?
Solved

byte interleaving and bit interleaving?

Posted on 2000-04-14
2
Medium Priority
?
3,226 Views
Last Modified: 2012-05-04
in the following sentence:

byte interleaving 24 DS-0 to form the DS-1 and bit interleaving 3 DS-1s to form the DS-2 signal


what is the difference between :byte interleaving and bit interleaving?

0
Comment
Question by:syu2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Accepted Solution

by:
apadua earned 200 total points
ID: 2718008
The difference is that when you do bit interleaving, you put one bit from each sequence on the stream. When you do byte interleaving, you put a full byte from each sequence on the stream. Sor of like this:

Sequence 1:
1234567890abcdefghijklmnopqrstuv

Sequence 2:
abcdefghijklmnopqrstuv1234567890

Bit interleaving would be:

1a2b3c4d5e6f7g8h9i0jakblcmdneofpgqhrisjt

Byte interleaving would be:

12345678abcdefgh90abcdefijklmnopghijklmn


I can't really tell you the advantage or disadvantage of each one. My guess would be that if you do byte interleaving, maintaining things synchronous would be simpler. Also, if you lose one or two bits, you'd lose only one byte, and not more. My guess only, so if someone is very experienced, feel free to punch holes.


Cheers,

Andre
0
 

Author Comment

by:syu2
ID: 2724356
thanks lot , for your help, it make sense to me
0

Featured Post

Don't Cry: How Liquid Web is Ensuring Security

WannaCry is just the start. Read how Liquid Web is protecting itself and its customers against new threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
This program is used to assist in finding and resolving common problems with wireless connections.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question