Bit stream structure, Computer Networking

Assignment Help:

In OSI 7 layer model, a header, or possibly a trailer, can be added to the data unit at each layerI 7 layer, but we will define a simple virtual packet which contains only 8bit data value without  any header and trailer

248_Bit stream structure.png

Each packet contains one pixel information of the lenna256 image. We defined the 3 structures in "CPacketStruct.h" to express a packet as bit stream. Left structure is defined for bit stream for error detection code and right structure is defined for bit stream for error correction code. There is additional bit stream without any code, and the data structure of bit stream with no code is same as the Packet structure in "CPacketStruct.h"

typedef struct {

          BIT   dat1[5];

          BIT   dat2[5];

} EDBitStream;

typedef struct {

          BIT   dat1[7];

          BIT   dat2[7];

} ECBitStream;

Fig. Bit stream structure

 One pixel data is represented with 8 digits, and each 4 digits are divided into dat1, and dat2. In bit streams for error detection

Ex) 1 Pixel data = 100010012

Normal Packet

(Packet is not encoded)

Encoded Packet by Parity Bit

Encoded Packet by hamming code

[1000 1001]

[Pixel Data  ]

[10001   10010 ]

[ (1000)+Parity || (1001) +Parity ]

[1101000   0111001  ]

[ (1000)* G || (1001) * G ]

In Packet structure,

NCBitStream

In EDBitStream Structure

 

In ECBitStream Structure

 


Related Discussions:- Bit stream structure

Packet, a transperent switch is inserted between two local area networks AB...

a transperent switch is inserted between two local area networks ABC and XYZ.network ABC has workstation 1,2,and 3 and Network XYZ has workstation 4,5, and 6. show the contents of

Memory pools-input and output pool-pci pool, Memory Pools IOS manages a...

Memory Pools IOS manages available free memory thorugh  memory pool series, which are essentially heaps in the generic sense; each pool is a set of memory blocks that can be al

Authentication in ppp - point to point , Authentication in PPP PPP can ...

Authentication in PPP PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpo

What is ring topology, What is Ring topology The network consists of a ...

What is Ring topology The network consists of a set of repeaters joined by point-to-point links in a closed loop. Each station attaches to the network at a repeater and can tra

State the network environment of intranets and internet, State the Network ...

State the Network environment of Intranets and Internet Intranets as well as the Internet are based purely on networks, the company intending to install Intranet must consider

IPV6, is DVMRP multicast prtocol supports IPV6?

is DVMRP multicast prtocol supports IPV6?

How is computer networks used in sales and marketing, Q. How is computer ne...

Q. How is computer networks used in sales and marketing?  Marketing and sales:   Computer networks are used extensively in both marketing and sales organizations. Marketing pr

Password authentication protocols (pap), Password Authentication Protocols ...

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

Networking, can we correct errors using crc?

can we correct errors using crc?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd