Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 6 – Digital Data Communications Techniques.

Slides:



Advertisements
Similar presentations
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Data and Computer Communications Digital Data Communications Techniques.
Introduction to Information Technologies
Data and Computer Communications
NETWORKING CONCEPTS. ERROR DETECTION Error occures when a bit is altered between transmission& reception ie. Binary 1 is transmitted but received is binary.
Chapter 6: Digital Data Communications Techniques
COE 341: Data & Computer Communications (T081) Dr. Marwan Abu-Amara Chapter 6: Digital Data Communications Techniques.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 6 – Digital Data Communications Techniques.
Coding and Error Control
Lecture 9-10: Error Detection and Correction Anders Västberg Slides are a selection from the slides from chapter 8 from:
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 6: Digital Data Communications Techniques.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
William Stallings Data and Computer Communications 7th Edition Chapter 6 Digital Data Communications Techniques.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Chapter 6: Digital Data Communications Techniques
Data Communications Chapter 6 The Data Communications Interface.
Digital Data Communications Techniques Updated: 2/9/2009.
1/26 Chapter 6 Digital Data Communication Techniques.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Coding and Error Control
Coding and Error Control
Data and Computer Communications. The Data Link Layer.
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
ECS 152A 4. Communications Techniques. Asynchronous and Synchronous Transmission Timing problems require a mechanism to synchronize the transmitter and.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 6 – Digital Data Communications Techniques.
Data and Computer Communications
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer: Error Detection and Correction
Data Communications, Kwangwoon University10-1 Part 3 Data Link Layer Chapter 10 Error Detection and Correction Chapter 11 Data Link Control Chapter 12.
Data and Computer Communications Chapter 6 – Digital Data Communications Techniques.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Lecture 3-2: Coding and Error Control (Cont.) ECE
1 Chapter 8. Coding and Error Control Wen-Shyang Hwang KUAS EE.
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, October 2011.
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
CSC 335 Data Communications and Networking
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
CSCI 465 D ata Communications and Networks Lecture 9 Martin van Bommel CSCI 465 Data Communications & Networks 1.
CHAPTER 3: DATA LINK CONTROL Flow control, Error detection – two dimensional parity checks, Internet checksum, CRC, Error control, Transmission efficiency.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
Error Detection. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. An error-detecting code can.
Error Detection and Correction
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
1/30/ :20 PM1 Chapter 6 ─ Digital Data Communication Techniques CSE 3213 Fall 2011.
FIT1005 FIT – Monash University
Coding and Error Control
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Business Telecommunications Data and Computer Communications Chapter 6 The Data Communications Interface.
Data and Computer Communications Eighth & Ninth Edition by William Stallings Chapter 6 – Digital Data Communications Techniques.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Powerpoint Templates Computer Communication & Network Week # 10.
Data and Computer Communications Digital Data Communications Techniques + Error Control+ Digital Data Communications Techniques + Error Control+Multiplexing.
Coding and Error Control
Lecture 4 Error Detecting and Correcting Techniques Dr. Ghalib A. Shah
CSE 5345 – Fundamentals of Wireless Networks
The Data Link Layer Supplementery Slides
William Stallings Data and Computer Communications
Data and Computer Communications
Data and Computer Communications
Pemrosesan Data Tersebar
Digital data communication (Error control)
William Stallings Data and Computer Communications 7th Edition
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, August 2010.
Data and Computer Communications
Data and Computer Communications
Data and Computer Communications
Coding and Error Control
William Stallings Data and Computer Communications
Presentation transcript:

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 6 – Digital Data Communications Techniques

Digital Data Communications Techniques A conversation forms a two-way communication link; there is a measure of symmetry between the two parties, and messages pass to and fro. There is a continual stimulus-response, cyclic action; remarks call up other remarks, and the behavior of the two individuals becomes concerted, co-operative, and directed toward some goal. This is true communication. —On Human Communication, Colin Cherry

Transmission Modes data transmission to data communications. Timing problems require a mechanism to synchronize the transmitter and receiver Timing of bits is the key! —Rate —Duration —Spacing …… System A System B

Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver —receiver samples stream at bit intervals —if clocks not aligned and drifting will sample at wrong time after sufficient bits are sent two solutions to synchronizing clocks —asynchronous transmission —synchronous transmission

Asynchronous and Synchronous Transmission Assume 1 Mbps data rate Bit time is 1 us (sender’s clock) Assume a drift between Tx clock and Rx clock is 1% (Rx is faster than tx) Bits must be sampled at center First bit will have a drift by 0.01 us After 50 bit the receiver will detect error sample

