Beruflich Dokumente
Kultur Dokumente
1. INTRODUCTION
The last ten years have seen the appearance of a new type of correction code -
the turbo code. This represents a significant development in the field of error-
correcting codes. The principle of decoding is to be found in an iterative exchange of
information between elementary decoders, called extrinsic information, and it is this
principle from which the term turbo originates. The turbo concept is now applied to
block codes as well as other parts of a digital transmission system, such as detection,
demodulation. Applications that integrate turbo codes into their standards are mobile
communications, wireless networks and local radio loops. Future applications could
include cable transmission, short-distance communication or data storage includes
cable transmission, short-distance communication or data storage.
Use “soft information” from output of one operation to assist with the other operation.
4. TYPES OF ERRORS
errors
The term single bit error means that only one bit of given data unit is
changed from 1 to 0 or from 0 to 1. In single bit error only one bit in the data unit has
changed.
0 0 0 0 1 0 1 0
↑
0 changed to 1
↑
0 0 0 0 0 0 1 0
Example:
If 8 wires are used to send all of the 8 bits of a byte at the sametime and one of
the wires is noisy one bit can be corrupted in each time.
BURST ERROR
A burst error means that two or more bits in the data unit have changed.
0 0 0 1 1 0 1 0
↓ ↓
0 0 1 1 1 1 1 0
Figure shows the effect of burst error on a data unit.In this case
‘00011010 ‘ was send but ‘00111110’ was received.The length of the burst is
measured from the first corrupted bit to the last corrupted bit.Burst error is most
likely to happen in a serial communication.the number of bits affected depends on the
data rate and duration of noise.
5. ERROR DETECTION
Detection:
We can de detect many errors during transmission
Redundancy:
One error detection mechanism allows to send every data unit twice. the
receiving device would them be able to do a bit for bit comparison between the two
versions of the data, instead of repeating the entire data stream ,a shorter groups of
bits may be appended to the end of each unit. This technique is called redundancy.
Error detection uses the concept of redudundancy, means adding extra bits to
detecting errors at the destination.
Detection Methods
A.VRC
B.LRC
C.CRC
D.CHECKSUM
In a vertical redundancy check the parity bit is added to every data unit. So that the
total number of 1’s becomes even. It is most common and least expensive mechanism.
Performance:
VRC cannot detect errors where the total number of bits changed is even. If any two
bits change in transmission ,the changes cancel each other and the data unit will pass
a parity check even though the data unit is damaged.The same holds true for any even
number of errors.VRC can detect all single-bit errors.It can detect burst errors only if
the total number of errors in each data unit is odd.
A block of bits organized in a table. a block of bits divided into rows and a
redundant row of bits is added to the whole block. These two are based on addition.
Performance:
LRC detecting burst errors .If two bits in one unit are damaged and two bits in
exactly the same positions in another data unit are also damaged, the LRC checker
will not detect an error.
CRC is based on binary division. In CRC a no: of redundant bits, called CRC
remainder is appended to the end of data units so that the redundancy data unit
becomes exactly divisible by a second, predetermined binary number. As its
destination the incoming data units is divided by the same number. If at this step there
is no remainder, the data unit is accepted. The remainder indicates that the data units
have been damaged in transmit and must be rejected.
Performance
CRC is very effective error detection method.CRC can detect all burst errors
that affect an odd number of bits.
5. D) Checksum
The error detection method used by the higher layer protocols is called
checksum. In the sender the checksum generator subdivides the data units in to equal
segments of n bits. These segments are added together using 1’s complement
arithmetic. The total is then complemented and appended to the end of the original
data units is redundancy bits, called the checksum failed.The extended data unit is
transmitted across the network. So if the sum of the data segment T, The checksum
will be –T.
6. ERROR CORRECTION
This can be handled in two ways. In one when an error is discovered the
receiver can have the sender retransmit the entire data units. In other, a receiver can
use an error correcting code, which automatically corrects certain errors.It requires
more redundancy bits than detection codes.
