Unit2 6
Unit2 6
Analog and digital signals – Encoding and modulation – Parallel and serial transmission –
DTE/DCE – Types of errors – Error detection and correction – Data link control – Line
discipline – Flow control – Error control.
INTRODUCTION
Computer networks are designed to transfer data from one point to another. During
transit data is in the form of electromagnetic signals. Hence it is important to study data
and signals before we move to further concepts in data communication.
Signals which repeat itself after a fixed time period are called Periodic
Signals.Signals which do not repeat itself after a fixed time period are called
Non-Periodic Signals. In data communications, we commonly use
periodic analog signals and non-periodic digital signals.
ANALOG SIGNAL
Peak Amplitude
The amplitude of a signal is the absolute value of its intensity at time t
The peak amplitude of a signal is the absolute value of the highest intensity.
Phase
Phase describes the position of the waveform with respect to time (specifically
relative to time O).
Frequency Change
Phase Change
Composite signals
Bandwidth
Example2. A wave completes its one cycle in 0.25 seconds. Its frequency is
given by
F = 1 / T = 1 / 0.25 = 4 Hz
Wavelength
The wavelength of a signal refers to the relationship between frequency
(or period) and propagation speed of the wave through a medium.
The wavelength is the distance a signal travels in one period.
It is given by
Wavelength = Propagation Speed X Period
OR
Wavelength =Propagation Speed X 1
Frequency
It is represented by the symbol : λ (pronounced as lamda)
It is measured in micrometers
It varies from one medium to another.
Composite Signal
A composite signal is a combination of two or more simple sine waves
with different frequency, phase and amplitude.
If the composite signal is periodic, the decomposition gives a series of
signals with discrete frequencies; if the composite signal is non-periodic,
the decomposition gives a
combination of sine waves with continuous frequencies.
Fig: A Composite signal with three component signals
For data communication a simple sine wave is not useful, what is used is
a composite signal which is a combination of many simple sine waves.
Composite Waveform
Digital Signal
Information can also be explained in the form of a digital signal.
A digital signal can be explained with the help of following points:
Definition:-
A digital is a signal that has discrete values.
The signal will have value that is not continuous.
LEVEL
Information in a digital signal can be represented in the form of voltage
levels.
Ex. In the signal shown below, a ‗1‘ is represented by a positive voltage
and a ‗0‘ is represented by a Zero voltage.
11 10 01 00 00 01 10 10
LEVEL
4
LEVEL
3
LEVEL
2
LEVEL
1
Fig: A digital signal with four levels
In general, if a signal has L levels then, each level need
Log2L bits
Example: Consider a digital Signal with four levels, how many
bits are required per level?
Answer: Number of bits per level = Log2L
= Log24
=2
Hence, 2 bits are required per level for a signal with four
levels.
BIT LENGTH or Bit Interval (Tb)
It is the time required to send one bit. It is measured in
seconds.
BIT RATE
It is the number of bits transmitted in one second. It is
expressed as bits per second (bps).
Relation between bit rate and bit interval can be as follows
Bit rate = 1 / Bit interval
Baud Rate
The bit interval is the time required to send one single bit. The bit rate is the
number of bit intervals per second.
Decomposition of a Digital Signal
The significant spectrum of a digital signal is the portion of the signal’s spectrum
that can adequately reproduce the original signal.
Analog and Digital
Analog refers to something that is continuous-a set of specific points of data and all
possible points between. Digital refers to something that is discrete-a set of specific points
of data with no other points in between.
Analog and Digital Data
Data can be analog or digital. An example of analog data is the human voice. An
example of digital data is data stored , the memory of a computer in the form of 0s and 1s.
Analog and Digital Signals
Signals can be analog or digital. Analog signals can have any value in a range;
digital signals can have only a limited number of values.
Transformation of Information
to Signals
Aperiodic signals
An aperiodic, or nonperiodic, signal changes constantly without exhibiting a
pattern or cycle that repeats over time. An aperiodic, or nonperiodic, signal has no
repetitive pattern. An aperiodic signal can be decomposed into an infinite number
of periodic signals.
Periodic Signals
A signal is a periodic signal if it completes a pattern within a measurable
time frame, called a period, and repeats that pattern over identical subsequent
periods. The completion of one full pattern is called a cycle. A periodic signal
consists of a continuously repeated pattern. The period of a signal (T) is expressed
in seconds.
