CIS 321 Data Communications & Networking

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Advertisements

10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Information Technologies
PART III DATA LINK LAYER. Position of the Data-Link Layer.
The Data Link Layer Chapter 3. Position of the data-link layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 expanded by Jozef Goetz PART III.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Chapter 10 Error Detection and Correction
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Error Detection and Correction : Data Link Layer.
1 Kyung Hee University Data Link Layer PART III. 2 Kyung Hee University Position of the data-link layer.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
British Computer Society
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Cyclic Redundancy Check CRC Chapter CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword.
Unit 5 Lecture 2 Error Control Error Detection & Error Correction.
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, October 2011.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
10/27/ Data Link Layer - Lin 1 CPET/ECET Data Link Layer Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical.
Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.
Lecture 5 Checksum. 10.2CHECKSUM Checksum is an error-detecting technique that can be applied to a message of any length. In the Internet, the checksum.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
Lecture Focus: Data Communications and Networking  Data Link Layer  Error Control Lecture 19 CSCS 311.
Error Detection.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
1 Kyung Hee University Error Detection and Correction.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Part III: Data Link Layer Error Detection and Correction
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
10.1 Types of Errors 10.2 Detection 10.3 Error Correction.
CS4470 Computer Networking Protocols
Error Detection and Correction
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Introduction to Information Technologies
ERROR DETECTION AND CORRECTION
Data Link Layer.
Part III. Data Link Layer
Error Detection and Correction
Subject Name: COMPUTER NETWORKS-1
Part III Datalink Layer 10.
Data Link Layer.
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, August 2010.
Packetizing Error Detection
Packetizing Error Detection
PART III Data Link Layer.
Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted during transmission. For.
Chapter 7 Error Detection and Correction
Chapter 9 Error Detection and Correction
Introduction to Information Technologies
DATA COMMUNICATION Lecture-35.
Packetizing Error Detection
DATA COMMUNICATION Lecture-33.
Protocols and the TCP/IP Suite
Chapter 9 Error Detection and Correction
Error Detection and Correction
Error Detection and Correction
Error Detection and Correction
DATA COMMUNICATION Lecture-34.
Data Link Layer. Position of the data-link layer.
Presentation transcript:

CIS 321 Data Communications & Networking Chapter 10 – Error Detection and Correction

Part 3 - Data Link Layer Receives services from physical layer and provides services to network layer University of South Alabama Computer and Information Sciences

Data Link Layer (cont.) Node-to-node delivery Local responsibility Ensures reliable delivery Defines frames Physical addressing Error control Flow control Medium access control University of South Alabama Computer and Information Sciences

Chapter 10 Error Detection and Correction Errors are inevitable Interference Corruption as a result of transmission Reliable communication is dependent on being able to detect and correct errors How will we know an error occurred? Do we retransmit or correct? University of South Alabama Computer and Information Sciences

Types of Errors Single-bit error Burst error University of South Alabama Computer and Information Sciences

Single-bit Errors Only one bit is changed: 0 changed to 1, or a 1 to a 0 Least likely type of error since noise usually lasts longer than the time to send one bit More likely in parallel transmission University of South Alabama Computer and Information Sciences

Burst Errors Two or more bits in data unit are in error, not necessarily consecutive in order Most likely in serial transmission Number of bits affected depend on data rate and noise duration University of South Alabama Computer and Information Sciences

10.2 Detection Need to detect before message is processed Redundancy may be used to add additional bits to a message for error control Process must be handled by destination University of South Alabama Computer and Information Sciences

Redundancy University of South Alabama Computer and Information Sciences

Detection Methods Parity Check Cyclical Redundancy Check (CRC) Checksum Parity and CRC are performed by data link layer; checksum performed by higher-layer protocols University of South Alabama Computer and Information Sciences

Parity Check Most common and least expensive In even-parity, a redundant bit (parity bit) is appended to every data unit so total number of 1 bits is even; odd-parity – total should be odd University of South Alabama Computer and Information Sciences

Even-parity Check University of South Alabama Computer and Information Sciences

Example 1 Suppose the sender wants to send the word world. In ASCII the five characters are coded as 1110111 1101111 1110010 1101100 1100100 The following shows the actual bits sent 11101110 11011110 11100100 11011000 11001001 University of South Alabama Computer and Information Sciences

Example 2 Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission. 11101110 11011110 11100100 11011000 11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted. University of South Alabama Computer and Information Sciences

Example 3 Now suppose the word world in Example 1 is corrupted during transmission. 11111110 11011110 11101100 11011000 11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission. University of South Alabama Computer and Information Sciences

Simple Parity Performance Can detect all single-bit errors May detect all burst errors as long as total number of bits changed is odd Cannot detect errors when total number of bits changed is even since parity check will pass even though errors had occurred University of South Alabama Computer and Information Sciences

