Basic Communication Concepts
|
|
- Jean Alexander
- 6 years ago
- Views:
Transcription
1 Chapter 3 Basic Communication Concepts 3.1 Introduction This chapter introduces some of the basic concepts of signals and information communication. The following section, 3.2, looks at some of the ways signals become more difficult to receive as they travel through various media. When more than one device attempts to send a signal, the result is a collision and the correct data cannot be transmitted. Section 3.3 discusses handling collisions a major issue when multiple devices share a single, limited medium. Finally, errors in a digital signal can be detected and in many cases the signal can be restored before it is resent, processed, or stored. Section 3.4 introduces some of the basics of error detection and correction. Like many of the topics we will study in computer networks class, error detection and correction are not limited to networks but are applied in many other areas of computer science, especially data storage, which we will discuss again in the Chapter Signal Degradation This section introduces three main types of signal degradation: attenuation, noise, and interference. Attenuation is the gradual decrease in signal strength with increased distance and time. Noise is caused by many sources but we will first consider the properties of noise. One particular source of noise is interference from other signals. Attenuation is a gradual loss of amplitude or power in a signal as it 19
2 20 CHAPTER 3. BASIC COMMUNICATION CONCEPTS propagates (moves) through a medium. The attenuation of a radio signal depends on its frequency. The radio signals used in Wi-Fi networks (usually narrow bands in the 2 to 5 GHz range) normally extends only through one area of a building, several floors. Attenuation of radio signals also depends on the atmospheric conditions, the weather. Occlusion refers to a more permanent reduction of a signal due to permanent objects such as buildings, mountains, or the curve of the Earth. Noise can also be introduced in the amplification process and other signal processing. Signal-to-noise ratio (S/N ratio, or SNR) is a measure of the amount of noise present in the signal compared to the part of the signal that is able to transmit data. Another source of signal noise is when nearby signals are introduced into the media or devices or otherwise change the signal. Because an electrical signal is usually sent with two or more wires, electrical interference can occur from another wire in the same transmission. Some of the techniques for reducing this type of interference, known as crosstalk, are discussed in Chapter 4. Signal interference is especially a problem in wireless transmissions. All electronic devices can emit radio signals so new devices and systems must be checked carefully to prevent noise in the radio bands that are reserved. For this reason, in many countries electronic devices must be registered with the communication authorities, such as the FCC (Federal Communications Commission) in the US and JATE (Japan Approvals Institute for Telecommunications Equipment) in Japan. In Europe, devices must carry the (European Conformity) symbol indicating their compliance with EU legislation. 3.3 Collision Detection and Avoidance In addition to interference from outside sources, there are times that two or more devices attempt to use a limited channel at the same time. This special kind of interference, called a collision, is very common, in part because it is inconvenient and sometimes inefficient to design systems to listen every time they send. Even when devices do listen, there is generally nothing to prevent two systems from simultaneously starting to use one channel. For this reason, when there is some possibility for collisions, systems have methods for determining how to handle the collision. One method, used in Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for
3 3.4. ERROR DETECTION AND CORRECTION 21 ethernet, is to have each device wait a pseudorandomly set time period before attempting to send the signal again. Another method, used in Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) for wireless networks (such as networks), is to have a device request a time interval to transmit. Other devices acknowledge the request and do not transmit until the transmission or allotted time period is complete. Collision detection and avoidance is included in Media Access Control (MAC), the Data-Link Layer protocols that allow various devices to share wired or wireless physical channels, protocols we will cover again when we talk about MAC addresses. 3.4 Error Detection and Correction Error detection and correction is a fundamental part of all information processing because all media, whether it be for storage or communication, has the possibility of errors. In error detection, the objective is to find errors. In error correction, the correct values can often be found even when there are errors. The correct value is determined by the sender. In networking, error detection and correction is usually done in the Data Link Layer or the Transport Layer. The Data Link Layer handles errors that occur from the physical media, NIC devices, etc., for example, errors from the noise sources discussed above. Wireless media is more prone to errors and is therefore more likely to use error correction. One of the tasks of the Transport Layer is to check packet integrity so on the sending side data is added to allow checking on the receiving end. There are two basic methods of error detection and correction. The first is to send extra data along with the data to be sent and this method is used in parity bits, checksums, and mirroring. The other basic method is to limit the number of values that are used in communication so that it is likely that an error will be an invalid value and the correct data can be inferred, which is the method used in Hamming Distance. Parity is a method of appending (adding) check bits to the beginning or end of blocks of data so that the whole block has an easily-computed bit characteristic. For example, in odd parity, a bit may be added to ensure that the block of data (which could be large or small depending on the number of errors expected, among other considerations) has an odd number of bits set to 1. (Even parity would add a bit to ensure an even number of 1 s.) In block parity, multiple parity bits can be added horizontally (on one contiguous
4 22 CHAPTER 3. BASIC COMMUNICATION CONCEPTS set of bits, for example each byte or word) and vertically (on one bit in each set for the whole block). When an single-bit error occurs, block parity can usually correct the error. Parity is usually a method of error detection but block parity can provide error detection and correction. Checksums are an extension of the idea of parity. You can observe checksums all around you, many are designed to prevent error by human users in number entry. However, the basic principle is exactly the same. Like parity, asetofcontiguousdigits(contiguousbitsinbinarydataordecimaldigits in human readable data) is fed through an iterative algorithm (a loop). The output of the algorithm is then appended to the data, just as in parity bits. On the other end, the same algorithm or a complementary algorithm is used to check the data. The name checksum seems to imply that the result is a sum. For example, Internet Checksum is simply an iterative sum in which the overflow is thrown away. However, most checksum algorithms use specially selected values on each digit or on each set of bits so that errors such as reversed digits (in human data entry) or noise bursts (in communication) can be detected more reliably. One of the most common types of checksum algorithm is called Cyclic Redundancy Check. (Technically, all parity bit algorithms are cyclic redundancy checks of the shortest bit length, one bit.) Typically, a cyclic redundancy check uses an agreed-upon value of a set bit length, one bit longer than the bits to be appended as a checksum. This value is repeatedly subtracted or XORed from a set of bits, shifting from left to right to find a remainder. The remainder is appended to the bits to be sent so that on the receiving end the remainder of the same operation is always zero. (See the accompanying worksheet.) Mirroring is simply storing or sending more than one copy of the data. This kind of redundancy uses a lot of media resources and so is used most commonly in data storage, where media is not as limited as in communication. Mirroring is often used for data recovery rather than error detection and so are used together with less resource expensive error detection such as parity. For example, redundant disk storage often uses parity for error detection and mirroring to recover the correct data.
