Bit stream structure, Computer Networking

Assignment Help:

In OSI 7 layer model, a header, or possibly a trailer, can be added to the data unit at each layerI 7 layer, but we will define a simple virtual packet which contains only 8bit data value without  any header and trailer

248_Bit stream structure.png

Each packet contains one pixel information of the lenna256 image. We defined the 3 structures in "CPacketStruct.h" to express a packet as bit stream. Left structure is defined for bit stream for error detection code and right structure is defined for bit stream for error correction code. There is additional bit stream without any code, and the data structure of bit stream with no code is same as the Packet structure in "CPacketStruct.h"

typedef struct {

          BIT   dat1[5];

          BIT   dat2[5];

} EDBitStream;

typedef struct {

          BIT   dat1[7];

          BIT   dat2[7];

} ECBitStream;

Fig. Bit stream structure

 One pixel data is represented with 8 digits, and each 4 digits are divided into dat1, and dat2. In bit streams for error detection

Ex) 1 Pixel data = 100010012

Normal Packet

(Packet is not encoded)

Encoded Packet by Parity Bit

Encoded Packet by hamming code

[1000 1001]

[Pixel Data  ]

[10001   10010 ]

[ (1000)+Parity || (1001) +Parity ]

[1101000   0111001  ]

[ (1000)* G || (1001) * G ]

In Packet structure,

NCBitStream

In EDBitStream Structure

 

In ECBitStream Structure

 


Related Discussions:- Bit stream structure

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Synchronization in factor causing , Synchronization Multiple processors...

Synchronization Multiple processors need synchronization with each other while implementing a parallel algorithm. That is, the task running on processor X might have to wait fo

Describe network infrastructure design, Question : a) Explain why perv...

Question : a) Explain why pervasive computing can be termed as a "technology that disappears". b) List and briefly explain four main components of a MOTE used in Wireless

Subnetting, Calculate the Network Address, the broadcast address and the ho...

Calculate the Network Address, the broadcast address and the host range, for the following host address i. 192.168.180.94/27 ii. 172.23.8.19 /21 iii. 147.252.238.20 255.255.240.0 b

Problem with broadcasting, PROBLEM WITH BROADCASTING: There are some i...

PROBLEM WITH BROADCASTING: There are some issues with the broadcast. For each broadcast frame on the network every computer uses computational sources and places the data into

Framing, different framing methods

different framing methods

Show the seven layers of iso''s osi model, Q. Show the seven layers of ISO'...

Q. Show the seven layers of ISO's OSI model? Ans:- The seven layers are given below:   -  Application Layer -  Presentation Layer -  Session Layer -  Transport Laye

Fault tree construction rules, FAULT TREE CONSTRUCTION RULES (a)  Defi...

FAULT TREE CONSTRUCTION RULES (a)  Define the  undesired  fault  condition  as the  "Top"  event. The  fault  event describes the state of either the system or a component. (b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd