Fundamentals of Computer Networks ECE 478/578 Lecture #3: Encoding and Framing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.

Slides:



Advertisements
Similar presentations
CSCI-1680 Physical Layer Link Layer I Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Advertisements

Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover.
Lecture 3, 1Spring 2003, COM1337/3501CCN: Direct Link Networks Direct Link Networks Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie,
Chapter 2 Fundamentals of Data and Signals
Lecture 26 Physical Layer Ch 4: Digital Transmission
1/15 KLKSK Pertemuan III Analog & Digital Data Shannon Theorem xDSL.
Lab 2 COMMUNICATION TECHNOLOGY II. Capacity of a System The bit rate of a system increases with an increase in the number of signal levels we use to denote.
Spring 2002CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
1 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
The OSI Reference Model
VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can.
Spring 2004 EE4272 Direct Link Networks (I) Hardware Building Blocks (nodes & links) 5 Issues before Exchanging Packets  Encoding  Framing  Error Detection.
Spring 2003CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
CS 164: Slide Set 3: Chapter 2 Direct Link Networks.
Framing and Encoding EECS 122: Lecture 26 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Reliability and Channel Coding
Katz, Stoica F04 EE122: Encoding & Framing November 17, 2003.
Error Detection and Reliable Transmission EECS 122: Lecture 24 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Computer Networks: Bit and Byte Stuffing 1 Bit and Byte Stuffing.
Review: The application layer. –Network Applications see the network as the abstract provided by the transport layer: Logical full mesh among network end-points.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
EE 122: Encoding And Framing Ion Stoica September 9, 2002.
ECE 4450:427/527 - Computer Networks Spring 2015
CSCI-1680 Physical Layer Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
CSE331: Introduction to Networks and Security Lecture 3 Fall 2002.
Computer Communication & Networks Lecture # 05 Physical Layer: Signals & Digital Transmission Nadeem Majeed Choudhary
CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
Advanced Computer Networks Chapter 2: Direct Link Networks.
Lecture 6: Framing and Error Detection-Data Link Layer Functions
27-Oct-15Computer Networks1 Outline Chapter 2: Direct Link Networks Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
CSE 461: Bits and Bandwidth Next Topic  Focus: How do we send a message across a wire?  The physical / link layers: 1. Different kinds of media 2.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
Layer Two Data Link Layer Collects bits from layer 1 and organizes into frames Passes bits that make up frames to layer 1 for transmission Concerned with.
Fall 2000Datacom 11 Outline Hardware Building Blocks Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
1 CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
Link Layer Dr. Mozafar Bag-Mohammadi Ilam University.
CSCI-1680 Physical Layer Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Spring 2001CS 5851 Outline Building Blocks Shannon’s Theorem Encoding 11. Physical Layer.
Chapter 4 Digital Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
9-Jan-164/598N: Computer Networks Overview Performance metrics - Section 1.5 Direct link networks –Hardware building blocks - Section 2.1 –Encoding - Section.
Wireless and Mobile Networks (ELEC6219) Session 3: Theories of Data Communications. Data Link Layer. Adriana Wilde and Jeff Reeve 22 January 2015.
Computer Interfacing and Protocols
Point-to-Point Links: Framing
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 6: Datalink layer problems Slides used.
1 CSCD 433 Network Programming Fall 2013 Lecture 5a Digital Line Coding and other...
Wireless and Mobile Networks (ELEC6219) Session 4: Efficiency of a link. Data Link Protocols. Adriana Wilde and Jeff Reeve 22 January 2015.
1 Chapter 2: Direct Link Networks (Part One) Dr. Rocky K. C. Chang 30 January 2004.
1 Point-to-Point Links: Encoding Encoding: Section 2.2 (Section 2.1 read on your own)
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Chapter 2 : Data Communications BENG 4522 Data Communications & Computer Networks Transmission Impairment Signals travel through the transmission.
Powerpoint Templates Computer Communication & Networks Week # 04 1 Lecture only.
Lect-10-2: Physical Layer Computer Networks : An Introduction to Computer Networks Handout #12: Physical Layer Signaling, Coding and Clocking.
1587: COMMUNICATION SYSTEMS 1 Digital Signals, modulation and noise Dr. George Loukas University of Greenwich,
Chapter 4 Digital Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 CSCD 433 Network Programming Fall 2016 Lecture 4 Digital Line Coding and other...
CS4470 Computer Networking Protocols
Getting Connected (Chapter 2 Part 1)
The University of Adelaide, School of Computer Science
Data Link Networks Hardware Building Blocks Nodes & Links CS380
Advanced Computer Networks
CSCI-1680 Physical Layer Link Layer I
2. Getting connected (part 1)
Point-to-Point Links Outline Encoding Framing Error Detection
Ion Stoica September 6, 2001 EE 122: Lecture 4 Ion Stoica September 6, 2001.
Fundamentals of Computer Networks
Hardware Building Blocks
CSCI-1680 Physical Layer Link Layer I
Dr. Mozafar Bag-Mohammadi Ilam University
Home work project #1 Develop and fully debug your program on the Cushing 208 lab. Machines - planet lab machines may not have good development environment.
EECS 122: EE122: Error Detection and Reliable Transmission
Presentation transcript:

