Lecture Slides 03-October-2017

Slides:



Advertisements
Similar presentations
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Advertisements

Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
EIE325: Telecommunication TechnologiesMaciej J. Ogorza ł ek, PolyU, EIE Telecommunication Technologies Week 8 Flow Control Error Control.
William Stallings Data and Computer Communications 7th Edition
Data and Computer Communications
Error Detection and Correction
Transmission Errors Error Detection and Correction
Error Detection and Correction
Coding and Error Control
Lecture 9-10: Error Detection and Correction Anders Västberg Slides are a selection from the slides from chapter 8 from:
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
Error Detection and Correction
Wireless Networks Spring 2005 Coding and Error Control.
1/26 Chapter 6 Digital Data Communication Techniques.
Transmission Errors Error Detection and Correction
Coding and Error Control
Channel Coding and Error Control
Data Link Control Protocols
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
Coding and Error Control
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
ECS 152A 4. Communications Techniques. Asynchronous and Synchronous Transmission Timing problems require a mechanism to synchronize the transmitter and.
جلسه هشتم شبکه های کامپیوتری به نــــــــــــام خدا.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Cyclic Redundancy Check CRC Chapter CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword.
Lecture 3-2: Coding and Error Control (Cont.) ECE
1 Chapter 8. Coding and Error Control Wen-Shyang Hwang KUAS EE.
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
CHAPTER 3: DATA LINK CONTROL Flow control, Error detection – two dimensional parity checks, Internet checksum, CRC, Error control, Transmission efficiency.
Error Detection and Correction – Hamming Code
Data Communications and Networking
CIS : Data Link Control. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow Transmission.
Coding and Error Control
Hamming Distance & Hamming Code
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Powerpoint Templates Computer Communication & Network Week # 10.
Data and Computer Communications Digital Data Communications Techniques + Error Control+ Digital Data Communications Techniques + Error Control+Multiplexing.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lec # 15.
1 Wireless Networks Lecture 5 Error Detecting and Correcting Techniques (Part II) Dr. Ghalib A. Shah.
Coding and Error Control
Lecture 4 Error Detecting and Correcting Techniques Dr. Ghalib A. Shah
Lecture Slides 26-September-2017
Error Detection and Correction
CSE 5345 – Fundamentals of Wireless Networks
Chapter 9: Data Link Control
The Data Link Layer Supplementery Slides
Data Link Layer Flow Control.
Data Link Layer.
Error Detection and Correction
DATA COMMUNICATION AND NETWORKINGS
Advanced Computer Networks
CIS 321 Data Communications & Networking
Chap. 4 Data link layer 2.
Data Link Layer What does it do?
Part III Datalink Layer 10.
Digital data communication (Error control)
Chapter 10 Error Detection And Correction
Chapter 6.
Chapter 7 Error Detection and Correction
Transmission Errors Error Detection and Correction
Coding and Error Control
Wireless Mesh Networks
Error Detection and Correction
Error Detection and Correction
Transmission Errors Error Detection and Correction
Types of Errors Data transmission suffers unpredictable changes because of interference The interference can change the shape of the signal Single-bit.
Chapter 9: Data Link Control
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Lecture Slides 03-October-2017 TLEN 5830 Wireless Systems Lecture Slides 03-October-2017 Semester Lecture schedule Coding and Error Control

Additional reference materials Required Textbook: Antennas and Propagation for Wireless Communication Systems, by Simon R. Saunders and Alejandro Aragon-Zavala, ISBN 978-0-470-84879-1; March 2007 (2nd edition). Optional References: Wireless Communications and Networks, by William Stallings, ISBN 0-13-040864-6, 2002 (1st edition); Wireless Communication Networks and Systems, by Corey Beard & William Stallings (1st edition); all material copyright 2016 Wireless Communications Principles and Practice, by Theodore S. Rappaport, ISBN 0-13-042232-0 (2nd edition) Acknowledgements:

OSI 7-layer model

Coping with Data Transmission Errors Error detection codes Detects the presence of an error Automatic repeat request (ARQ) protocols Block of data with error is discarded Transmitter retransmits that block of data Error correction codes, or forward correction codes (FEC) Designed to detect and correct errors

Error Detection Probabilities Definitions Pb : Probability of single bit error (BER) P1 : Probability that a frame arrives with no bit errors P2 : While using error detection, the probability that a frame arrives with one or more undetected errors P3 : While using error detection, the probability that a frame arrives with one or more detected bit errors but no undetected bit errors

