Underwater Acoustic Communication

Slides:



Advertisements
Similar presentations
Error Correcting Memory
Advertisements

Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
Note: is very restrictive Would like more flexibility in determining the length If we shorten the length of the message.
EIE325: Telecommunication TechnologiesMaciej J. Ogorza ł ek, PolyU, EIE Telecommunication Technologies Week 8 Flow Control Error Control.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
Error detection/correction FOUR WEEK PROJECT 1 ITEMS TO BE DISCUSSED 1.0 OVERVIEW OF CODING STRENGTH (3MINS) Weight/distance of binary vectors Error detection.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Channel Coding Part 1: Block Coding
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Greg Davis Scott Hambleton Jon Holton Chris Johnson Chris Monfredo 12/10/13Rochester Institute of Technology1 P14251 Underwater Acoustic Communication.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged.
Data Link Layer : Services, Framing, Error Detection and Correction2.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 13.
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Forward Error Correction vs. Active Retransmit Requests in Wireless Networks Robbert Haarman.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
An SSCOP-based Link Layer Protocol for Wireless LANs Haoli Wang and Aravind Velayutham IEEE Global Telecommunications Conference 1-5 December, 2003 San.
Chris Monfredo Chris Johnson Jon Holton Greg Davis Scott Hambleton 10/03/13Rochester Institute of Technology1 P14251 Underwater Acoustic Communication.
Internet and Intranet Protocols and Applications The Internet: Delay, Errors, Detection February, 2002 Joseph Conron Computer Science Department New York.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
Data Link Control. The two main functions of the data link layer are data link control and media access control. The first, data link control, deals with.
PROTOCOL BASICS. 2 Introduction In chapter 3: Circuits and techniques can be employed to transmit a frame of information between 2 DTEs Error detection.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lec # 15.
Data rate: 1 Mb/s Payload: 1000 B Header/ACK: 50 B
1 Wireless Networks Lecture 5 Error Detecting and Correcting Techniques (Part II) Dr. Ghalib A. Shah.
COMPUTER NETWORKS CS610 Lecture-4 Hammad Khalid Khan.
Go-Back-N ARQ packets transmitted continuously (when available) without waiting for ACK, up to N outstanding, unACK’ed packets a logically different sender.
Dr. Clincy Professor of CS
Computer Communication & Networks
Reliable Transmission
Error Correcting Codes for Serial links : an update
Chapter 9: Data Link Control
Data Link Layer Flow Control.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
B. R. Chandavarkar CSE Dept., NITK Surathkal
Data link layer (LLC).
ECE 544 Protocol Design Project 2016
Data Link Layer What does it do?
Chapter 2 (Handout 1– only sections 2.1, 2.2 and 2.3)
CIS 321 Data Communications & Networking
Lecture on Data Link Control
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, August 2010.
Data Link Layer: Data Link Control
Overview Jaringan Komputer (2)
September 2011 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: A Reed-Solomon Erasure Correction Based.
Process-to-Process Delivery:
CS412 Introduction to Computer Networking & Telecommunication
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Point-to-Point Links Outline Encoding Framing Error Detection
September 2011 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: A Reed-Solomon Erasure Correction Based.
September 2011 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: A Reed-Solomon Erasure Correction Based.
Communication Networks NETW 501
Lecture 7 review Consider a link running the Go-Back-N protocol. Suppose the transmission delay and propagation delay are both 1ms, the window size is.
Yasunari MAEDA (Kitami Institute of Technology)
Chapter Nine: Data Transmission
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Coding and Error Control
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
DATA COMMUNICATION Lecture-38.
COMPUTER NETWORKS CS610 Lecture-5 Hammad Khalid Khan.
CS 325: CS Hardware and Software Organization and Architecture
CSE 461: Framing, Error Detection and Correction
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Process-to-Process Delivery: UDP, TCP
Chapter 9: Data Link Control
Presentation transcript:

Underwater Acoustic Communication 1 P14251 Underwater Acoustic Communication CE Overview Software Architecture Control unit flowchart and pseudo-code Error Detection/Correction Framing Information Data Rate Analysis 11/26/13 Rochester Institute of Technology 1

Underwater Acoustic Communication 2 P14251 Underwater Acoustic Communication Software Architecture 11/26/13 Rochester Institute of Technology 2

Underwater Acoustic Communication 3 P14251 Underwater Acoustic Communication Control Unit Pseudo-Code 11/26/13 Rochester Institute of Technology 3

Underwater Acoustic Communication 4 P14251 Underwater Acoustic Communication Control Unit Pseudo-Code 11/26/13 Rochester Institute of Technology 4

Underwater Acoustic Communication 5 P14251 Underwater Acoustic Communication Control Unit Pseudo-Code 11/26/13 Rochester Institute of Technology 5

Underwater Acoustic Communication 6 P14251 Underwater Acoustic Communication Error Detection and Correction Hybrid Scheme: ECC and ARQ EEC Implementation: BCH vs. Reed Solomon BCH is easier to implement, but requires a large amount of redundancy Reed-Solomon is more complex, but overall much better and requires only 20% redundancy (to correct 10% of errors) 11/26/13 Rochester Institute of Technology 6

Underwater Acoustic Communication 7 P14251 Underwater Acoustic Communication Error Detection and Correction Encoding: LFSR based implementation is extremely simple and fast. Will translate well to C 11/26/13 Rochester Institute of Technology 7

Underwater Acoustic Communication 8 P14251 Underwater Acoustic Communication Error Detection and Correction Decoding is more complex, but efficient algorithms exist that will help significantly 11/26/13 Rochester Institute of Technology 8

Underwater Acoustic Communication 9 P14251 Underwater Acoustic Communication Frame Sentinels Sentinels are a unique pattern of bits that signify the start and end of the frame i.e. 01110 –data– 01110 When preparing the frame for transmission, if the pattern appears anywhere in the data, bit stuffing is used to eliminate it (i.e. 01110 -> 011010) Commonly used sentinel which we’ll use is 01111110 Frame Header 1 bit to signify the type of frame: control or message 1 bit that gets flipped each time a new frame is sent 11/26/13 Rochester Institute of Technology 9

Underwater Acoustic Communication 1010 P14251 Underwater Acoustic Communication Control frame formats Since it’s especially important to interpret control frames correctly, 4 bits are used to display the unique patterns 0000 – Request to Send (RTS) 0110 – Clear to Send (CTS) 1001 – Acknowledgement (ACK) 1111 – Done (Signifies that all frames have been sent) 11/26/13 Rochester Institute of Technology 10

Underwater Acoustic Communication 1111 P14251 Underwater Acoustic Communication Frame Sizes - Control Frame: 18 (overhead) + 4 (type) = 22 bits - Message Frame: 18(overhead) + X (message) = 18+X bits Propagation delay (20ms for 30m distance) limits the number of frames that can be sent. For 15kb/s, the maximum number of message frames = 9 frames, each containing 1k encoded information bits Increase to ~1023 bits for RS(1023, 853) 11/26/13 Rochester Institute of Technology 11

Underwater Acoustic Communication 1212 P14251 Underwater Acoustic Communication Data Rate Analysis f c =37kHz, t c =81μs (3 periods per 2 bits) Frames that get transmitted for a message: Send RTS – 22 bits Receive CTS – 22 bits Send all message frames – 1042 bits/frame Receive all acknowledgements – 22 bits/frame Send Done – 22 bits Receive Acknowledgement – 22 bits Total transferred bits = 9664 bits Total transfer time = 0.831s (about 170ms left for code) 11/26/13 Rochester Institute of Technology 12