Two-Dimensional Parity Check Data unit is divided into rows and columns; parity checks are performed on corresponding bits of each column University of South Alabama Computer and Information Sciences

Two-Dimensional Parity University of South Alabama Computer and Information Sciences

Two-Dimensional Parity Performance Increases likelihood of detecting burst errors LRC of n bits can easily detect a burst error of n bits May also detect many burst errors of more than in n bits Cannot detect errors when two bits in one data unit are damaged and two bits in exactly the same positions in another data unit are damaged University of South Alabama Computer and Information Sciences

Cyclic Redundancy Check (CRC) Parity checks based on addition; CRC based on binary division A sequence of redundant bits (a CRC or CRC remainder) is appended to the end of the data unit These bits are later used in calculations to detect whether or not an error had occurred University of South Alabama Computer and Information Sciences

CRC Steps On sender’s end, data unit is divided by a predetermined divisor; remainder is the CRC When appended to the data unit, it should be exactly divisible by a second predetermined binary number At receiver’s end, data stream is divided by same number If no remainder, data unit is assumed to be error-free University of South Alabama Computer and Information Sciences

Deriving the CRC A string of 0s is appended to the data unit; n is one less than number of bits in predetermined divisor New data unit is divided by the divisor using binary division; remainder is CRC CRC of n bits replaces appended 0s at end of data unit University of South Alabama Computer and Information Sciences

CRC Generator and Checker University of South Alabama Computer and Information Sciences

CRC Generator Uses modulo-2 division Resulting remainder is the CRC University of South Alabama Computer and Information Sciences

CRC Checker Performed by receiver Data is appended with CRC Same modulo-2 division If remainder is 0, data are accepted Otherwise, an error has occurred University of South Alabama Computer and Information Sciences

Polynomials Used to represent CRC generator Cost effective method for performing calculations quickly University of South Alabama Computer and Information Sciences

Standard Polynomials Name Polynomial Application CRC-8 x8 + x2 + x + 1 ATM header CRC-10 x10 + x9 + x5 + x4 + x 2 + 1 ATM AAL ITU-16 x16 + x12 + x5 + 1 HDLC ITU-32 x32 + x26 + x23 + x22 + x16 + x12 + x11 + x10 + x8 + x7 + x5 + x4 + x2 + x + 1 LANs University of South Alabama Computer and Information Sciences

CRC Performance Can detect all burst errors affecting an odd number of bits Can detect all burst errors of length less than or equal to degree of polynomial Can detect with high probability burst errors of length greater than degree of the polynomial University of South Alabama Computer and Information Sciences

Checksum Performed by higher-layer protocols Also based on concept of redundancy University of South Alabama Computer and Information Sciences

Checksum Generator At sender, checksum generator subdivides data unit into k equal segments of n bits Segments are added together using one’s complement arithmetic to get the sum Sum is complemented and becomes the checksum, appended to the end of the data University of South Alabama Computer and Information Sciences

Checksum University of South Alabama Computer and Information Sciences

Checksum Checker Receiver subdivides data unit in k sections of n bits Sections are added together using one’s complement to get the sum Sum is complemented If result is zero, data are accepted; otherwise, rejected University of South Alabama Computer and Information Sciences

Performance Detects all errors involving odd number of bits, most errors involving even number of bits Since checksum retains all carries, errors affecting an even number of bits would still change the value of the next higher column and the error would be detected If a bit inversion is balanced by an opposite bit inversion, the error is invisible University of South Alabama Computer and Information Sciences

10.3 Error Correction Requires more redundancy bits; must know not only that an error had occurred, but where the error occurred in order to correct it Correction simply involves flipping the bit Hamming code may be applied to identify location where error occurred by strategically placed redundancy bits University of South Alabama Computer and Information Sciences

Redundancy Bits University of South Alabama Computer and Information Sciences

Example Hamming Code For a seven-bit data sequence r1: bits 1, 3, 5, 7, 9, 11 r2: bits 2, 3, 6, 7, 10, 11 r3: bits 4, 5, 6, 7 r4: bits 8, 9, 10, 11 University of South Alabama Computer and Information Sciences

Example Hamming Code University of South Alabama Computer and Information Sciences

Error Detection using Hamming Code University of South Alabama Computer and Information Sciences

Burst Error Correction By rearranging the order of bit transmission of the data units, the Hamming code can correct burst errors Organize N units in a column and send first bit of each, followed by second bit of each, and so on Hamming scheme then allows us to correct corrupted bit in each unit University of South Alabama Computer and Information Sciences

Burst Error Correction Example University of South Alabama Computer and Information Sciences

Coming Up… Chapter 11 Data Link Control and Protocols Flow Control Error Control Protocols University of South Alabama Computer and Information Sciences

Credits All figures obtained from publisher-provided instructor downloads Data Communications and Networking, 3rd edition by Behrouz A. Forouzan.  McGraw Hill Publishing, 2004 University of South Alabama Computer and Information Sciences