Error Detection Probabilities With no error detection F = Number of bits per frame

Error Detection Process Transmitter For a given frame, an error-detecting code (check bits) is calculated from data bits Check bits are appended to data bits Receiver Separates incoming frame into data bits and check bits Calculates check bits from received data bits Compares calculated check bits against received check bits Detected error occurs if mismatch

Error Detection Process

Parity Check Parity bit appended to a block of data Even parity Added bit ensures an even number of 1s Odd parity Added bit ensures an odd number of 1s Example, 7-bit character [1110001] Even parity [11100010] Odd parity [11100011]

Cyclic Redundancy Check (CRC) Transmitter For a k-bit block, transmitter generates an (n-k)-bit frame check sequence (FCS) Resulting frame of n bits is exactly divisible by predetermined number Receiver Divides incoming frame by predetermined number If no remainder, assumes no error

Wireless Transmission Errors Error detection requires retransmission Detection inadequate for wireless applications Error rate on wireless link can be high, results in a large number of retransmissions Long propagation delay compared to transmission time

Block Error Correction Codes Transmitter Forward error correction (FEC) encoder maps each k-bit block into an n-bit block codeword Codeword is transmitted; (analog transmission for wireless communications systems) Receiver Incoming signal is demodulated Block passed through an FEC decoder

Forward Error Correction Process

FEC Decoder Outcomes No errors present Codeword produced by decoder matches original codeword Decoder detects and corrects bit errors Decoder detects but cannot correct bit errors; reports uncorrectable error Decoder incorrectly corrects bit errors Error pattern looks like a different block of data was sent Decoder detects no bit errors, though errors are present

Block Code Principles Hamming distance – for 2 n-bit binary sequences, the number of different bits E.g., v1=011011; v2=110001; d(v1, v2)=3 Redundancy – ratio of redundant bits to data bits Code rate – ratio of data bits to total bits Coding gain – the reduction in the required Eb/N0 to achieve a specified BER of an error-correcting coded system

10.6 How Coding Improves System Performance

Hamming code Designed to correct single bit errors Family of (n, k) block error-correcting codes with parameters: Block length: n = 2m – 1 Number of data bits: k = 2m – m – 1 Number of check bits: n – k = m Minimum distance: dmin = 3 Single-error-correcting (SEC) code SEC double-error-detecting (SEC-DED) code

Hamming code

Hamming Code Process Encoding: k data bits + (n – k) check bits Decoding: compares received (n – k) bits with calculated (n – k) bits using XOR Resulting (n – k) bits called syndrome word Syndrome range is between 0 and 2(n-k)-1 Each bit of syndrome indicates a match (0) or conflict (1) in that bit position

Cyclic Codes Can be encoded and decoded using linear feedback shift registers (LFSRs) For cyclic codes, a valid codeword (c0, c1, …, cn-1), shifted right one bit, is also a valid codeword (cn-1, c0, …, cn-2) Takes fixed-length input (k) and produces fixed-length check code (n-k) In contrast, CRC error-detecting code accepts arbitrary length input for fixed-length check code

BCH Codes For positive pair of integers m and t, a (n, k) BCH code has parameters: Block length: n = 2m – 1 Number of check bits: n – k ≤ mt Minimum distance: dmin ≥ 2t + 1 Correct combinations of t or fewer errors Flexibility in choice of parameters Block length, code rate

Table 10.4 BCH Code Parameters

Reed-Solomon Codes Subclass of nonbinary BCH codes Data processed in chunks of m bits, called symbols An (n, k) RS code has parameters: Symbol length: m bits per symbol Block length: n = 2m – 1 symbols = m(2m – 1) bits Data length: k symbols Size of check code: n – k = 2t symbols = m(2t) bits Minimum distance: dmin = 2t + 1 symbols

Low density parity check (LDPC) codes Approach Shannon’s limit Use very long codes Check for errors by using many equations that each add at least three bits together Variable nodes correspond to bits Constraint nodes implement equations Uses iterative decoding Variable nodes estimate the bits And estimate the probabilities of being those bits Constraint nodes combine the estimates to see if they satisfy the equations If not, they determine which variable nodes are likely different than their estimates.

