GHANA TECHNOLOGY UNIVERSITY COLLEGE (GTUC)
PROJECT TOPIC PROPOSAL
DEPARTMENT OF TELECOMMUNICATION ENGINEERING
TITLE
PERFORMANCE COMPARISON OF DIFFERENT ERROR CORRECTION CODES IN A WIRELESS DIGITAL COMMUNICATION SYSTEM
BY:
DJAN DENNIS MINTAH B010113007 ABOAGYE – AMPOFO GEORGE KOFI B010113067
INTRODUCTION
Wireless Communication has gained prominence over the years and with technological advances and wireless techniques the world has become a global village making communication easy and accessible. One major factor that has helped to achieve this feat is the ability of these wireless communication systems to provide reliable and efficient communication links to almost anybody at any location in the world at relatively low cost and comparatively
…show more content…
Forward error correction (FEC) codes can be used to make transmission of information across such noisy channels possible with arbitrarily low probability of error. These forward error correction codes come in different forms and types.
OBJECTIVE OF THE PROJECT
The main objectives of this project are highlighted as follows
• To implement a convolutional error correction code over AWGN and RAYLEIGH channels.
• To implement a low density parity check(LDPC) correction code over AWGN and RAYLEIGH channels.
• To simulate a digital communication system to transmit text reliably using convolutional codes.
• To simulate a digital communication system to transmit image reliably using convolutional codes.
• To investigate the performance of the chosen error correction codes using various performance metric and also the cost in implementing them.
SIGNIFICANCE OF THE
In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to the end of data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number. Error correction code (ECC) techniques have been widely used to correct transient errors and improve the reliability of memories.here we were tried for FFT. Figure 7:synthesis diagram of SOS based ECC for FFT. The figure 7 is desinged by using verilog language with xilinix synthesis tool.for this design we had to use 4 to 8 bit Fault FFT with ECC Concept. The ECC codes utilize the less area than previous module.
When one receives a signal, it must wait for the transmitter to stop transmitting, before replying. In these half-duplex systems, if more than one emits a transmission at the same time, a collision will occurs and messages will be lost. The messages sent by nodes are corrupted. The receiving nodes receive random data.
Valid values are 0 to 8. data – Up to 64 bits of application data may be transmitted.
4.11 Motor A DC motor is an electrical machine which converts electrical energy into mechanical energy. A magnetic field is generated by the current carrying conductor and when this system is placed in external magnetic field then the force is exerted which is proportional to the strength of the external magnetic field and to the current in the conductor, then motor will rotate. If the direction of current is reversed then the direction of rotation of motor will also reverse.
We model the time-variations of each of the channels by a first-order Gaussian autoregressive process whose parameters are selected in such a way that their autocorrelation values match to the autocorrelation of the fading process of their corresponding channels. The fourth channel model,
Secret code is applied to the message and hashed and is sent to the receiver 6. Secret code is applied to the message and hashed and this hashed message is encrypted and sent to the receiver. It is used in digital signatures the hash is encrypted using sender’s private key and then encrypted using public key and sent to the receiver and the receiver decrypts the message using the private key. It is used in password storage A good system does not store the plaintext equivalent but store something else which include some randomness .so
Answer 22: There are two options of either counting the data or the bytes while numbering the sequences of data. Answer 23: Error correction is option when the transmitted data contains redundant information, there are huge delays in transmitting the data or there is special need for
Illustrate how a mobile station dynamically perform timing advance, adjust power level and perform handover operation 8. Describe advanced digital
Error Code: 0x80096004 Keyword: 0x80096004 Product Name: Max Utilities When you are facing different kinds of issues linked with the error code 0x80096004 you must download Max Utilities to remove those problems. Title: The perfect way to deal with the error 0x80096004 Sometimes while you are using a computer certain difficulties crop up. You may face an error code like 0x80096004 when you are trying to download or install an application.
This new development made it possible to detect errors faster and easier than before. It also was a much more
Before each location data UDP transmission, device-side APIs are checked to assess the current level of cellular signal and determine if a
Network internet layer This can be used to set the border line of what people can think of about the network. With this layer it will be able to interconnect with networks and will decide how the layers can do this process. It will be able to can concentrate and determine how the data will get from one remote network to the computer. Also it will take care with devices which are local. This is mainly tasked to take care of is routing which allows data to be moved the data across the series of networks which are connected.
Data Communication protocols are formal descriptions of data formats and rules in which the more than one system exchanges data /information. The protocols cover various issues such as authentication, error detection and correction. Popular network communications protocols used are the TCP/IP and User Datagram Protocol (UDP), while TCP is connection oriented once a connection is established, UDP connectionless Internet protocol. The model for information exchange includes the data source which generates the data to be transmitted, Transmitter which converts the data into transmittable signals, Transmission system which carries the data, Receiver which converts received signals into data and Destination which takes incoming data. TCP/IP uses
The world we live in today is predominately changing with the advancement of digital communication in the daily aspects of our life. The rapid growth and evolution of digital communication, has resulted in it now becoming the backbone of the way we interact with other people. Beginning from simple 160-character SMS messages to text’s influence on the internet including Facebook, Twitter, Blogs and Instagram and then introduced on our mobile phones with BBM and whatsapp; digital communication has become a part of our spoken discourse. Digital communication in every aspect has impacted our lives as it helps jobs and businesses communicate a lot faster through e-mail, multimedia and texting.
Task 2 2B Digital technology ¬– a health threat? We live in a rapidly changing, highly technological world, where the present day digital technology affects several parts of our lives. At work, people use digital technology to communicate, gather information and solve problems relevant to their place of work. A growing number of people also use digital technology at home, to keep in touch with friends and family, check bank balances, play interactive games, participate in online forums and interact with others on social media websites and mobile apps, such as Facebook, Twitter and Instagram.