Bit stream structure, Computer Networking

In OSI 7 layer model, a header, or possibly a trailer, can be added to the data unit at each layerI 7 layer, but we will define a simple virtual packet which contains only 8bit data value without  any header and trailer

248_Bit stream structure.png

Each packet contains one pixel information of the lenna256 image. We defined the 3 structures in "CPacketStruct.h" to express a packet as bit stream. Left structure is defined for bit stream for error detection code and right structure is defined for bit stream for error correction code. There is additional bit stream without any code, and the data structure of bit stream with no code is same as the Packet structure in "CPacketStruct.h"

typedef struct {

          BIT   dat1[5];

          BIT   dat2[5];

} EDBitStream;

typedef struct {

          BIT   dat1[7];

          BIT   dat2[7];

} ECBitStream;

Fig. Bit stream structure

 One pixel data is represented with 8 digits, and each 4 digits are divided into dat1, and dat2. In bit streams for error detection

Ex) 1 Pixel data = 100010012

Normal Packet

(Packet is not encoded)

Encoded Packet by Parity Bit

Encoded Packet by hamming code

[1000 1001]

[Pixel Data  ]

[10001   10010 ]

[ (1000)+Parity || (1001) +Parity ]

[1101000   0111001  ]

[ (1000)* G || (1001) * G ]

In Packet structure,

NCBitStream

In EDBitStream Structure

 

In ECBitStream Structure

 

Posted Date: 2/19/2013 1:15:29 AM | Location : United States







Related Discussions:- Bit stream structure, Assignment Help, Ask Question on Bit stream structure, Get Answer, Expert's Help, Bit stream structure Discussions

Write discussion on Bit stream structure
Your posts are moderated
Related Questions
Name the types of OSPF Configuration? Ans) There are Two Types of OSPF configuration A ) SINGLE AREA b) MULTI AREA

Define the term - Graphics Interchange Format A type of graphics file found frequently on the .net. A picture of a vice-president, for example, may appear on the Intranet as

#clasification of inductor

do you do paraphrase

Submission instructions: Answer the following questions using a text processing software and submit your answers via connex. Possible file formats for your submission file(s) are .

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

What is Stop-and-Wait Protocol? In Stop and wait protocol, sender sends single frame, waits unless it receives confirmation from the receiver (okay to go ahead), and then sends

Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec

Q. Flow control in TCP? The amount of data a source is able to send before receiving an ACK from the destination Whether to send 1 byte of data as well as wait for ACK

importance of mail server ,proxy server ,modem ,intranet and web site