Low density parity check (LDPC) codes Iterative procedure continued Estimates from several constraint nodes are sent back to each variable node to create new estimates These are sent again to constraint nodes to check against equations Procedure is called Message passing Belief propagation

Tanner Graph for LDPC Iterative Decoding

Block Interleaving Data written to and read from memory in different orders Data bits and corresponding check bits are interspersed with bits from other blocks At receiver, data are deinterleaved to recover original order A burst error that may occur is spread out over a number of blocks, making error correction possible

Interleaving Data Blocks to Spread the Effects of Error Bursts Block Interleaving Interleaving Data Blocks to Spread the Effects of Error Bursts

Block Interleaving

Convolutional Codes Generates redundant bits continuously Error checking and correcting carried out continuously (n, k, K) code Input processes k bits at a time Output produces n bits for every k input bits K = constraint factor k and n generally very small n-bit output of (n, k, K) code depends on: Current block of k input bits Previous k-1 blocks of k input bits

Decoding Trellis diagram – expanded encoder diagram Viterbi code – error correction algorithm Compares received sequence with all possible transmitted sequences Algorithm chooses path through trellis whose coded sequence differs from received sequence in the fewest number of places Once a valid path is selected as the correct path, the decoder can recover the input data bits from the output code bits

Example Trellis Diagram for Encoding

Trellis Diagrams for Encoder with (n, k, K) = (2, 1, 7)

Viterbi Algorithm for w = 10010100101100… with decoding window b = 7

Turbo coding Popular for third- and fourth- generation cellular systems Perform very close to Shannon limit Three versions of the signal are transmitted, interleaved together Original signal Encoded version of the signal Interleaved version that is then encoded Some of the bits of the interleaved stream are removed

10.14 Turbo Encoding and Decoding

Turbo coding Decoder Missing bits are replaced by estimates or set to zero Decoder 1 estimates output bits Using two of the streams Keeps soft decision information – levels of confidence about decoding Decoder 2 estimates output Using another set of two data streams and soft decision values from Decoder 1 Results are fed back to Decoder 1 Multiple iterations between Decoder 1 and Decoder 2 can occur until a result of high enough confidence results

Automatic Repeat Request Mechanism used in data link control and transport protocols Relies on use of an error detection code (such as CRC) Flow Control Error Control

Flow Control Assures that transmitting entity does not overwhelm a receiving entity with data Protocols with flow control mechanism allow multiple PDUs in transit at the same time PDUs arrive in same order they’re sent Sliding-window flow control Transmitter maintains list (window) of sequence numbers allowed to send Receiver maintains list allowed to receive

Sliding-Window Depiction

Example of a Sliding-Window Protocol

Flow Control Reasons for breaking up a block of data before transmitting: Limited buffer size of receiver Retransmission of PDU due to error requires smaller amounts of data to be retransmitted On shared medium, larger PDUs occupy medium for extended period, causing delays at other sending stations

Error Control Mechanisms to detect and correct transmission errors Types of errors: Lost PDU : a PDU fails to arrive Damaged PDU : PDU arrives with errors

10.17 Model of PDU Transmission

Error Control Requirements Error detection Receiver detects errors and discards PDUs Positive acknowledgement Destination returns acknowledgment of received, error-free PDUs Retransmission after timeout Source retransmits unacknowledged PDU Negative acknowledgement and retransmission Destination returns negative acknowledgment to PDUs in error

Go-back-N ARQ Acknowledgments Contingencies RR = receive ready (no errors occur) REJ = reject (error detected) Contingencies Damaged PDU Damaged RR Damaged REJ

Go-back-N ARQ

HYBRID ARQ Hybrid Automatic Repeat Request (HARQ) Neither FEC or ARQ is adequate in practical situations FEC may add unnecessary redundancy ARQ may cause excessive delays from retransmissions HARQ is widely used Uses combination of FEC and ARQ

Additional reference materials Required Textbook: Antennas and Propagation for Wireless Communication Systems, by Simon R. Saunders and Alejandro Aragon-Zavala, ISBN 978-0-470-84879-1; March 2007 (2nd edition). Optional References: Wireless Communications and Networks, by William Stallings, ISBN 0-13-040864-6, 2002 (1st edition); Wireless Communication Networks and Systems, by Corey Beard & William Stallings (1st edition); all material copyright 2016 Wireless Communications Principles and Practice, by Theodore S. Rappaport, ISBN 0-13-042232-0 (2nd edition)