Fundamentals of Computer Networks ECE 478/578 Lecture #3: Encoding and Framing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona

Direct Link (Point-to-Point) Networks Simplest network possible, consisting of two hosts and one link Look into different functions at the link level Encoding Framing Error detection/correction Reliable delivery Media access control Host A physical Link 2 Host B

Typical Communication System 3 Compresses a stream of bits Adds redundancy to detect/correct errors at the receiver (bits are mapped to codewords) Scrambles the bits of consecutive codewords to spread burst errors Converts a stream of bits to analog signals modulated for transmission over a medium

Physical Medium Signals travel through the medium and represent bits Nyquist Bandwidth: Given an error-free medium of bandwidth B, the highest signal (symbol) rate (bauds) that can be carried is 2B Bauds to bits: R = 2B * log2M bits, M: signal levels Shannon’s Capacity Theorem C = B log 2 (1+S/N) Defines the upper bound on the link capacity C in Hz Can be used to evaluate the “error-free” bandwidth of a line 4

Shannon’s Theorem: Example Voice-grade phone line: B =3, Hz = 3 KHz Typical SNR = 30 dB, where dB = 10 x log 10 (S/N) For 30 db  S/N =1,000 C = 3,000 x log 2 (1+1,000) ≈ 30 Kbps Higher bandwidth B (in Hz), higher capacity Higher S/N, higher capacity 5

Shannon’s Theorem: Example 2 Can the signal be weaker than noise? Assume capacity of 50 Kbps over 1MHz bandwidth The required SNR would then be C = B log 2 (1+S/N) S/N = 2 C/B - 1 = or dB Think of spread spectrum communications Transmit a weak signal over a large bandwidth 6

Relating Nyquist and Shannon Assume B = 1 MHz and SNR = 24 dB. How many signal levels are required to achieve the max rate? 24 dB = 10 log10 (S/N)  S/N = = 251 Using Shannon’s formula C = 10 6 x log 2 (1+251)= 10 6 x 8 = 8 Mbps (Theoretical limit) Using Nyquist’s theorem C = 2B log2M  8 x 10 6 = 2 x 10 6 x log 2 M  M = 16 7

Encoding Map binary bits into signals Example: Low signal represents a 0, high signal represents a 1 NonReturn-to-Zero (NRZ) Problem: Long periods of silence (zero) or high signals are possible Baseline wander (receiver loses track of reference sig) Clock recovery (receiver loses clock synchronization) 8

Encoding: More Schemes NRZ Inverted (NRZI): Switch from current state to represent a 1 Manchester: XOR the bit stream with the clock 9

4B/5B Encoding Scheme Encode 4-bit symbols into 5-bit codes 2 4 symbols must be mapped to 2 4 codewords out of the possible 2 5 Each codeword has no more than one starting zero, and no more than two trailing zeros No more than 3-consequtive zeros Then use NRZI to solve the consecutive 1s problem 80% efficiency (1 bit is overhead) 10

Example of 4B/5B Encoding 4-bit data symbol5-bit code4-bit data symbol5-bit code

Framing The process of grouping bits into frames (messages or packets) Typically implemented by the network adaptor Why frames? 12

Byte-Oriented Framing BISYNC: Binary synchronous communication Frame is a collection of bytes Need to indicate the beginning and end of a frame Sentinel characters are used SYN: Synchronization character SOH: Start of header STX, ETX: Start of text, End of text CRC: Cyclic redundancy check 13

Problem with Byte-oriented Framing ETX may occur in the payload Precede it with a DLE (data-link-escape) character Problem propagates, precede DLE with another DLE (extra overhead) Point-to-Point (PPP) protocol used by IP STX: Payload: 1,500 bytes Checksum: 2 or 4 byt es 14 Overhead: 8/1508 =0.5%

Byte-counting Framing Include the # of bytes in the frame as a field in the header Digital Data Communications Protocol (DDCMP) Count: Specifies # of bytes in the body CRC ensures that count field is not corrupted 15

Bit-oriented Framing High-Level Data Link Control (HDLC) Beginning/end of frame, flag: Instead of inserting bytes do bit stuffing Sender adds a 0 after five consecutive 1s Receiver removes zero after five 1s 16

Example of Bit-stuffing Sender Receiver Length of frame Variable, depends on the data We can calculate and optimize the overhead of bit stuffing x xx x

Maximum Frame Size Let each frame contain V overhead bits Let a message of M bits be broken into frames of size K max # of packets : The total # of bits for all frames: If K max ↓, # of frames ↑, and overhead also ↑ If # of frames ↑, then each frame must be processed then more processing delay at each host Increase frame length as much as possible 18

Maximum Frame Size - Pipelining Why not make K max = M? Pipelining delay: frame must be received before forwarding 19 SourceDest TtTt TtTt total delay

Tradeoff between K max and V Let message be of length M, frame size K max and overhead V, over a path of j equal capacity links First packet hop over (j -1) switches + entire message transmission. Total number of bit transmission times Expected value over message lengths Minimize E{TC} at 20