Institute for Experimental Mathematics Ellernstrasse 29 45326 Essen - Germany packet transmission A.J. Han Vinck January 19, 2010.

Slides:



Advertisements
Similar presentations
5-1 Data Link Layer l Objective: to achieve reliable and efficient communication between 2 adjacent machines l Data link layer design issues n services.
Advertisements

DIGITAL COMMUNICATION Packet error detection (CRC) November 2011 A.J. Han Vinck.
Applied Algorithmics - week7
Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
5/15/2015© 2008 Raymond P. Jefferis IIILect The Data Link Layer.
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economic to transfer all bits of a long message simultaneously.
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
Fundamentals of Computer Networks ECE 478/578 Lecture #3: Encoding and Framing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Long distance communication Multiplexing  Allow multiple signals to travel through one medium  Types Frequency division multiplexing Synchronous time.
The OSI Reference Model
Bit and Byte Stuffing1. 2 Synchronous versus Asynchronous Transmissions There exists a hierarchy of synchronization tasks: –Bit level : recognizing the.
Error detection and correction
Transmission Characteristics 1. Introduction (Information Interchange codes) 2. Asynchronous and Synchronous Transmissions 3. Error detection (bit errors)
Networks: Bit and Byte Stuffing
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economical to transfer all bits of a long message.
Digital Data Communications Techniques Updated: 2/9/2009.
Adapted from Tanenbaum's Slides for Computer Networking, 4e The Data Link Layer Chapter 3.
Computer Networks: Bit and Byte Stuffing 1 Bit and Byte Stuffing.
1/26 Chapter 6 Digital Data Communication Techniques.
NETWORKING CONCEPTS. DATA LINK LAYER Data Link Control main functions of the data link layer are Data link control media access control. Data link control.
DIGITAL COMMUNICATION Error - Correction A.J. Han Vinck.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION 2-dimensional transmission A.J. Han Vinck May 1, 2003.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany Data communication line codes and constrained sequences A.J. Han Vinck Revised.
EE 122: Encoding And Framing Ion Stoica September 9, 2002.
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany On STORAGE Systems A.J. Han Vinck June 2004.
ECS 152A 4. Communications Techniques. Asynchronous and Synchronous Transmission Timing problems require a mechanism to synchronize the transmitter and.
Part 2: Packet Transmission Packets, frames Local area networks (LANs) Wide area networks (LANs) Hardware addresses Bridges and switches Routing and protocols.
CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
1 Part III Packet Transmission Chapter 7 Packets, Frames, and Error Detection.
جلسه هشتم شبکه های کامپیوتری به نــــــــــــام خدا.
Review:. Chapter 3: The Data Link Layer –achieve reliable, efficient communication between two physically connected machines. –Example problems to be.
Data Link Layer : Services, Framing, Error Detection and Correction2.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
The Data Link Layer. Functions of the Data Link Layer Provide service interface to the network layer Dealing with transmission errors Error detection.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Layer Two Data Link Layer Collects bits from layer 1 and organizes into frames Passes bits that make up frames to layer 1 for transmission Concerned with.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany Data communication signatures A.J. Han Vinck July 29, 2004.
1 Message Delineation Identify the start and end of messages by: Identify the start and end of messages by:
1 CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
CHAPTER 3: DATA LINK CONTROL Flow control, Error detection – two dimensional parity checks, Internet checksum, CRC, Error control, Transmission efficiency.
1/30/ :20 PM1 Chapter 6 ─ Digital Data Communication Techniques CSE 3213 Fall 2011.
Point-to-Point Links: Framing
Proposal for a Proximity-2 Protocol Ed Greenberg Greg Kazz May /11/20161.
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 6: Datalink layer problems Slides used.
Lecture Focus: Data Communications and Networking  Data Link Layer  MAC Frame Format Lecture 25 CSCS 311.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
1 University of Calgary CS 441 Part 3 The Data Link Layer 3.1 Framing & Error Control 3.2 Error & Flow Control.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION introduction A.J. Han Vinck May 10, 2003.
The University of Adelaide, School of Computer Science
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Data Link Layer.
Where we are in the Course
Chapter 7 Packets, Frames, and Error Detection
Lecture on Data Link Control
Ion Stoica September 6, 2001 EE 122: Lecture 4 Ion Stoica September 6, 2001.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Fundamentals of Computer Networks
CSE 461: Framing, Error Detection and Correction
Networks: Bit and Byte Stuffing
EECS 122: EE122: Error Detection and Reliable Transmission
Data Link Layer. Position of the data-link layer.
Introduction Communication Modes Transmission Modes
Presentation transcript:

