Networking and Communication Greg Drysdale Oct. 28, 2008 CS147 Section 3.

Slides:



Advertisements
Similar presentations
9-1 Chapter 9 - Communication Principles of Computer Architecture by M. Murdocca and V. Heuring © 1999 M. Murdocca and V. Heuring Principles of Computer.
Advertisements

Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Introduction to Information Technologies
Data and Computer Communications
DIGITAL COMMUNICATIONS.  The modern world is dependent on digital communications.  Radio, television and telephone systems were essentially analog in.
Chapter 6 Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control.
Chapter 8 Data and Network Communication Technology
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Sixth Edition.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
Introduction to Networking. Spring 2002Computer Network Applications Analog Devices Maintain an exact physical analog of (some form of) information. Ex:
Long distance communication Multiplexing  Allow multiple signals to travel through one medium  Types Frequency division multiplexing Synchronous time.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Module 3.0: Data Transmission
Chapter 6 Errors, Error Detection, and Error Control
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Digital Data Communications Techniques Updated: 2/9/2009.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Chapter 8 COMMUNICATION AND COMPUTER NETWORK
331: STUDY DATA COMMUNICATIONS AND NETWORKS.  1. Discuss computer networks (5 hrs)  2. Discuss data communications (15 hrs)
1/26 Chapter 6 Digital Data Communication Techniques.
Chapter 10 Error Detection and Correction
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Error Detection and Correction : Data Link Layer.
Review: The application layer. –Network Applications see the network as the abstract provided by the transport layer: Logical full mesh among network end-points.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
ECS 152A 4. Communications Techniques. Asynchronous and Synchronous Transmission Timing problems require a mechanism to synchronize the transmitter and.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
Data and Computer Communications
Data Link Layer: Error Detection and Correction
Data and Computer Communications Chapter 6 – Digital Data Communications Techniques.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Practical Session 10 Error Detecting and Correcting Codes.
ECE453 – Introduction to Computer Networks Lecture 4 – Data Link Layer (I)
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, October 2011.
Errors, Error Detection, and Error Control
Data Integrity © Prof. Aiman Hanna Department of Computer Science Concordia University Montreal, Canada.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
PREPARED BY: ENGR. JO-ANN C. VIÑAS
Session 4. Objectives: By the end of this session, the student will be able to: Identify the different types of noise commonly found in computer networks.
Computer Science Division
Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
1 © Unitec New Zealand CRC calculation and Hammings code.
Error Detection.
1/30/ :20 PM1 Chapter 6 ─ Digital Data Communication Techniques CSE 3213 Fall 2011.
9-1 Chapter 9 - Communication Department of Information Technology, Radford University ITEC 352 Computer Organization Principles of Computer Architecture.
Transmission Errors Error Detection and Correction.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
COMPUTER NETWORKS Lecture-3 Husnain Sherazi. Review Lecture 2  Resource Sharing  Growth of the Internet – Linear Scale – Log Scale  Tools for Probing.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
Dr. Clincy Professor of CS
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
ERROR DETECTION AND CORRECTION
Subject Name: COMPUTER NETWORKS-1
Chapter Goals Explain communication protocols
Advanced Computer Networks
CIS 321 Data Communications & Networking
Introduction to electronic communication systems
Part III Datalink Layer 10.
Chapter 7 Error Detection and Correction
EEC-484/584 Computer Networks
Error Detection and Correction
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Networking and Communication Greg Drysdale Oct. 28, 2008 CS147 Section 3

Topics Covered Modulation Schemes Transmission Media Error Detection and Correction

Some Networking Terms LAN (Local Area Network) – A network of computers within close physical proximity. WAN (Wide Area Network) – A network of computers connected over large distances (eg. The Internet)‏ Modem (MOdulator/DEModulator) – A device used to communicate over the various transmission media.

Modulation Schemes Modulation is the process of encoding signals from one type to another to enable the use of the transmission medium. (eg. From audible sound into electrical signals like the telephone)‏ Modulation Schemes refer to the various types of modulation, each of which have their own pros and cons.

Amplitude Modulation (AM)‏ Common Use: AM Radio Waves Information is represented by the amplitude of the signal, so 1's and 0's are encoded by the signal strength. Pro: Simple and inexpensive to implement. Con: Anything which affects the signal strength can alter the signal. (eg. Lightning, close proximity to electrical lines, and bridges)‏

Frequency Modulation (FM)‏ Common Use: FM Radio Waves Information is represented by the frequency of the signal Pro: Mostly immune to amplification issues, such as bridges.