Asynchronous and Synchronous Transmission Asynchronous –Each character of data is treated independently Synchronous –For sending large blocks of data –Control schemes Character-oriented Bit-oriented

Asynchronous Data transmitted one character at a time —5 to 8 bits Timing only needs to be maintained within each character —TxClk and RxClk need not be in Sync! Resync at the beginning of each character

Asynchronous (diagram)

Example

Asynchronous - Behavior In a steady stream, interval between characters is uniform (length of stop element) In idle state, receiver looks for transition 1 to 0 Then samples next seven intervals (char length) Then looks for next 1 to 0 for next char Simple Cheap Overhead of 2 or 3 bits per char (~20%) Good for data with large gaps (keyboard)

Synchronous - Bit Level Block of data transmitted without start or stop bits Clocks must be synchronized Can use separate clock line —Good over short distances —Subject to impairments Embed clock signal in data —Manchester encoding —Carrier frequency (analog)

Synchronous - Block Level another level of synchronization is required Need to indicate start and end of block Use preamble and postamble —e.g. series of SYN (hex 16) characters —e.g. block of patterns ending in More efficient (lower overhead) than async

Synchronous (diagram)

Types of Error All communication channels suffer from noise and signal distortion that cause transmission error An error occurs when a bit is altered between transmission and reception Single bit errors —One bit altered —Adjacent bits not affected —White noise

Types of Error Burst errors —A group of bits in which two successive erroneous bits are always separated by less than a given number x of correct bits. The last erroneous bit in the burst and the first erroneous bit in the following burst are accordingly separated by x correct bits or more. —A burst error means that 2 or more bits in the data unit have changed The length is measured from the first corrupted bit to the last corrupted bit —Impulse noise —Fading in wireless —Effect greater at higher data rates

Bit and Burst Error

Transmission Errors The Bit Error Rate (BER) is a measure of how frequently an error is likely to occur. For example BER of means that. On average, 1 bit in every 100,000 will be wrong. Probabilities with respect to errors in transmitted frame: —P b : Probability that a bit is received in error (BER) —P 1 : probability that a frame arrives with no bit errors. —P 2 : probability that, with an error-detection algorithm in use, a frame arrives with one or more undetected errors —P 3 : probability that, with an error-detection algorithm in use, a frame arrives with one or more detected errors but no undetected bit errors.

Transmission Errors P 1 = (1 – P b ) F P 2 = ( 1- P 1 ) F is the number of bits per frame

Error Detection Process

Simple Parity-Check Codes Simplest method and most common method for detecting errors in character oriented transmission. An extra parity bit is added to each character before it is transmitted. The value of the parity is determined by adding up the number ‘1’ bits in the message to be sent. The parity bit is chosen so that the total number of 1 bits, including the parity itself, is either odd or even A simple parity-check code is a single-bit error-detecting code in which n = k + 1 A simple parity-check code can detect an odd number of errors.

Cyclic Redundancy Check one of most common and powerful checks for block of k bits transmitter generates an n-k bit frame check sequence (FCS) Transmits n bits which is exactly divisible by some number receiver divides frame by that number —if no remainder, assume no error

Modular Arithmetic In modulo-N arithmetic, we use only the integers in the range 0 to N −1, inclusive. Modulo 2 arithmetic uses binary addition with no carries Modulo-2 Arithmetic —N is 2 —Use 0 and 1 —Implemented as XOR

Cyclic Redundancy Check Define — T = n-bit frame to be transmitted — D = k-bit block of data, or message, the first k bits of T — F = (n-k) – bit FCS, the last (n-k) bits of T — P = pattern of n-k +1 bits, this is the predetermined divisor We want T/P to be with no remainder

Cyclic Redundancy Check Prepare the transmitted frame —T = 2 n-k D + Fshift by n-k, then add F We want to find F which is the remainder at the TX side. —2 n-k D/P = Q + R/P Because division is modulo 2, the remainder is always at least one bit shorter than the divisor use it as our FCS —T = 2 n-k D + R Does this R satisfy our condition that T/P have no remainder

Cyclic Redundancy Check At the receiver —T/P = (2 n-k D + R)/p = 2 n-k D/P + R/P Substitute —T/P = Q + R/P + R/P —T/P = Q+(R+R)/P = Q

Division for Two Cases

Cyclic Code Analysis the errors in an n-bit frame can be represented by an n-bit field with 1s in each error position The resulting frame can be expressed as

Polynomials

The CRC process can now be described as Prove the same result as moduls-2 at the receiver

