Bit stream structure, Computer Networking

In OSI 7 layer model, a header, or possibly a trailer, can be added to the data unit at each layerI 7 layer, but we will define a simple virtual packet which contains only 8bit data value without  any header and trailer

248_Bit stream structure.png

Each packet contains one pixel information of the lenna256 image. We defined the 3 structures in "CPacketStruct.h" to express a packet as bit stream. Left structure is defined for bit stream for error detection code and right structure is defined for bit stream for error correction code. There is additional bit stream without any code, and the data structure of bit stream with no code is same as the Packet structure in "CPacketStruct.h"

typedef struct {

          BIT   dat1[5];

          BIT   dat2[5];

} EDBitStream;

typedef struct {

          BIT   dat1[7];

          BIT   dat2[7];

} ECBitStream;

Fig. Bit stream structure

 One pixel data is represented with 8 digits, and each 4 digits are divided into dat1, and dat2. In bit streams for error detection

Ex) 1 Pixel data = 100010012

Normal Packet

(Packet is not encoded)

Encoded Packet by Parity Bit

Encoded Packet by hamming code

[1000 1001]

[Pixel Data  ]

[10001   10010 ]

[ (1000)+Parity || (1001) +Parity ]

[1101000   0111001  ]

[ (1000)* G || (1001) * G ]

In Packet structure,

NCBitStream

In EDBitStream Structure

 

In ECBitStream Structure

 

Posted Date: 2/19/2013 1:15:29 AM | Location : United States







Related Discussions:- Bit stream structure, Assignment Help, Ask Question on Bit stream structure, Get Answer, Expert's Help, Bit stream structure Discussions

Write discussion on Bit stream structure
Your posts are moderated
Related Questions
Briefly describe NAT and RIP NAT is Network Address Translation. This is a protocol that gives a way for multiple computers on a common network to share one connection to the I

What is difference among Path and Classpath? Path and Classpath are operating system level environment variales. Path is used explain where the system can find the executabl

Q. Explain Types of Redundancy Checks? Parity Check Simple Parity Check Two Dimensional Parity Check / Longitudinal Redundancy Check (LRC) CRC (Cyclic Redund

Router Routing achieved commercially popularity in the mid - 1980s - at a time when large-scale Internetworking began to change the fairly simple, homogeneous environments. Rou

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

What are the Disadvantages of Microwaves?  a. Attenuation by solid objects: birds, snow, rain, and fog. b. Reflected from flat surfaces such as water and metal. c. Diffra

Q. What are the basic key functions of data link layer? Ans: Data link layer transfers data in a structured and reliable manner so that the service given by the physical layer

INDEPENDENT Loops HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done indep

Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us