BANDWIDTH OF A SIGNAL
Bandwidth can be defined as the portion of the electromagnetic spectrum
occupied by the signal
It may also be defined as the frequency range over which a signal is
transmitted.
Different types of signals have different bandwidth. Ex. Voice signal, music
signal, etc
Bandwidth of analog and digital signals are calculated in separate ways; analog
signal bandwidth is measured in terms of its frequency (hz) but digital signal
bandwidth is measured in terms of bit rate (bits per second, bps)
Bandwidth of signal is different from bandwidth of the medium/channel
Bandwidth of an analog signal
Bandwidth of an analog signal is expressed in terms of its frequencies.
It is defined as the range of frequencies that the composite analog signal
carries.
It is calculated by the difference between the maximum frequency and the
minimum frequency.
Consider the signal shown in the diagram below:
The signal shown in the diagram is an composite analog signal with many
component signals.
It has a minimum frequency of F1 = 30Hz and maximum frequency of F2 =
90Hz.
Hence the bandwidth is given by F2 – F1 = 90 – 30 = 60 Hz
A channel is the medium through which the signal carrying information will be
passed.
In terms of analog signal, bandwidth of the channel is the range of frequencies
that the channel can carry.
In terms of digital signal, bandwidth of the channel is the maximum bit rate
supported by the channel. i.e. the maximum amount of data that the channel can
carry per second.
The bandwidth of the medium should always be greater than the bandwidth of
the signal to be transmitted else the transmitted signal will be either attenuated or
distorted or both leading in loss of information.
The channel bandwidth determines the type of signal to be transmitted i.e. analog
or digital.
Example
What is the maximum bit rate of a noiseless channel with a bandwidth of 5000 Hz
transmitting a signal with two signal levels.
Solution:
The bit rate for a noiseless channel according to Nyquist Bit rate can be calculated as
follows:
BitRate = 2 x Bandwidth x Log2 L
= 2 x 5000 x log2 2 =10000 bps
Shannon Capacity
The Shannon Capacity defines the theoretical maximum bit rate for a noisy channel
Where,
Capacity is the capacity of the channel in bits per second
Bandwidth is the bandwidth of the channel
SNR is the Signal to Noise Ratio
Shannon Capacity for calculating the maximum bit rate for a noisy channel does not
consider the number of levels of the signals being transmitted as done in the Nyquist
bit rate. Example:
Calculate the bit rate for a noisy channel with SNR 300 and bandwidth of
3000Hz
Solution:
C 3 x log2 (1
a
= 30 x+ 300) log2 (
p
= 30 x301) 8.23
= 24,690bps a 0
c 0
i 0
t
y
=
b
a
n
d
w
i
d
Encoding and Modulating
We must transform data into signals to send them from one place to another.
Unipolar Encoding
One voltage level is used.
Polar Encoding
In NRZ-L the level of the signal is dependent upon the state of the bit. A positive
voltage usually means the bit is a 0 and a negative voltage means the bit is a 1.
RZ Encoding
In RZ, the signal changes not between bits but during each bit. A 1 bit is actually
represented by positive-to-zero and a 0 bit by negative-to-zero. The main disadvantage of
RZ encoding is that it requires two signal changes to encode one bit and therefore occupies
more bandwidth.
Biphase
Biphase encoding is implemented in two different ways: Manchester and
Differential Manchester.
In Manchester encoding, the transition at the middle of the bit is used for both
synchronization and bit representation.
In Differential Manchester encoding, the transition at the middle of the bit is used
only for synchronization. The bit representation is shown by the inversion or non inversion
at the beginning of the bit.
Bipolar
In B8ZS if eight 0s come one after another, we change the pattern in one of two
ways based on the polarity of the previous 1.
In HDB3 if four 0s come one after another, we change the pattern in one of four
ways based on the polarity of the previous 1 and the number of 1s since the last
substitution.
Example 5.1
Example 5.2 Using HDB3, encode the bit stream 10000000000100.Assume that the
number of 1s so far is odd and the first 1 is positive.
The first step in analog to digital conversion is called Pulse Amplitude Modulation
(PAM).In PAM, the original signal is sampled at equal intervals.
PCM modifies the pulses created by PAM to create a completely digital signal.
