Network Technologies essentials Week 2: Physical layer & direct links Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall,

Slides:



Advertisements
Similar presentations
Physical Layer: Signals, Capacity, and Coding
Advertisements

COS 461 Fall 1997 Data Link Layer u Today: LANs other than Ethernet –token rings –switched networks –cellular technology u remaining issues –error detection.
5-1 Data Link Layer l Objective: to achieve reliable and efficient communication between 2 adjacent machines l Data link layer design issues n services.
Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 12 Layer 2 – Data Link Layer Protocols
Introduction to Information Technologies
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
Chapter 6 Errors, Error Detection, and Error Control.
Transmission Errors Error Detection and Correction
Computer Science & Engineering Introduction to Computer Networks Overview of the Physical Layer.
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Sixth Edition.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
The Data Link Layer Chapter 3. Position of the data-link layer.
1 ITC242 – Introduction to Data Communications Week 10 Topic 16 Data link control.
Data Communications Chapter 7 Error Detection. Despite the best prevention techniques, errors may still happen. To detect an error, something extra has.
Chapter 2 : Direct Link Networks (Continued). So far... Modulation and Encoding Link layer protocols Error Detection -- Parity Check.
Chapter 6 Errors, Error Detection, and Error Control
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Reliability and Channel Coding
CS352- Link Layer Dept. of Computer Science Rutgers University.
Error Detection and Correction
Data link layer: services
Network Technologies essentials Week 4: Internetworking Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University of.
Network Technologies essentials Week 8: TCP congestion control Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Modulation, Multiplexing, & Public Switched Telephone.
Network Technologies essentials Week 9: Applications: DNS and HTTP Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University.
Network Technologies essentials Week 9: Distributed file sharing & multimedia Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall,
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
British Computer Society
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
Network Technologies essentials Week 5: Routing Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University of Washington.
Part 2: Packet Transmission Packets, frames Local area networks (LANs) Wide area networks (LANs) Hardware addresses Bridges and switches Routing and protocols.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSE 461 University of Washington1 Where we are in the Course Beginning to work our way up starting with the Physical layer Physical Link Network Transport.
Networking and Communication Greg Drysdale Oct. 28, 2008 CS147 Section 3.
Network Technologies essentials Week 3: Retransmission, sharing links, switching Compilation made by Tim Moors, UNSW Australia Original slides by David.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
CSE 461 University of Washington1 Where we are in the Course Finishing off the Link Layer! – Builds on the physical layer to transfer frames over connected.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Detection (§3.2.2)
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Block Coding Messages are made up of k bits. Transmitted packets have n bits, n > k: k-data bits and r-redundant bits. n = k + r.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Coding Overview (§3.2)
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
Dr. Clincy Professor of CS
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Introduction to Information Technologies
ERROR DETECTION AND CORRECTION
Dr. Clincy Professor of CS
The Three Main Sources of Transmission Errors
Where we are in the Course
Advanced Computer Networks
CIS 321 Data Communications & Networking
Part III Datalink Layer 10.
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
2012 session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken from: Computer.
Introduction to Information Technologies
The Data Link Layer Chapter
Error Detection Neil Tang 9/26/2008
COMPUTER NETWORKS CS610 Lecture-5 Hammad Khalid Khan.
Presentation transcript:

Network Technologies essentials Week 2: Physical layer & direct links Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University of Washington ISBN-10: © 2014 For the book A. Tanenbaum and D. Wetherall: Computer Networks, 5 th ed, Prentice-Hall, 2011A. Tanenbaum and D. Wetherall: Computer Networks, 5 th ed, Prentice-Hall, 2011 Tim added green graffiti

Message Latency (2) Latency is the delay to send a message over a link – Transmission delay: time to put M-bit message “on the wire” T-delay = M (bits) / Rate (bits/sec) = M/R seconds – Propagation delay: time for bits to propagate across the wire P-delay = Length / speed of signals = Length / ⅔c = D seconds – Combining the two terms we have: L = M/R + D Computer Networks

Computer Networks3 Bandwidth-Delay Product Messages take space on the wire! The amount of data in flight is the bandwidth-delay (BD) product BD = R x D – Measure in bits, or in messages – Small for LANs, big for “long fat” pipes

Signals over a Wire What happens to a signal as it passes over a wire? 1.The signal is delayed (propagates at ⅔c) 2.The signal is attenuated (goes for m to km) 3.Frequencies above a cutoff are highly attenuated 4.Noise is added to the signal (later, causes errors) Computer Networks4 EE: Bandwidth = width of frequency band, measured in Hz CS: Bandwidth = information carrying capacity, in bits/sec 2-3.5

Passband Modulation (3) Computer Networks5 NRZ signal of bits Amplitude shift keying Frequency shift keying Phase shift keying

Computer Networks6 Shannon Capacity (2) Shannon limit is for capacity (C), the maximum information carrying rate of the channel: C = B log 2 (1 + S/N) bits/sec 2-5.7

Bit Stuffing (3) So how does it compare with byte stuffing? Computer Networks7 Transmitted bits with stuffing Data bits Tim added green graffiti 3a-2.12 Coursera 2-7

Computer Networks8 Approach – Add Redundancy Error detection codes – Add check bits to the message bits to let some errors be detected Error correction codes – Add more check bits to let some errors be corrected Key issue is now to structure the code to detect many errors with few check bits and modest computation 3a-3.4 Coursera 2-8

Computer Networks9 Using Error Codes (2) Receiver: – Receive D+R bits with unknown errors – Recompute R check bits based on the D data bits; error if R doesn’t match R’ DR’ Data bits Check bits R=fn(D) =? 3a-3.8 Coursera 2-8

Computer Networks10 Simple Error Detection – Parity Bit Take D data bits, add 1 check bit that is the sum of the D bits – Sum is modulo 2 or XOR 3a-4.3 Coursera 2-9

Computer Networks11 Internet Checksum (3) Sending : 1.Arrange data in 16-bit words 2.Put zero in checksum position, add 3.Add any carryover back to get 16 bits 4.Negate (complement) to get sum 0001 f203 f4f5 f6f7 +(0000) ddf0 ddf ddf2 220d 3a-4.8 Coursera 2-9

Computer Networks12 CRCs (3) Send Procedure: 1.Extend the n data bits with k zeros 2.Divide by the generator value C 3.Keep remainder, ignore quotient 4.Adjust k check bits by remainder Receive Procedure: 1.Divide and check for zero remainder 3a-4.14 Coursera 2-9

Computer Networks13 Hamming Code (3) Example: data=0101, 3 check bits – 7 bit code, check bit positions 1, 2, 4 – Check 1 covers positions 1, 3, 5, 7 – Check 2 covers positions 2, 3, 6, 7 – Check 4 covers positions 4, 5, 6, p 1 = = 0, p 2 = = 1, p 4 = = a-5.9 Coursera 2-10

Computer Networks14 Detection vs. Correction (4) Error correction: – Needed when errors are expected – Or when no time for retransmission Error detection: – More efficient when errors are not expected – And when errors are large when they do occur 3a-5.21 Coursera 2-10

END © 2013 D. Wetherall Slide material from: TANENBAUM, ANDREW S.; WETHERALL, DAVID J., COMPUTER NETWORKS, 5th Edition, © Electronically reproduced by permission of Pearson Education, Inc., Upper Saddle River, New Jersey Computer Networks15