Phase Modulation (PM)‏ Common Use: Modems Capable of transmitting 2 bits at once by splitting the signal into four phases (90 degrees each)‏

Pulse Code Modulation (PCM)‏ An analog signal is converted into binary by sampling at twice the highest frequency of the original signal to produce values at discrete intervals. Pro: With digital repeaters at regular intervals the effective bandwidth can be quite large, and the signal may be perfectly restored.

Transmission Media Two-Wire Open Lines (19.2Kbps / 50m)‏ lines emit EM radiation, and also pick up a lot of noise which may vary for each line, resulting in distortions in the signal, and the low capacity. Twisted Pair Lines (1Mbps / 100m)‏ less vulnerable than two-wire lines to external noise, as both wires are equally affected. Coaxial Cable (10Mbps / 100s of meters)‏ the cable is shielded from external noise and also from losses due to EM radiation.

Transmission Media Optical Fiber (several Gbps / 10s of kilometers)‏ expensive hardware is required on both ends, but transmission is very reliable and fast. Satellites Orbit levels affect delay time, satellites in geosynchronous orbit has delays up to 250ms. Terrestrial Microwave bounces signals off the lower atmosphere Radio (cellular) (2MB/s / ~10km)‏ Uses a restricted band of frequencies for communicating with mobile devices.

Error Detection and Correction Transmission Media are not always perfect as they are subject to noise introduced by the environment, such as power fluctuations and magnetic fields. This noise may cause faults, or errors, which flip bits from 0 to 1, or 1 to 0. So how do we fix these faults?

Terms Codeword – The bitstring of data which will be transmitted. (eg. an ASCII Character)‏ Parity Bit – a single extra bit added to a codeword to allow for error detection. Check Bit (Redundant Bit) – additional bits added to a codeword to allow for recovery of bit errors. Even/Odd Parity – for any given set of bits for which a parity bit is to check, the total of all bits including the parity bit, will be an even or odd number (respectively).

Additional Terms Bit Error Rate (BER) – the probability that a given bit is incorrect. (eg. Fiber Optic BER is 1 in 10¹² bits)‏ Single-Error-Correcting (SEC) – combination of a codeword and redundant bits capable of correctly a single errant bit. Double-Error-Detection (DED) – codes which may detect up to two errors. SEC codes are also DED codes, and are sometimes called SECDED.

Hamming Code Check bits are placed in the power of two bit positions and are responsible for checking specific bits. Hamming Distance – the number of bits which must be changed in order to convert one string into another. (eg to 0100 – the hamming distance is 1)‏

Hamming Code Here is a table which shows which bits each of the check bits is responsible for. Each check bit has a ”step” pattern based on which bit it is. (eg. Check bit C2 checks two bits, then skips two, etc, starting from its own location)‏

Hamming Code Here is a sample Hamming Code for the ascii character a, using even parity. Hamming code is a type of horizontal or Longitudinal Redundancy Checking (LRC) because the width of the codeword is increased.

Vertical Redundancy Checking Vertical Redundancy Checking (VRC) is used on a group of codewords by using a Checksum to store a parity bit for each column. Used alone, this is only good for detecting errors, not correcting them, so it will often be combined with LRC.

Cyclic Redundancy Checking Cyclic Redundancy Checking (CRC) uses polynomial codes to create a Frame-Check Sequence which is then appended to the Frame. Error Checking involves dividing the frame by the polynomial code used to create the frame. Frame – a block of data to be transmitted or stored. Frame-Check Sequence (FCS) – also known as the CRC Digits, the information appended to a frame to allow for error checking.

CRC Process Start with a k-bit message to be transmitted: M(x)‏ Append n zeros to M(x), where n is the degree of the generator polynomial G(x). (k > n)‏ The extended M(x) is divided by G(x) using modulo-2 arithmetic. (discards and carries are discarded – same as bit-by-bit XOR)‏ The remainder R(x) is no more than n bits wide, and forms the CRC Digits or Frame-Check Sequence for M(x). Transmit (or store) M(x) + R(x)‏

CRC Process G(x) = x^4 + x + 1

CRC Error Detection Start with a frame T(x), which is M(x) + R(x) which was generated before. Divide T(x) by the same G(x) used in the generation of T(x). If there is a non-zero remainder, an error has occurred. CRC is good for catching Burst Errors, large consecutive errors, and should catch any error which is not a factor of G(x).