Sampling Rate
According to the Nyquist theorem, the sampling rate must be at least two times the
highest frequency.
PCM
Nyquist Theorem
5.3 Digital to Analog Conversion
This is the process of changing one of the characteristics of an Analog signal based
on the information in a digital signal (0s and 1s).
Two basic issues must be define: bit/baud rate and carrie signal
Bitrate is the number of bits per second. Baud rate is the number of signal units per
second. baud rate is less than or equal to bit rate.
In ASK the strengh of the carrier signal is varied to represent the binary 1 or 0. Both
frequency and phase remains constant, while the amplitude changes
A popular ASK technique is called on-off Keying (OOK) . In OOK one of the bit values
is represented by no voltage. Advantage is a reduction in the amount of energy required to
transmit information.
In FSK the frequency of the carrier signal is varied to represent the binary 1 or 0. Both
Amplitude and phase remain constant, while the frequency changes. FSK avoids most of
the noise problems of PSK.
Bandwidth for FSK
Phase Shift Keying (PSK)
In PSK the phase of the carrier is varied to represent binary 1 or 0. Both peak amplitude
and frequency remains constant as the phase changes
The above method is often called 2-PSK or binary PSK, because two different phases (0
and 180 Degrees) are used
PSK Constellation
4-PSK
This Technique is also called Q-PSK . The pair of bits represented by each phase is
called a di bit. We can also extend this idea to 8-PSK. The constellation diagram for the
signal in shown in following figures:
4-PSK Characteristics
8 -PSK Characteristics
PSK Bandwidth
8-QAM Signal
16-QAM Constellation
Amplitude Modulation(AM)
AM Bandwidth
AM Band Allocation
Frequency Modulation(FM)
FM Bandwidth
FM Band Allocation
Phase Modulation(PM)
Due to simpler hardware requirements, phase modulation(PM) is used in some
systems as an alternative to frequency modulation.
Data transmission
Data needs to be transmitted between devices in a computer system.
Data transmission refers to the movement of data in form of bits between two
or more digital devices.
1. Parallel
2. Serial
PARALLEL TRANSMISSION
SERIAL TRANSMISSION
• In serial transmission , the various bits of data are transmitted serially one
after the other.
• It requires only one communication line rather than n lines to transmit data
from sender to receiver.
• Less costly.
SYNCHRONOUS TRANSMISSION
• Cost high.
ASYNCHORONOUS TRANSMISSION
• Start bit refers to the start of the data. Usually 0 is used for start bit.
• Stop bit indicates the end of data. More than one bit can be used for end.
Data Transmission
Serial Parallel
Cost Cheap Expensive
Transmission errors are usually detected at the physical layer of the OSI model.
Transmission errors are usually corrected at the data link layer of the OSI model.
Types of Errors
Single-bit: In a single-bit error, only one bit in the data unit has changed.
Burst :A burst error means that two or more bits in the data unit have changed.
Single-bit error
Burst error
DETECTION
Their presence allows the receiver to detect or correct corrupted bits. Instead of repeating the
entire data stream, a short group of bits may be attached to the entire data stream.This
technique is called redundancy because the extra bits are redundant to the information:
they are discarded as soon as the accuracy of the transmission has been determined.
Fig: Redundancy
d)Checksum
Fig: Redundancy
CRC ,the most powerful of the redundancy checking techniques, is based on binary
division.Most powerful of the redundancy checkingtechniques is the cyclic redundancy
check (CRC). This method is based on the binary division. In CRC, the desired
sequence of redundant bits are generated and is appended to the end of data unit. It is also
called as CRC reminder. So that the resulting data unit becomes exactly divisible by a
predetermined binary number.
At its destination, theincoming data unit is divided by the same number. If at thisstep there
is no remainder then the data unit
indicates thatthe data unit has been damaged in transit and thereforemust be rejected.
The redundancy bits used by CRC are derived by dividingthe data unit by a predetermined
divisor; the remainder isthe CRC.To be valid, a CRC must have two qualities: It musthave
exactly one less bit than the divisor, and appending itto the end of the data string must
make the resulting bitsequence exactly divisible by the divisor.
Step 2: The newly generated data unit is divided by the divisor, using a process called as
binary division. The remainder resulting from this division is the CRC.
Step 3: the CRC of n bits derived in step 2 replaces the appended 0‘s at the data unit. Note
that the CRC may consist of all 0‘s.
