11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2: Introduction to Digital Communication Systems <strong>and</strong> <strong>Network</strong>s 7<br />

An encryptor provides security to the transmitted data. In cryptology, there are two<br />

types of security, which are theoretical security <strong>and</strong> practical security. They are based<br />

on different philosophies. Theoretical security, on the one h<strong>and</strong>, is based on theoretical<br />

impossibility of ciphers being broken, necessitating mutual knowledge of a secret key<br />

between transmitter <strong>and</strong> receiver.<br />

Practical security, on the other h<strong>and</strong>, is based on<br />

practical difficulty of ciphers being broken, i.e., it takes too much time <strong>and</strong> labor to break<br />

them. The questions regarding how these two types of security are implemented will be<br />

dealt with in Part III.<br />

A channel encoder introduces some redundancy to the input data so that the output<br />

is immune to deteriorating effects, such as errors <strong>and</strong> erasures, from the channel. There<br />

are numerous channel codes <strong>and</strong> several ways to classify them. They can be divided into<br />

block codes <strong>and</strong> convolutional codes, fixed-rate <strong>and</strong> rateless codes, or linear <strong>and</strong> non-linear<br />

codes. In this thesis, we will consider linear rateless codes called LT-codes in Chapter 5.<br />

The purpose of a digital modulator is to map the binary representation after channel<br />

encoding into electromagnetic waves that can be transmitted along the channel.<br />

The<br />

simplest digital modulation is called binary modulation, which maps the binary digit 0<br />

into a waveform s o (t) <strong>and</strong> the binary digit 1 into s 1 (t). This means each bit is transmitted<br />

in a separated waveform. In M-ary modulation (M > 2), however, M = 2 m waveforms<br />

s i (t), i = 0, 1, ..., M − 1 are used to represent m bits [30].<br />

The communication channel is the physical medium used for transmission, e.g., the<br />

free space in wireless communication. In the design <strong>and</strong> analysis of digital communication<br />

systems, communication channels are represented by channel models, which are mathematical<br />

abstractions of these physical entities. We will discuss some channel models in<br />

the next section.<br />

A digital demodulator, a channel decoder, a decryptor, <strong>and</strong> a source decoder perform<br />

reversed operations of a digital modulator, a channel encoder, an encryptor, <strong>and</strong> a source<br />

encoder, respectively. Their overall purpose is to give the binary sink the data which is<br />

as close as possible to that generated by the binary source.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!