Chapter 6: Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Third Edition.

Slides:



Advertisements
Similar presentations
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Advertisements

Introduction to Information Technologies
EIE325: Telecommunication TechnologiesMaciej J. Ogorza ł ek, PolyU, EIE Telecommunication Technologies Week 8 Flow Control Error Control.
William Stallings Data and Computer Communications 7th Edition
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
Reliability & Channel Coding
Chapter 6 Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control.
Data Link Layer – Part 1 V.T.Raja Oregon State University.
Error Detection and Correction
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Sixth Edition.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
The Data Link Layer Chapter 3. Position of the data-link layer.
Long distance communication Multiplexing  Allow multiple signals to travel through one medium  Types Frequency division multiplexing Synchronous time.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 6: Errors, Error Detection, and Error Control
Data Communications Chapter 7 Error Detection. Despite the best prevention techniques, errors may still happen. To detect an error, something extra has.
Network Data Organizational Communications and Technologies Prithvi N. Rao Carnegie Mellon University Web:
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
Chapter 6 Errors, Error Detection, and Error Control
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
Data Link Layer RAHUL DEVA.
Chapter 5 Data Link Layer.
Lecture 06 Errors, Error Detection, and Error Control.
Data Link Control Protocols
William Stallings Data and Computer Communications 7th Edition
PART III DATA LINK LAYER. Position of the Data-Link Layer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Data and Computer Communications
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
1 Chapter 6 Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Eighth Edition.
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, October 2011.
Errors, Error Detection, and Error Control
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Session 4. Objectives: By the end of this session, the student will be able to: Identify the different types of noise commonly found in computer networks.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Chapter 3: Channel Coding (part 3). Automatic repeat request (ARQ) protocols ▫Used in combination with error detection/correction ▫Block of data with.
Copyright ©2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible web site, in whole.
FUNDAMENTALS OF NETWORKING
Chapter Two Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User's Approach Eighth Edition.
1 FIT1005 Topic 6 - Data Link Layer Reference: Chapter 7 -Stallings.
Data and Computer Communications Eighth & Ninth Edition by William Stallings Chapter 6 – Digital Data Communications Techniques.
Telecommunications & Networking Lesson 3. ISO Open System Interconnect (OSI) Application Presentation Session Transport Network Data Link Physical Application.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
Chapter 9: Data Link Control Business Data Communications, 4e.
NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS ( NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS (PRACTICAL PART) Tutorial 4 : Chapter 7 Data & computer.
Chapter 9: Data Link Control
Chapter Two Fundamentals of Data and Signals
Chapter 6 Errors, Error Detection, and Error Control
Chapter Six Errors, Error Detection, and Error Control
Chapter 4 Data Link Layer.
CIS 321 Data Communications & Networking
Chapter Six - Errors, Error Detection, and Error Control
Chapter 4 Data Link Layer
Data Link Layer What does it do?
Chapter 4 Data Link Layer.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Chapter 9: Data Link Control
Presentation transcript:

Chapter 6: Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Third Edition

Data Communications & Computer Networks: A Business User's Approach, Third Edition2 Objectives After reading this chapter, you should be able to: Identify the different types of noise commonly found in computer networks Specify the different error-prevention techniques, and be able to apply an error-prevention technique to a type of noise Compare the different error-detection techniques in terms of efficiency and efficacy

Data Communications & Computer Networks: A Business User's Approach, Third Edition3 Objectives (continued) Perform simple parity and longitudinal parity calculations, and enumerate their strengths and weaknesses Cite the advantages of cyclic redundancy checksum, and specify what types of errors cyclic redundancy checksum will detect Differentiate between the three basic forms of error control, and describe the circumstances under which each may be used

Data Communications & Computer Networks: A Business User's Approach, Third Edition4 Objectives (continued) Follow an example of Stop-and-wait ARQ, Go- back-N ARQ, and Selective-reject ARQ

Data Communications & Computer Networks: A Business User's Approach, Third Edition5 Introduction Noise is always present If a communications line experiences too much noise Signal will be lost or corrupted Communication systems should check for transmission errors Once an error is detected, a system may perform some action Some systems perform no error control, but simply let the data in error be discarded

Data Communications & Computer Networks: A Business User's Approach, Third Edition6 Noise and Errors – White Noise Also known as thermal or Gaussian noise Relatively constant Can be reduced If white noise gets to strong Can completely disrupt signal

Data Communications & Computer Networks: A Business User's Approach, Third Edition7 White Noise (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition8 Impulse Noise One of the most disruptive forms of noise Random spikes of power Can destroy one or more bits of information Difficult to remove from an analog signal May be hard to distinguish from original signal Impulse noise can damage more bits if the bits are closer together (transmitted at a faster rate)

Data Communications & Computer Networks: A Business User's Approach, Third Edition9 Impulse Noise (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition10 Impulse Noise (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition11 Crosstalk Unwanted coupling between two different signal paths For example, hearing another conversation while talking on the telephone Relatively constant Can be reduced with proper measures

Data Communications & Computer Networks: A Business User's Approach, Third Edition12 Crosstalk (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition13 Echo The reflective feedback of a transmitted signal as the signal moves through a medium Most often occurs on coaxial cable If echo bad enough, it could interfere with original signal Relatively constant Can be significantly reduced

Data Communications & Computer Networks: A Business User's Approach, Third Edition14 Echo (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition15 Jitter The result of small timing irregularities during transmission of digital signals Occurs when a digital signal is repeated over and over If serious enough, jitter forces systems to slow down their transmission Steps can be taken to reduce jitter

Data Communications & Computer Networks: A Business User's Approach, Third Edition16 Jitter (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition17 Delay Distortion and Attenuation Delay Distortion - occurs because the velocity of propagation of a signal through a medium varies with the frequency of the signal Can be reduced Attenuation - the continuous loss of a signal’s strength as it travels through a medium