The data unit arrives at the receiver data first, followed by the CRC. The receiver treats the
whole string as a unit and divides it by the same divisor that was used the CRC remainder.
If the string arrives without error, the CRC checker yields a remainder of zero, the data unit
passes. If the string has been changed in transit, the division yields zero remainder and the
data unit does not pass.
A CRC checker functions does exactly as the generator does. After receiving the data
appended with the CRC, it does the samemodulo-2 division. If the remainder is all 0‘s, the
CRC isdropped and the data is accepted: otherwise, the receivedstream of bits is discarded
and data is resent.
Performance:
CRC is a very effective error detection method. If the divisoris chosen according to the
previously mentioned rules,
1.CRC can detect all burst errors that affect an odd numberof bits.
2.CRC can detect all burst errors of length less than or equalto the degree of the polynomial
3.CRC can detect, with a very high probability, burst errorsof length greater than the degree
of the polynomial.
Checksum
A checksum is fixed length data that is the result of performing certain operations on the data
to be sent from sender to the receiver. The sender runs the appropriate checksum algorithm
to compute the checksum of the data, appends it as a field in the packet that contains the
data to be sent, as well as various headers.
When the receiver receives the data, the receiver runs the same checksum algorithm to
compute a fresh checksum. The receiver compares this freshly computed checksum with
the checksum that was computed by the sender. If the two checksum matches, the receiver
of the data is assured that the data has not changed during the transit.
To calculate a checksum:
The combinations used to calculate each of the four r values for a seven-bit data sequence
are as follows:
r1 : bits 1,3,5,7,9,11
r2 : bits 2,3,6,7,10,11
r3 : bits 4,5,6,7
r4 : bits 8,9,10,11
Hamming Code:
The Hamming code can be applied to data units of any length and uses the relationship
between data and redundancy bits discussed above. For example, a 7-bit ASCII code
requires 4 redundancy bits that can be added 10 the end of the data unit or interspersed
with the original data bits. In following Figure,these bits are placed in positions 1, 2,4, and
8 (the positions in an 11-bit sequence that are powers of 2). For clarity in the examples
below, we refer to these bits as r1, r2, r4, and r8.
11 10 9 8 7 6 5 4 3 2 1
d d d r8 d d d r4 d r2 r1
d d d r8 d d d r4 d r2 r1
1r2will be assigned to these bits position:
11 10 7 6 3 2
d d d r8 d d d r4 d r2 r1
r4will be assigned to these bits position:
7 6 5 4
d d d r8 d d d r4 d r2 r1
r8will be assigned to these bits position:
11 10 9 8
d d d r8 d d d r4 d r2 r1
Data is: 1 0 0 1 1 0 1
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 1 0 1
Adding r1:
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 1 0 1 1
Adding r2:
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 1 0 1 0 1
Adding r4:
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 1 0 0 1 0 1
Adding r8:
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 1 1 0 0 1 0 1
Code: 10011100101
Now imagine that by the time the above transmission isreceived, the number 7 bit has been
changed from 1 to 0.The receiver takes the transmission and recalculates 4 newparity bits,
using the same sets of bits used by the senderplus the relevant parity r bit for each set (see
following Fig.). Thenit assembles the new parity values into a binary number inorder of r
position (r8 r4, r2, r1). In our example, this stepgives us the binary number 0111 (7 in
decimal), which is theprecise location of the bit in error.
Corrupted bit
1 0 0 1 0 1 0 0 1 0 1
1 0 0 1 0 1 0 0 1 0 1
1 0 0 1 0 1 0 0 1 0 1
1 0 0 1 0 1 0 0 1 0 1
Once the bit is identified, the receiver can reverse itsvalue and correct the error. The beauty
of the technique isthat it can easily be implemented in hardware and the codeis corrected
before the receiver knows about it.
Polynomial
Standard Polynomials
TRANSMISSION MODES
Data is transmitted between two digital devices on the network in the form of bits.
Transmission mode refers to the mode used for transmitting the data. The transmission
medium may be capable of sending only a single bit in unit time or multiple bits in unit time
When a single bit is transmitted in unit time the transmission mode used is Serial
Transmission and when multiple bits are sent in unit time the transmission mode used
is called Parallel transmission.
