BENEFITS OF 5G TECHNOLOGY
• High Speed, High Capacity 5G technology providing large
broadcasting of data in Gbps
• Multi - Media Newspapers, watch T.V programs with the clarity as
to that of an HD Quality.
• Faster data transmission that of the previous generations.
• Large Phone Memory, Dialing Speed, clarity
in Audio/Video.
• Support interactive multimedia , voice, streaming video,
Internet and other.
• 5G is More Effective and More Attractive.
EVOLUTION OF 1G TO 5G TECHNOLOGY

You might also like