COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques:

Slides:



Advertisements
Similar presentations
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Introduction to Information Technologies
Data and Computer Communications
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
Reliability & Channel Coding
Error Detection and Correction
Chapter 6 Errors, Error Detection, and Error Control.
Transmission Errors Error Detection and Correction
Error Detection and Correction
Error Detection and Correction
PART III DATA LINK LAYER. Position of the Data-Link Layer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
Transmission Errors1 Error Detection and Correction.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
CS352- Link Layer Dept. of Computer Science Rutgers University.
Transmission Errors Error Detection and Correction
Data link layer: services
Coding and Error Control
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
CSC 535 Communication Networks I Section 3.8 Error Detection and Correction Dr. Cheer-Sun Yang.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Data Link Layer: Error Detection and Correction
Chapter 3 Digital Transmission Fundamentals Line Coding Error Detection and Correction.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Lecture 3-2: Coding and Error Control (Cont.) ECE
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
Data Link Layer. Data Link Layer Topics to Cover Error Detection and Correction Data Link Control and Protocols Multiple Access Local Area Networks Wireless.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Coding Overview (§3.2)
Transmission Errors Error Detection and Correction.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Part III: Data Link Layer Error Detection and Correction
Data Link Layer 1. 2 Single-bit error 3 Multiple-bit error 4.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
Powerpoint Templates Computer Communication & Network Week # 10.
Coding and Error Control
Lecture 4 Error Detecting and Correcting Techniques Dr. Ghalib A. Shah
CS4470 Computer Networking Protocols
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Introduction to Information Technologies
Part III. Data Link Layer
The Three Main Sources of Transmission Errors
Advanced Computer Networks
CIS 321 Data Communications & Networking
Data Link Layer What does it do?
Part III Datalink Layer 10.
Digital data communication (Error control)
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
Chapter 3 Digital Transmission Fundamentals
Chapter 7 Error Detection and Correction
Introduction to Information Technologies
DATA COMMUNICATION Lecture-35.
Lecture 3 Digital Transmission Fundamentals
Transmission Errors Error Detection and Correction
Protocols and the TCP/IP Suite
Error Detection and Correction
Transmission Errors Error Detection and Correction
CSE 461: Framing, Error Detection and Correction
Presentation transcript:

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques: Single Parity and 2D Block Parity 2. Polynomial Code 3. CRC Code Garcia: Sections 3.5 – 3.8

2 Error Detection and Correction 1.Even with optimal transmission system, bit errors occur because of the noisy channel. 2.Bit errors occur in random and are therefore defined in terms of their probability of occurrence. 3.Probability of bit error = (No. of bits in error)/(Total no. of bits transmitted). 4.Common values for Probability of bit error: Wireless ~ 10  3 Copper wires ~ 10  6 Optical fibre ~ 10  9 5.There are two approaches to error control Automatic Repeat Request (ARQ): On the detection of error, the transmitter is asked to retransmit. Forward Error Correction (FEC): On the detection of error, the receiver tries to correct the error itself. FEC is appropriate when a return channel is not available or retransmission requests can not be accomodated.

3 Single Parity Bit Detection 1.Parse data in blocks of k-bits. 2.Add a single parity bit to make the numbers of 1’s even (or odd) to a block of data. If the total number of 1’s are made even, the scheme is called “even parity” scheme. (If the total number of 1’s are made odd, the scheme is called “odd parity” scheme.) 3.The block of data is transmitted along with the parity bit. 4.The receiver counts the number of 1’s in the received block. If the number of 1’s are even for an even parity bit scheme, transmission is assumed error- free. 5.The parity bit is discarded and the remaining data is passed on to the application. 6.Redundancy ratio of 2D parity check scheme = 1/k. Activity 1: Suppose a transmitter is transmitting What is the transmitted data if even parity is used? Repeat for odd parity. Activity 2: Given that even number of errors will not be detected with a single bit parity scheme, calculate the probability of an error going undetected in problem 1 if the probability of error in a single bit is 10  3.

4 2D Parity Checks 1.Arrange k-information bits in a 2D (m × n) array. 2.Create the parity bit for each column and row based on the even parity bit scheme. 3.Transmit the new (m + 1) × (n + 1) array. 4.All single, double, and triple bit error patterns are detected. Some four bit error patterns may not be detected. 5.Redundancy ratio of 2D parity check scheme = (m + n + 1)/k. 6.2D Parity Check code is used by the early data link layers. Activity 3: Using an (5 × 4) array, generate the 2D parity check code for the information bits Activity 4: The (5 × 4) array generated in Activity 2 is transmitted. If the received data bits are , determine if an error has occurred. Repeat for the received data bits Repeat for the received data bits Repeat for the received data bits

5 Check Sum 1.Several Internet protocols (IP, TCP, and UDP) use check bits to detect errors in the header of the PDU. 2.Scheme is based on the following steps: Assume the header consists of L words with each word 16-bit long. b 0 b 1 b 2 ∙∙∙ b L-1 plus a checksum word b L Add 16-bit word using modulo-16 arithmetic x = b 0 b 1 b 2 ∙∙∙ b L-1 plus a checksum word b L The checksum is generated by taking the additive inverse of x in modulo-16 arithmetic. Activity 3: Assuming 4-bit words and L = 3, generate the checksum for Activity 4: Implement the check sum algorithm using modulo-2 arithmetic.

6 Cyclic Redundancy Code Example: Generate the (15,10) CRC sequence for message M = using the generator pattern P = ? Step # 1: Evaluate the values of k and n. k = 10, n = 5 Step # 2: Determine the information polynomial of degree (k – 1).i(x) = x 9 +x 7 +x 3 +x 2 +1 Step # 3: Determine the generator polynomial of degree (n – k).g(x) = x 6 +x 5 +x 3 +x Step # 4: Multiply the information polynomial with x n  k. x 5 i(x) = x 14 +x 12 +x 8 +x 7 +x 5 Step # 5: Calculate the remainder obtained by dividing x 5 i(x) with g(x).rem(x 5 i(x),g(x)) = x 3 +x 2 +x Step # 6: Add the remainder obtained in step # 5 to x 5 i(x) to generate the CRC codeword. CRC codeword = x 14 +x 12 +x 8 +x 7 +x 5 + x 3 +x 2 +x or, Step # 7: The CRC codeword is transmitted to the receiver. Receiver: Step # 1: Generator generator polynomial is known. Step # 2: Divide the received polynomial with the generator polynomial. If the remainder is 0, error- free transmission is assumed. If the remainder is not 0, error has occurred.