Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.

Slides:



Advertisements
Similar presentations
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Advertisements

Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS352- Link Layer Dept. of Computer Science Rutgers University.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Chapter 10 Error Detection and Correction
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Network Layer4-1 Lower limit on the number of check bits r We want to design a code m with m message bits and r check bits Allowing all single errors to.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Medium Access Control Sub Layer
Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
1 © Unitec New Zealand CRC calculation and Hammings code.
Error Detection.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 23 CSCS 311.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
4.1 THE CHANNEL ALLOCATION PROBLEM THE CHANNEL ALLOCATION PROBLEM : how to allocate a single broadcast channel among competing users. The channel might.
Coding and Error Control
Chapter 9: Data Link Control
Data link layer divided into two functionality-oriented sublayers
Packetizing Error Detection
Data Link Layer.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CIS 321 Data Communications & Networking
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted during transmission. For.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Lecture 5- Data Link Layer
Error Detection and Correction
CSE 313 Data Communication
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Chapter 12 Media Access Control (MAC)
Chapter 9: Data Link Control
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Cyclic Redundancy Check (CRC)

 An error detection mechanism in which a special number is appended to a block of data in order to detect any changes introduced during storage (or transmission).  The CRC is recalculated on retrieval (or reception) and compared to the value originally transmitted, which can reveal certain types of error.  For example, a single corrupted bit in the data results in a one- bit change in the calculated CRC, but multiple corrupt bits may cancel each other out.

 At the sender side, the data unit to be transmitted is divided by a predetermined divisor (binary number) in order to obtain the remainder. This remainder is called CRC.  The CRC has one bit less than the divisor. It means that if CRC is of n bits, divisor is of n+ 1 bit.  The sender appends this CRC to the end of data unit such that the resulting data unit becomes exactly divisible by predetermined divisor i.e. remainder becomes zero.  At the destination, the incoming data unit i.e. data + CRC is divided by the same number (predetermined binary divisor).

 If the remainder after division is zero then there is no error in the data unit & receiver accepts it.  If remainder after division is not zero, it indicates that the data unit has been damaged in transit and therefore it is rejected.  CRC is based on binary division. A sequence of redundant bits called CRC or CRC remainder is appended at the end of a data unit such as byte.

Requirements of CRC : A CRC will be valid if and only if it satisfies the following requirements: 1.It should have exactly one less bit than divisor. 2. Appending the CRC to the end of the data unit should result in the bit sequence which is exactly divisible by the divisor.

The various steps followed in the CRC method are 1. A string of n as is appended to the data unit. The length of predetermined divisor is n The newly formed data unit i.e. original data + string of n as are divided by the divisor using binary division and remainder is obtained. This remainder is called CRC.

3. Now, string of n Os appended to data unit is replaced by the CRC remainder (which is also of n bit). 4. The data unit + CRC is then transmitted to receiver.

5. The receiver on receiving it divides data unit + CRC by the same divisor & checks the remainder. 6. If the remainder of division is zero, receiver assumes that there is no error in data and it accepts it. 7. If remainder is non-zero then there is an error in data and receiver rejects it.

For example, if data to be transmitted is 1001 and predetermined divisor is The procedure given below is used: Sol: 1. String of 3 zeroes is appended to 1011 as divisor is of 4 bits. Now newly formed data is Data unit is divided by 1011.

2. During this process of division, whenever the leftmost bit of dividend or remainder is 0, we use a string of Os of same length as divisor. Thus in this case divisor 1011 is replaced by At the receiver side, data received is This data is again divided by a divisor The remainder obtained is 000; it means there is no error.

ALOHA  ALOHA is a system for coordinating and arbitrating access to a shared communication Networks channel.  It was developed in the 1970s by Norman Abramson and his colleagues at the University of Hawaii.  The original system used for ground based radio broadcasting, but the system has been implemented in satellite communication systems.  A shared communication system like ALOHA requires a method of handling collisions that occur when two or more systems attempt to transmit on the channel at the same time.

 In the ALOHA system, a node transmits whenever data is available to send. If another node transmits at the same time, a collision occurs, and the frames that were transmitted are lost.  Aloha is a multiple access protocol at the datalink layer and proposes how multiple terminals access the medium without interference or collision.protocol  In 1972 Roberts developed a protocol that would increase the capacity of aloha two fold.

There are two different types of ALOHA:types of ALOHA: ( i) Pure ALOHA (ii) Slottecl ALOHA

(i) Pure ALOHA In pure ALOHA, the stations transmit frames whenever they have data to send. When two or more stations transmit simultaneously, there is collision and the frames are destroyed. In pure ALOHA, whenever any station transmits a frame, it expects the acknowledgement from the receiver. If acknowledgement is not received within specified time, the station assumes that the frame (or acknowledgement) has been destroyed. If the frame is destroyed because of collision the station waits for a random amount of time and sends it again. This waiting time must be random otherwise same frames will collide again and again. Therefore pure ALOHA dictates that when time-out period passes, each station must wait for a random amount of time before resending its frame. This randomness will help avoid more collisions.

In fig there are four stations that.contended with one another for access to shared channel. All these stations are transmitting frames. Some of these frames collide because multiple frames are in contention for the shared channel. Only two frames, frame 1.1 and frame 2.2 survive. All other frames are destroyed. Whenever two frames try to occupy the channel at the same time, there will be a collision and both will be damaged. If first bit of a new frame overlaps with just the last bit of a frame almost finished, both frames will be totally destroyed and both will have to be retransmitted.

(ii) Slotted ALOHA Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of collision in pure ALOHA are very high. In slotted ALOHA, the time of the shared channel is divided into discrete intervals called slots. The stations can send a frame only at the beginning of the slot and only one frame is sent in each slot.

In slotted ALOHA, if any station is not able to place the frame onto the channel at the beginning of the slot i.e. it misses the time slot then the station has to wait until the beginning of the next time slot. In slotted ALOHA, there is still a possibility of collision if two stations try to send at the beginning of the same time slot as shown in fig. Slotted ALOHA still has an edge over pure ALOHA as chances of collision are reduced to one-half.

Protocol Flow Chart for ALOHA: Explanation: A station which has a frame ready will send it. Then it waits for some time. If it receives the acknowledgement then the transmission is successful. Otherwise the station uses a backoff strategy, and sends the packet again. After many times if there is no acknowledgement then the station aborts the idea of transmission.