A bit has two states 0 and 1.an errors occurs when receiver reads a 1 bit 0 or a
0 bit as a 1.to correct the error the receiver simply reverse the value of the altered bit.
6. B) Hamming code:
It can be applied to data units of any length and uses the relationships between
data and redundancy. The number of redundancy bits required to make these
corrections, in dramatically higher than that required for single bit correction.
Block Turbo Code (BTC) is a type of turbo codes. . Block Turbo-codes (BTC) are
promising forward error correction (FEC) codes providing close-to-optimal coding
gain for rather high coding rate (R > 0.7) and less subject to an error floor than
Convolution Turbo Codes (CTC).
8. CONVOLUTIONAL CODE
dk
RSC1
Interleaver
π
RSC2
The original Turbo code used a parallel concatenation of two relatively simple
recursive systematic covolutional (RSC) codes with large interleaving. Although the
component codes are weak, the output turbo code word is very powerful due to the
“Interleaver gain” which produces a random-like overall codeword or floor than
Convolution Turbo Codes (CTC).
9. TURBO DECODING
Information about the decoded input bits is passed iteratively between the two
decoders.
Interleaver
The interleaver’s function is to permute low weight code words in one encoder
into high weight code words for the other encoder.
Most input sequences are associated with parity sequences that are not self-
terminating.
Input sequences with self-terminating parity sequences form terminating code words.
The original Turbo code used a parallel concatenation of two relatively simple
recursive systematic convolutional (RSC) codes with large interleaving.
Although the component codes are weak, the output turbo code word is very
powerful due to the “Interleaver gain” which produces a random-like overall
codeword.
The goal is to describe the main ideas behind the new class of codes called
turbo codes, whose performance in terms of bit error probability has been shown to be
very close to the Shannon limit. A numerical example, using a simple concatenated
coding scheme, provides a vehicle for illustrating how error performance can be
improved when soft outputs from the decoders are used in an iterative decoding
process.
ADVANTAGES
Of all practical error correction methods known to date, turbo codes and low-
density parity-check codes (LDPCs) come closest to approaching the Shannon limit,
the theoretical limit of maximum information transfer rate over a noisy channel.
Turbo codes make it possible to increase data rate without increasing the
power of a transmission, or they can be used to decrease the amount of power used to
transmit at a certain data rate. Their main drawbacks are the relatively high decoding
complexity and relatively high latency, which make them unsuitable for some
applications. For satellite use, this is not of great concern, since the transmission
distance itself introduces latency due to the finite propagation speed.
DISADVANTAGES
Their main drawbacks are the relatively high decoding complexity and
relatively high latency, which make them unsuitable for some applications. For
satellite use, this is not of great concern, since the transmission distance itself
introduces latency due to the finite propagation speed.
15.LAYERED ARCHITECTURE
a. Physical layer
b. Data link layer
c. Network layer
d. Transport layer
e. Session layer
f. Presentation layer
g. Application layer
PHYSICAL LAYER:
This is the lowest layer in a communication system and is responsible for the
conversion of a stream of bits into signal that can be transmitted on the other
side. The receiver at the other physical layer converts back the signals to streams.
The main task of this layer includes multiplexing of different data streams,
correction of transmission errors .The data link layer is responsible for a reliable
point to point connection between two devices or a point to multipoint connection
between one sender and several receivers.
NETWORK LAYER:
TRANSPORT LAYER:
SESSION LAYER:
The session layer is the network dialog controller. It establishes maintains the
interaction between communicatng systems.It allows the communication between two
processes to take place in half-duplex or full-duplex.
PRESENTATION LAYER:
APPLICATION LAYER:
The application layer enables the user, to access the network, it provides user
interface and support for mail such as electronic mail, file transfer, shared database
management system etc.
16.CONCLUSION
17.REFERENCES
Websites:
1) www.wikipedia.org
2) www.ieee.org
3) www.turbo-codes.com
4) www.lib-asc.ekm.org