Data Communications & Computer Networks: A Business User's Approach, Third Edition18 Error Prevention To prevent errors from happening, several techniques may be applied: Proper shielding of cables to reduce interference Telephone line conditioning or equalization Replacing older media and equipment with new, possibly digital components Proper use of digital repeaters and analog amplifiers Observe the stated capacities of the media

Data Communications & Computer Networks: A Business User's Approach, Third Edition19 Error Prevention (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition20 Error Detection Despite best prevention techniques, errors may still occur To detect an error, error detection code has to be added to the data/signal Let’s examine two basic techniques for detecting errors: Parity checking Cyclic redundancy checksum

Data Communications & Computer Networks: A Business User's Approach, Third Edition21 Parity Checks Simple parity - If performing even parity, add a parity bit such that an even number of 1s is maintained If performing odd parity, add a parity bit such that an odd number of 1s is maintained For example, send using even parity For example, send using even parity

Data Communications & Computer Networks: A Business User's Approach, Third Edition22 Parity Checks (continued) What happens if the character is sent and the first two 0s accidentally become two 1s? Thus, the following character is received: Will there be a parity error? Problem: Simple parity only detects odd numbers of bits in error

Data Communications & Computer Networks: A Business User's Approach, Third Edition23 Longitudinal Parity Longitudinal parity Adds parity bit to each character Then adds row of parity bits after a block of characters Row of parity bits is actually a parity bit for each “column” of characters Row parity bits plus column parity bits add a great amount of redundancy to a block of characters

Data Communications & Computer Networks: A Business User's Approach, Third Edition24 Longitudinal Parity (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition25 Longitudinal Parity (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition26 Parity Checks (continued) Both simple parity and longitudinal parity do not catch all errors Simple parity only catches odd numbers of bit errors Longitudinal parity is better at catching errors But requires too many check bits added to a block of data We need a better error detection method What about cyclic redundancy checksum?

Data Communications & Computer Networks: A Business User's Approach, Third Edition27 Cyclic Redundancy Checksum (CRC) CRC error detection method treats packet of data to be transmitted as a large polynomial Transmitter Using polynomial arithmetic, divides polynomial by a given generating polynomial Quotient is discarded Remainder is “attached” to the end of message

Data Communications & Computer Networks: A Business User's Approach, Third Edition28 Cyclic Redundancy Checksum (continued) Message (with the remainder) is transmitted to the receiver Receiver divides the message and remainder by same generating polynomial If a remainder not equal to zero results  error during transmission If a remainder of zero results  error during transmission

Data Communications & Computer Networks: A Business User's Approach, Third Edition29 Cyclic Redundancy Checksum (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition30 Error Control Once an error is detected, what is the receiver going to do? 1.Do nothing 2.Return an error message to the transmitter 3.Fix the error with no further help from the transmitter

Data Communications & Computer Networks: A Business User's Approach, Third Edition31 Error Control (continued) Do nothing Seems like a strange way to control errors Some newer systems such as frame relay perform this type of error control Return a message has three basic formats: 1.Stop-and-wait ARQ 2.Go-back-N ARQ 3.Selective-reject ARQ

Data Communications & Computer Networks: A Business User's Approach, Third Edition32 Stop-and-wait ARQ Simplest error control protocol A transmitter sends a frame then stops and waits for an acknowledgment If a positive acknowledgment (ACK) is received, the next frame is sent If a negative acknowledgment (NAK) is received, the same frame is transmitted again

Data Communications & Computer Networks: A Business User's Approach, Third Edition33 Stop-and-wait ARQ (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition34 Go-back-N ARQ Go-back-N ARQ and selective reject are more efficient protocols They assume that multiple frames are in transmission at one time (sliding window) A sliding window protocol allows transmitter to send up to the window size frames before receiving any acknowledgments When a receiver does acknowledge receipt, the returned pack contains the number of the frame expected next

Data Communications & Computer Networks: A Business User's Approach, Third Edition35 Sliding Window Protocol

Data Communications & Computer Networks: A Business User's Approach, Third Edition36 Go-back-N ARQ (continued) Using the go-back-N ARQ protocol, if a frame arrives in error, the receiver can ask the transmitter to go back to the Nth frame and retransmit it After the Nth frame is retransmitted, the sender resends all subsequent frames

Data Communications & Computer Networks: A Business User's Approach, Third Edition37 Selective-reject ARQ Most efficient error control protocol If a frame is received in error, the receiver asks transmitter to resend ONLY the frame that was in error Subsequent frames following the Nth frame are not retransmitted

Data Communications & Computer Networks: A Business User's Approach, Third Edition38 Selective-reject ARQ (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition39 Selective-reject ARQ (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition40 Selective-reject ARQ (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition41 Selective-reject ARQ (continued)

Data Communications & Computer Networks: A Business User's Approach, Third Edition42 Correct the Error For a receiver to correct the error with no further help from the transmitter requires a large amount of redundant information accompanying original data This redundant information allows the receiver to determine the error and make corrections This type of error control is often called forward error correction

Data Communications & Computer Networks: A Business User's Approach, Third Edition43 Error Detection in Action Asynchronous transfer mode (ATM) incorporates many types of error detection and error control ATM inserts a CRC into the data frame (the cell), which checks only the header and not the data This CRC is also powerful enough to perform simple error correction on the header A second layer of ATM applies a CRC to the data, with varying degrees of error control

Data Communications & Computer Networks: A Business User's Approach, Third Edition44 Summary Noise in computer networks Error-prevention techniques Simple parity and longitudinal parity calculations Cyclic redundancy checksum Three forms of error control Stop-and-wait ARQ, Go-back-N ARQ and Selective-reject ARQ