Serial Transmission
In Serial Transmission, as the name suggests data is transmitted serially, i.e. bit by
bit, one bit at a time. Since only one bit has to be sent in unit time only a single channel is
required.
Fig. Serial Transmission of Data over N = 8 channels
ASynchronous Transmission
In asynchronous serial transmission the sender and receiver are not synchronized.The data
is sent in group of 8 bits i.e. in bytes. The sender can start data transmission at any time
instant without informing the receiver. To avoid confusing the receiver while receiving the
data, ―start‖ and ―stop‖ bits are inserted before and after every
0 1 BYTE 1
Fig: Start and Bit before and after every data byte
The start bit is indicated by0‖ and stop bit is indicated by1‖. The sender and receiver may
not be synchronized as seen above but at the bit level they have to be synchronized i.e. the
duration of one bit needs to be same for both sender and receiver for accurate data
transmission. There may be gaps in between the data transmission indication that there
is no data being transmitted from sender. Ex. Assume a user typing at uneven speeds,
attimes there is no data being transmitted from Keyboard to the CPU.Following is
the Diagram for Asynchronous Serial
Transmission.
Disadvantages
Insertion of start bits, stop bits and gaps make asynchronous
transmission slow.
Application
Keyboard
Synchronous Transmission
Advantage
1. There are no start bits, stop bits or gaps between data
units
2. Since the above are absent data transmission is
faster.
3. Due to synchronization there are no timing errors.
9.2.2.3 Comparison of serial and parallel transmission
Data-Link Protocols
Data-Link Protocol Functions
It determines which device is transmitting and which is receiving at any point in time
Line discipline coordinates the link system. It determines which device can send and
when it can send. It answers then question, who should send now?
Line discipline can serve in two ways:
1. enquiry / acknowledgement (ENQ / ACK)
2. poll / select (POLL / SELECT)
ENQ / ACK:
This method is used in peer to peer communications. That is where there is a dedicated
link between two devices. The initiator first transmits a frame called an enquiry (ENQ)
asking I the receiver is available to receive data. The receiver must answer either with an
acknowledgement (ACK) frame if it ready to accept or with a negative acknowledgement
(NAK) frame if it is not ready. If the response is positive, the initiator is free to send its
data. Otherwise it waits, and try again. Once all its data have been transmitted, the
sending system finishes with an end of transmission (EOT) frame.Line discipline
POLL/SELECT:
Example of poll/select line discipline
Flow control
Error Control
Lost frames
Damaged frames
--Error detection
--Positive acknowledgment
FLOW CONTROL
It refers to a set of procedures used to restrict the amount of data flow between
sending and receiving stations. It tells the sender how much data it can transmit before it
must wait for an acknowledgement from the receiver.
There are two methods are used. They are,
1. stop and wait
2. sliding window
SENDER WINDOW:
At the beginning the sender‟s window contains n-1 frames. As frames are sent
out the left boundary of the window moves inward, shrinking the size of the window.
Once an ACK receives the window expands at the right side boundary to allow in a
number of new frames equal to number of frames acknowledged by that ACK.
EXAMPLE:
ERROR CONTROL
Error control is implemented in such a way that every time an error is detected, a
negative acknowledgement is returned and the specified frame is retransmitted. This
process is called automatic repeat request (ARQ).
The error control is implemented with the flow control mechanism. So there are
two types in error control. They are,
1. stop and wait ARQ
2. sliding window ARQ
GO-BACK-N ARQ:
In this method, if one frame is lost or damaged, all frames sent since the last
frame acknowledged or retransmitted.
DAMAGED FRAME:
LOST FRAME:
LOST ACK:
LOST ACK
------------------------------------------------------------------------------------------------------------
1. What do you mean by Automatic Repeat Request (ARQ)?
Damaged Frame
Lost Frame
Lost Acknowledge
4. What is CSMA/CD?
Carrier Sense Multiple Access with Collision Detection is a protocol used to sense
whether a medium is busy before transmission and it also has the ability to detect whether
the packets has collided with another
Repeaters
Hubs
Bridges
Routers
Switches.
6. Define Flow control
It refers to a set of procedures used to restrict the amount of data the sender
can sent before waiting for an acknowledgement
Stop& wait
Sliding Window
Inefficiency
Slow process
Flow control
Error control
It coordinates the link system. It determines which device can send and when it can
send.
