Presentation is loading. Please wait.

Presentation is loading. Please wait.

EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao

Similar presentations


Presentation on theme: "EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao"— Presentation transcript:

1 EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao wenbing@ieee.org

2 2 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Outline Error Detection – CRC Exercises for Framing and Error Detection Medium Access Control

3 3 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Error-Detecting Codes: CRC Polynomial code, also known as CRC (Cyclic Redundant Code) Treat bit string as polynomial with 0 and 1 coefficients m-bit frame: M(x) = b m-1 x m-1 + … + b 0 E.g.: 11011010 => M(x) = x 7 + x 6 + x 4 + x 3 + x 1 Use modulo 2 arithmetic –No carries or borrows: XOR The degree of a polynomial is the maximum of the degrees of all terms in the polynomial

4 4 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Cyclic Redundant Code Sender and receiver agree on generator polynomial G(x) (High & low order bits must be 1) For a frame with m bits corresponding to M(x), m > deg G(x) = r Append checksum to end of frame so polynomial T(x) corresponding to checksummed frame is divisible by G(x) When receiver gets checksummed frame, divides T(x) by G(x) If remainder R(x) != 0, then transmission error

5 5 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Algorithm to Compute CRC Checksum Let m = deg M(x), r = deg G(x) Append r 0 bits to lower-order end of frame: x r M(x) Divide bit string corresponding to x r M(x) by bit string corresponding to G(x) Subtract remainder R(x) from bit string corresponding to x r M(x), result is checksummed frame. Let T(x) be its polynomial –x r M(x) = Q(x)G(x) + R(x) –x r M(x) – R(x) = Q(x)G(x) = T(x)

6 6 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Compute CRC Checksum XOR

7 7 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao International Standard Polynomials CRC-12 G(x) = x 12 + x 11 + x 3 + x 2 + x 1 + 1 –Used for 6-bit characters CRC-16 G(x) = x 16 + x 15 + x 2 + 1 CRC-CCITTG(x) = x 16 + x 12 + x 5 + 1 –Used for 8-bit characters CRC-32G(x) = x 32 + x 26 + x 23 + x 22 + x 16 + x 11 + x 10 + x 8 + x 7 + x 5 + x 4 + x 2 + x 1 + 1 –Used in IEEE 802 –Detects all bursts of length 32 or less and all bursts affecting an odd number of bits

8 8 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Exercise Q1. The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted (in binary) for the four- character frame: A B ESC FLAG when each of the following framing methods are used: (a) Character count. (b) Flag bytes with byte stuffing. (c) Starting and ending flag bytes, with bit stuffing

9 9 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Exercise Q4. One of your classmates, Scrooge, has pointed out that it is wasteful to end each frame with a flag byte and then begin the next one with a second flag byte. One flag byte could do the job as well, and a byte saved is a byte earned. Do you agree?

10 10 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Exercise Q5. To provide more reliability than a single parity bit can give, an error-detecting coding scheme uses one parity bit for checking all the odd-numbered bits and a second parity bit for all the even-numbered bits. What is the Hamming distance of this code?

11 11 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Exercise Q6. A bit stream 10011101 is transmitted using the standard CRC method described in the text. The generator polynomial is x 3 + 1. Show the actual bit string transmitted. Suppose the third bit from the left is inverted during transmission. Show that this error is detected at the receiver's end.

12 12 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Medium Access Control Sublayer Broadcast channels often used on DLL –multiaccess or random access The channel allocation problem: Who gets to use the channel? –Static Channel Allocation –Dynamic Channel Allocation

13 13 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Static Channel Allocation FDM – Frequency Division Multiplexing –Frequency spectrum divided into logical channel –Each user has exclusive use of own frequency band TDM – Time Division Multiplexing –Time divided into slots each user has time slot –Users take turns in round robin fashion Problem: wasted bandwidth if user does not use his/her frequency band or timeslot

14 14 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Frequency Division Multiplexing

15 15 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Time Division Multiplexing T1 Carrier (1.544 Mbps)

16 16 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Model for Dynamic Channel Allocation N independent stations (also called terminals) Probability of a frame being generated in an interval  t is  t (arrival rate constant) Once a frame has been generated, the station is blocked until the frame is transmitted successfully

17 17 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Model for Dynamic Channel Allocation Single Channel shared by all stations Collision – event when two frames transmitted simultaneously and the resulting signal is garbled –All stations can detect collisions

18 18 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Model for Dynamic Channel Allocation Frame transmission time –Continuous Time – can begin at any instant –Slotted Time – always begin at the start of a slot Carrier sense or not –Carrier sense – stations can tell if the channel is busy. Do not send if channel is busy –No carrier sense – just go ahead and send

19 19 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols

20 20 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Pure ALOHA Let users transmit whenever they have data to send If frame destroyed (due to collision), sender waits random amount of time, sends again User does not listen before transmitting

21 21 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Pure ALOHA: Vulnerable Period Vulnerable period for a frame: A collision will happen if another frame is sent during this period 2 frame time

22 22 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Pure ALOHA Throughput for ALOHA systems

23 23 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Slotted ALOHA Idea: divide time into intervals, each interval corresponds to one frame –Station is permitted to send only at the beginning of next slot Vulnerable period is halved (1 frame time) –Probability of no collision in time slot = e -G –Throughput S = G e -G –Max occurs when G = 1, S = 2*0.184

24 24 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Carrier Sense Multiple Access When station has data to send, listens to channel to see if anyone else is transmitting If channel is idle, station transmits a frame Else station waits for it to become idle If collisions occurs, station waits random amount of time, tries again Also called 1-persistent CSMA –With probability 1 station will transmit if channel is idle

25 25 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao After a station starts sending, it takes a while before 2nd station receives 1st station ’ s signal –2nd station might start sending before it knows that another station has already been transmitting If two stations become ready while third station transmitting –Both wait until transmission ends and start transmitting, collision results Carrier Sense Multiple Access: Collision Still Possible

26 26 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao p-persistent CSMA: Reduce the Probability of Collision Sense continuously, but does not always send when channel is idle –Applicable for slotted channels When ready to send, station senses the channel –If channel idle, station transmits with probability p, defers to next slot with probability q = 1-p –Else (if channel is busy) station waits until next slot tries again –If next slot idle, station transmits with probability p, defers with probability q = 1-p –…–…

27 27 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Non-Persistent CSMA Does not sense continuously, send if it senses the channel is idle Before sending, station senses the channel –If channel is idle, station begins sending –Else station does not continuously sense, waits random amount of time, tries again

28 28 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Persistent and Nonpersistent CSMA Improves over ALOHA because they ensure no station to transmit when it senses channel is busy

29 29 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao CSMA with Collision Detection If two stations start transmitting simultaneously, both detect collision and stop transmitting Minimum time to detect collision = time for signal to propagate

30 30 Fall Semester 2007EEC-484/584: Computer NetworksWenbing Zhao Contention Period: Minimum Time to Detect Collision Let the time for a signal to propagate between the two farthest stations be  For station to be sure it has channel and other stations will not interfere, it must wait 2  without hearing a collision (not  as you might expect) –At t 0, station A begins transmitting –At t 0 +  - , B begins transmitting, just before A ’ s signal arrives –B detects collision and stops –At t 0 +  -  +  (t 0 +2  -  ), A detects collision A B


Download ppt "EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao"

Similar presentations


Ads by Google