Bit stream structure, Computer Networking

In OSI 7 layer model, a header, or possibly a trailer, can be added to the data unit at each layerI 7 layer, but we will define a simple virtual packet which contains only 8bit data value without  any header and trailer

248_Bit stream structure.png

Each packet contains one pixel information of the lenna256 image. We defined the 3 structures in "CPacketStruct.h" to express a packet as bit stream. Left structure is defined for bit stream for error detection code and right structure is defined for bit stream for error correction code. There is additional bit stream without any code, and the data structure of bit stream with no code is same as the Packet structure in "CPacketStruct.h"

typedef struct {

          BIT   dat1[5];

          BIT   dat2[5];

} EDBitStream;

typedef struct {

          BIT   dat1[7];

          BIT   dat2[7];

} ECBitStream;

Fig. Bit stream structure

 One pixel data is represented with 8 digits, and each 4 digits are divided into dat1, and dat2. In bit streams for error detection

Ex) 1 Pixel data = 100010012

Normal Packet

(Packet is not encoded)

Encoded Packet by Parity Bit

Encoded Packet by hamming code

[1000 1001]

[Pixel Data  ]

[10001   10010 ]

[ (1000)+Parity || (1001) +Parity ]

[1101000   0111001  ]

[ (1000)* G || (1001) * G ]

In Packet structure,

NCBitStream

In EDBitStream Structure

 

In ECBitStream Structure

 

Posted Date: 2/19/2013 1:15:29 AM | Location : United States







Related Discussions:- Bit stream structure, Assignment Help, Ask Question on Bit stream structure, Get Answer, Expert's Help, Bit stream structure Discussions

Write discussion on Bit stream structure
Your posts are moderated
Related Questions
What is Proxy ARP? Is using a router to give answer ARP requests. This will be completed when the originating host believes that a destination is local, when in fact is lies be

Urgent Pointer This 16 bite which is valid  only f the urgent  flag is set is used  when the segment  contains  urgent data. If  defines  the number  that must be  added  t

What is use of Carrier sense multiple access Carrier sense multiple access with collision detection (CSMA/CD) is a form of medium access control in which a station listens to

Path Layer The path  layer maps services  such as DS3, FDDI, and ATM into the SONET  payload formal. This layer  provides  end to end  communications  signals  labelling path m

Single Program Multiple Date A common style of writing data parallel programs for MIMD computers is SPMD (single program, multiple data): all the processors implement the same

To accept its goals, ATM uses fixed, small sized packets known cells. Every cell has 53 octets. VPI/VCI fields shows the cells destination. PRIO say if cell can be discarded CRC

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Disadvantage of VPNs The disadvantages of VPN  are related to implementation troubleshooting  trust and  internet  availability. a.Implementation  can be time consuming: Im

What are the drawbacks of Ethernet Cabling? The Ethernet cabling ahs the following drawbacks: 1. Ethernet is not a high-level performer in high-load environments. This proto

Define the term - Proxy servers These types of firewalls have been further classified into two types: application level gateways and circuit level gateways. The application