Example

Cyclic Code Analysis An error E(X) will only be undetectable if it is divisible by P(X) the following errors are not divisible by a suitably chosen P(X) and hence are detectable:

Cyclic Code Analysis Consider all error patterns are equally likely r is the length of the FCS For a burst error of length r+1 —the probability of an undetected error (E(X) is divisible by P(X)) is 1/2 r-1 For longer burst, the probability is 1/2 r

CRC Standards CRC-12 (X 12 + X 11 + X 3 + X 2 + X + 1) —Used when character length is 6 bits CRC-16 and CRC-CCITT —Used when character length is 8 bits —Used in WANs CRC-32 —Used in LANs

Digital logic The register contains n-k bits, equal to the length of the FCS There are up to n-k XOR gates The presence or absence of a gate corresponds to the presence or absence of a term in the divisor polynomial, P(X). Excluding the term 1 and X n-k

36 Division in CRC Encoder

37 Hardware Implementation The divisor is repeatedly XORed with part of the dividend The divisor has n-k+1 bits which either are predefined or all 0s n-k bits of the divisor is needed in the XOR operation. The leftmost bit is always 0

Remainder

Digital Logic

Error Correction Correction of detected errors usually requires data block to be retransmitted (see chapter 7) Not appropriate for wireless applications —Bit error rate is high Lots of retransmissions —Propagation delay can be long (satellite) compared with frame transmission time Would result in retransmission of frame in error plus many subsequent frames Need to correct errors on basis of bits received

Error Correction Process Diagram

Error Correction Process Each k bit block mapped to an n bit block (n>k) —Codeword —Forward error correction (FEC) encoder Codeword sent Received bit string similar to transmitted but may contain errors Received code word passed to FEC decoder —If no errors, original data block output —Some error patterns can be detected and corrected —Some error patterns can be detected but not corrected —Some (rare) error patterns are not detected Results in incorrect data output from FEC

Working of Error Correction Add redundancy to transmitted message Can deduce original in face of certain level of error rate E.g. block error correction code —In general, add (n – k ) bits to end of block Gives n bit block (codeword) All of original k bits included in codeword —Some FEC map k bit input onto n bit codeword such that original k bits do not appear

Block Code Principle An (n, k) block code encodes k data bits into n-bit codewords Hamming Distance The Hamming distance between any pair of codewords is the number of bit positions at which they differ. the Hamming distance between codewords [ ] and [ ] is 4. For a code w 1, w 2, …, w s, s = 2 k, the minimum distance d min of the code is defined as

Block Code Principle example For k = 2 and n =5 the following assignment can be made The received bit pattern is The hamming distance d(00000, 00100) = 1;d(00111, 00100) = 2 d(11001, 00100) = 4;d(11110, 00100) = 3 -There are 32 possible codeword of which only 4 are valid. -If the received code is or the valid codes are or for the first one and or for the second.

Block Code Principle The maximum number of guaranteed correctable errors per codeword satisfies Largest integer not exceeds the specified value e.g. 6.3 = 6 The number of errors to be detected satisfies

Block Code Principle The design of block codes involves a number of consideration: — For a given value of n and k, we would like the largest possible value of d min — The code should be relatively easy to encode and decode, requiring min. memory and processing time. — We would like the number of extra bits (n-k), to be small, to reduce the bandwidth. — We would like the number of extra bits (n-k), to be large, to reduce error rate.

Block Code Principle coding can be used to reduce the required E b /N 0 value to achieve a given bit error rate (ch 5) The coding discussed in this chapter also has an effect on E b /N 0 the shaded region represents the area in which improvement can be achieved coding gain —the required E b /N 0 to achieve a specified BER of an error-correcting coded system compared to an uncoded system using the same modulation

How Coding Improves System Performance equal number of data and check bits

Line Configuration - Topology physical arrangement of stations on medium —point to point - two stations such as between two routers / computers —multi point - multiple stations traditionally mainframe computer and terminals now typically a local area network (LAN)

Line Configuration - Topology

Line Configuration - Duplex classify data exchange as half or full duplex half duplex (two-way alternate) —only one station may transmit at a time —requires one data path full duplex (two-way simultaneous) —simultaneous transmission and reception between two stations —requires two data paths separate media or frequencies used for each direction —or echo canceling a signal processing technique to transmit digital signals simultaneously in both directions on a single transmission line

Problem Assignments  Solve all the review questions  Try the following problems:  6.1, 6.5, 6.10, 6.14, 6.15, 6.17