Institute for Experimental Mathematics Ellernstrasse Essen - Germany packet transmission A.J. Han Vinck January 19, 2010

University Duisburg-Essendigital communications group A.J. Han Vinck Packets (1) Information is often transmitted in packets –Fixed or variable length bursty continuous Important to know time interval : – for an information symbol on bit level – for an information symbol on character level – block or message level (start of frame or packet )

University Duisburg-Essendigital communications group A.J. Han Vinck Start of packets flag Flag data * * * Flag may not may not occur in other positions chosen according to some rule

University Duisburg-Essendigital communications group A.J. Han Vinck Bit stuffing Avoid flag in the packet: –Insert stuffing bit at fixed positions in packet –Insert stuffing bit if necessary only k+2 Example:01110>101>0>111>1>000>0>110fixed 01110>1011>0>11>0>00011>0>0 variable Fixed: after every k data bits insert stuffing bit Redundancy = 1/(k+1) Variable: After observing 011 insert 0 In general, insert 0 after observing 01 k-1 Homework: proof that this is a correct way

University Duisburg-Essendigital communications group A.J. Han Vinck detection After k-1 1‘s check next bit(s) If 0 remove it (stuffed bit) If 10, end of frame marker ( ) If 11, error detected ( k 1‘s not allowed )

University Duisburg-Essendigital communications group A.J. Han Vinck Some standards CANafter insert 1 after insert 0 HDLC as flag after 5 1‘s insert a 0 X may not occur in frame insert 0 after 5 1‘s bits: bits start of frame:

University Duisburg-Essendigital communications group A.J. Han Vinck Efficiency fixed length packets Packet of length N has –k+2 + (N-(k+2))/(k+1) stuffing bits Minimizing with respect to redundancy gives k   N, minimum redundancy R min  2  N. Example: for N = 1024, K = 23; R min = 64

University Duisburg-Essendigital communications group A.J. Han Vinck Variable length packets Rule: stuffing only when necessary! For FLAG: 01 k 0 and Random data P(0) = P(1) = ½ the redundancy R  k+2 + (N-(k+2)) / 2 k is minimized for k  log 2 N  log 2 N + 1 stuff bits per packet! 00 Ex: 01110| |:= 01110| | Homework: use a Markov state diagram to find R

University Duisburg-Essendigital communications group A.J. Han Vinck Calculations of average length Generate 0 and 1 with probability ½ average redundancy = P(k-1)=1/(2 k –1) Very important for practical applications: how far away from optimal? k-1

University Duisburg-Essendigital communications group A.J. Han Vinck At receiver LOOK for FLAG in BITSTREAM –For fixed length: remove stuffed bits –For variable length, parse for 1 k-1 0, remove the 0 –due to transmission errors Flag may appear in packet Flag may disappear CRC might be correct!