When the primary device is ready to receive data, it asks the secondary to send data.
This is called polling.
Reservation
Token passing
Polling
Slotted ALOHA
CSMA
CSMA/CD,CSMA/CA
14. Define Piconet
A Bluetooth network is called Piconet .It can have up to eight stations one of which is
called the master and the rest are called slaves,
It allows several LANs to be connected. The architecture used are Star and Bus
It is a Virtual circuit wide area network that was designed to respond to demands
Ans: There are basically two types of errors, namely, (a) Damaged Frame (b) Lost Frame. The key
functions for error control techniques are as follows:
Error detection
Sending of positive acknowledgement (ACK) by the receiver for no error
Sending of negative acknowledgement (NAK) by the receiver for error
Setting of timer for lost frame
Numbering of frames
Ans: In case of data communication between a sender and a receiver, it may so happen that the rate
at which data is transmitted by a fast sender is not acceptable by a slow receiver. IN such a situation,
there is a need of flow control so that a fast transmitter does not overwhelm a slow receiver.
23. Mention key advantages and disadvantages of stop-and-wait ARQ technique?
The main disadvantage of stop-and-wait ARQ is that when the propagation delay is long, it is extremely
inefficient.
24. Consider the use of 10 K-bit size frames on a 10 Mbps satellite channel with 270 ms delay.
What is the link utilization for stop-and-wait ARQ technique assuming P = 10-3?
Ans: Link utilization = (1-P) / (1+2a)
Where a = (Propagation Time) / (Transmission Time)
Propagation time = 270 msec
Transmission time = (frame length) / (data rate)
= (10 K-bit) / (10 Mbps)
= 1 msec
Hence, a = 270/1 = 270
Link utilization = 0.999/(1+2*270) ≈0.0018 =0.18%
25. What is the channel utilization for the go-back-N protocol with window size of 7 for the
problem 3?
Ans: Channel utilization for go-back-N
= N(1 – P) / (1 + 2a)(1-P+NP)
P = probability of single frame error ≈ 10-3
Channel utilization ≈ 0.01285 = 1.285%
Ans: In case of Stop-and-Wait protocol, the transmitter after sending a frame waits for the
acknowledgement from the receiver before sending the next frame. This protocol works efficiently
for long frames, where propagation time is small compared to the transmission time of the frame.
28. How the inefficiency of Stop-and-Wait protocol is overcome in sliding window protocol?
Ans: The Stop-and-Wait protocol is inefficient when large numbers of small packets are send by the
transmitter since the transmitter has to wait for the acknowledgement of each individual packet
before sending the next one. This problem can be overcome by sliding window protocol. In sliding
window protocol multiple frames (up to a fixed number of frames) are send before receiving an
acknowledgement from the receiver.
31. For a k-bit numbering scheme, what is the range of sequence numbers used in sliding
window protocol?
Ans: For k-bit numbering scheme, the total number of frames, N, in the sliding window can be given
as follows (using modulo-k).
N = 2k – 1
Hence the range of sequence numbers is: 0, 1, 2, and 3 … 2k – 1
Version
Ans: As the signal is transmitted through a media, the signal gets corrupted because of noise and
distortion. In other words, the media is not reliable. To achieve a reliable communication through this
unreliable media, there is need for detecting the error in the signal so that suitable mechanism can be
devised to take corrective actions.
33. How does NRZ-L differ from NRZ-I?
In the NRZ-L sequence, positive and negative voltages have specific meanings: positive for 0 and
negative for 1. in the NRZ-I sequence, the voltages are meaningless.
Instead, the receiver looks for changes from one level to another as its basis for recognition of 1s.
Specific responsibilities of data link layer include the following. a) Framing b) Physical addressing
c) Flow control d) Error control e) Access control.
Byte-Oriented Protocols(PPP)
Bit-Oriented Protocols(HDLC)
Clock-Based Framing(SONET)
36.What is the purpose of hamming code?
A hamming code can be designed to correct burst errors of certain lengths. So the simple
strategy used by the hamming code to correct single bit errors must be redesigned to be
applicable for multiple bit correction.
37.What is redundancy?
It is the error detecting mechanism, which means a shorter group of bits or extra bits may be
appended at the destination of each unit.
40.What is a buffer?
Each receiving device has a block of memory called a buffer, reserved for storing incoming data
until they are processed.