11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6 Chapter 2: Introduction to Digital Communication Systems <strong>and</strong> <strong>Network</strong>s<br />

Binary<br />

Source<br />

Source<br />

Encoder<br />

Channel<br />

Encoder<br />

Digital<br />

Modulator<br />

Channel<br />

Binary<br />

Sink<br />

Source<br />

Decoder<br />

Channel<br />

Decoder<br />

Digital<br />

Demodulator<br />

Figure 2.1: A basic digital communication system<br />

To make the system secure, however, we need to insert two more blocks, which are<br />

encryptor <strong>and</strong> decryptor, as shown in Fig. 2.2.<br />

Binary<br />

Source<br />

Source<br />

Encoder<br />

Encryptor<br />

Channel<br />

Encoder<br />

Digital<br />

Modulator<br />

Channel<br />

Binary<br />

Sink<br />

Source<br />

Decoder<br />

Decryptor<br />

Channel<br />

Decoder<br />

Digital<br />

Demodulator<br />

Figure 2.2: A secure digital communication system<br />

A digital transmitter consists of four basic elements, which are a binary source, a<br />

source encoder, a channel encoder, <strong>and</strong> a digital modulator, whereas a digital receiver is<br />

composed of a digital demodulator, a channel decoder, a source decoder, <strong>and</strong> a binary<br />

sink.<br />

A binary source in the transmitter generates information to be transmitted, be it<br />

audio, speech, or video data, in a binary representation.<br />

Usually, this representation<br />

is not the most economical one possible, i.e., it is possible to squeeze it into a shorter<br />

string of 0s <strong>and</strong> 1s without reducing the amount of information, or reducing only some<br />

insignificant amount of it. The source encoder is made for this task. It transforms the<br />

data into another binary representation with less redundancy. These two blocks, however,<br />

are not the focus of this thesis.<br />

Our concern in the thesis ranges from the third block, the encryptor, to the ninth block,<br />

the decryptor. Although the encryptor in Fig. 2.2 locates right after the source encoder,<br />

it is not necessarily the case when we consider some new cryptographic technologies, for<br />

example, physical-<strong>layer</strong> security <strong>and</strong> physical-<strong>layer</strong> secret-key generation, which will be<br />

discussed in detail in Part III.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!