University Duisburg-Essendigital communications group A.J. Han Vinck Synchronization with correlation Strategy: locate a flag in the data stream –Pass the received digits through a „correlator“ compare –Example: ESA uses Test N positions One must be the correct one

University Duisburg-Essendigital communications group A.J. Han Vinck What can happen? Errors may distroy the flag –  Errors may cause a flag to appear in the packet –  Errors may increase or decrease the packet length (this has a strong influence on the CRC) –   – 

University Duisburg-Essendigital communications group A.J. Han Vinck A rule Packets consist of : k+2 flag-digits and N-(k+2) random data RULE RULE: -for N subsequent possible starting positions, find the position m = u; 1  u  N which maximizes the number of agreements with the flag

University Duisburg-Essendigital communications group A.J. Han Vinck An example: Calculate # of agreements = minimize Hamming distance Example:Barker 7 = worst case best case etc In sync we expect k+2 agreements; out-of-sync we expect (k+2)/2 agreements Best position

University Duisburg-Essendigital communications group A.J. Han Vinck Barker codes exist of lengths 2, 3, 4, 5, 7, 11, and 13. Barker codes length Property:. |# of agreements - # disagreements| 

University Duisburg-Essendigital communications group A.J. Han Vinck Byte or character Stuffing [HDLC Example] ASCII characters are used as framing delimiters (e.g. DLE STX and DLE ETX) The problem occurs when these character patterns occur within the “transparent” data. Solution: sender stuffs an extra DLE into the data stream just before each occurrence of an “accidental” DLE in the data stream.

University Duisburg-Essendigital communications group A.J. Han Vinck HDLC Byte Stuffing DLESTXDLEETXTransparent Data DLESTXDLEETXABDLEHW STXDLEETXABDLEHW STXDLEETXABDLEHW Stuffed Unstuffed Before

University Duisburg-Essendigital communications group A.J. Han Vinck ppp stuffing example Example: Data to be sent 41 7D 42 7E After stuffing and framing 7E 41 7D 5D 42 7D 5E E PPP also provides the framing in Packet-over-SONET PPP is character-oriented version of HDLC Flag is 0x7E ( ) Control escape 0x7D ( ) replace 0x7E by0x7D 0x5E 0x7D by0x7D 0x5D

University Duisburg-Essendigital communications group A.J. Han Vinck Conclusion: Structure of flag is of great importance –Several classes designed: Barker, Gold, Kasami, etc flag should not appear in data – bit stuffing can be used

University Duisburg-Essendigital communications group A.J. Han Vinck Comma free codes A set code words is called comma-free if for every pair C = (c 0,c 1, ,c N-1 ) and C‘ = (c‘ 0,c‘ 1, ,c‘ N-1 ) the N tuple (c i, ,c N-1,c‘ 0,  c‘ i-1 ) is not a code word for any 1  i  N-1

University Duisburg-Essendigital communications group A.J. Han Vinck Example Comma free { } A concatenation is uniquely decodable! Thus   is decoded as  01,00101,00110,11001,11010,11110 

University Duisburg-Essendigital communications group A.J. Han Vinck Comma free: efficiency The # of code words in a comma free code of length N –M  2 N /N Reason: every code word eliminates (N-1) shifts example for two shifted codewords: and the two codewords can be synchronized as Redundancy: R  log 2 N (look at variable stuffing) Check!

University Duisburg-Essendigital communications group A.J. Han Vinck Packets Synchronous arrivals: –accuracy in clock % (may be atom-clock) A-synchronous arrivals: –clock derived from received signals needs special regeneration of clock

University Duisburg-Essendigital communications group A.J. Han Vinck Asynchronous Transmission (example) overhead is 20% ; (8 bits of data, 2 bits for start/stop)

University Duisburg-Essendigital communications group A.J. Han Vinck Support of timing recovery Use of special symbols, e.g. Manchester code 1 0 Prevent long runs of ones and zeros in data by precoding Insert preamble, e.g before start of packet

University Duisburg-Essendigital communications group A.J. Han Vinck Ethernet/IEEE /6 2/ Preamble SFD DA SA L Data FCS Bytes field Preamble: 56 bits alternating 10 used to synchronize the receiver SFD: Start Frame Delimiter to signal beginning of the transmission DA/SA: Destination and Source Addresses L: Length of the data part Data: Minimum length required for proper operation. Padding used if needed FCS: Extra bits appended for error checking: the CRC