5 3.5. GLOSSARY Glossary append (indatamanipulation)addbitsorbytestothebeginningorend of an existing datum. attenuation The reduction in strength, and therefore in signal-to-noise ratio, of a signal as it travels over distance. block parity Addingparitytoasequenceofwordsbothhorizontally(one parity bit added to each word) and vertically (an additional parity word, the same width as the data, with its own parity bit). A single-bit error can be both detected and corrected by finding the intersection of horizontal and verticla parity errors. Horizontal parity indicates which word is errnoneous, and vertical parity identifies which bit within that word is erroneous. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) A Data-Link Layer mechanism allowing multiple devices to transmit over the same physical medium. Before transmission a device transmits a request to reserve a block of time during which it alone will be able to transmit. When the other devices sharing the medium acknowledge this request the transmitter sends its information. The reservation ends when the data has been transmitted or the block of time has elapsed. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) A Data-Link Layer mechanism allowing multiple devices to transmit over the same physical medium. When a device transmits a message it monitors the medium for conflicting transmissions (collisions). When a collision is detected, all transmitted data is invalidated and each transmitter waits a pseudo-random time (growing exponentially with successive collisions) before attempting to retransmit the message. (European Conformity) Amanufacturers markindicatingthata device conforms to European Community regulations. Devices manufactured or offered for sale in the EU must carry this mark. The symbol stands for Conformité Européenne, which is European Conformity in French. checksum Extra data appended to a message or data for error detection purposes. collision Anattemptbytwotransmitterstosenddataonthesamephysical medium at the same time.
6 24 CHAPTER 3. BASIC COMMUNICATION CONCEPTS collision avoidance Reservingablockoftimeonasharedmedium,by mutual agreement between all transmitters, so that a transmitter can send a message without risk of collision. collision detection Monitoring a physical medium for conflicting tranmsissions and aborting all transmissions if a conflict is detected. crosstalk The pollution of one signal by content from another nearby signal being sent on a similar physical medium (such as an electrical wire). Cyclic Redundancy Check (CRC) degradation The reduction in quality (signal-to-noise ratio) of a signal because of attenuation or the introduction of noise as it travels over distance. error correction The process of (identifying and then) repairing data that has been damaged. error detection The process of identifying data that has been damaged. Federal Communications Commission (FCC) Anauthorityinthe US responsible for regulating the use of the electromagnetic spectrum and approving for sale devices that could potentially cause electromagnetic interference. interference The pollution of a signal either from a noise source or from another nearby signal traveling on the same or a similar medium. Japan Approvals Institute for Telecommunications Equipment (JATE) Aninstituteprovidingcompliancecertificationfortelecommunications equipment in Japan. Media Access Control (MAC) Data-LinkLayerprotocolsproviding physical hardware addresses and access control mechanisms allowing several network devices to communicate on a multiple access network over a shared medium such as wired or wireless Ethernet. medium A physical object through which a signal can propagate such as copper wire (electrical signals), fibre-optic cable (light signales), or space (radio signals). mirroring Anerrorrecoverymechanismthatusesredudantcopiesof data.
7 3.5. GLOSSARY 25 noise Signalcontentthatwasnotdeliberatedgeneratedbythetransmitter. Noise can be related to the type of content being sent (e.g., crosstalk), unrelated (e.g., an electromechanical device causing noise in a copper wire), or unrelated and possibly caused by natural physical processes (e.g., the white noise static heard in the background of weak radio signals). occlusion Attenuationofasignalcausedbyaphysicalobstructionbetween the transmitter and the receiver. packet integrity Correctness of the data within a packet. detection mechanism can verify packet integrity. An error parity Anextrabitappendedtoadatawordtoensuresomeproperty of the bits within that word, e.g., that the count of 1 bits is always odd (horizontal parity). An extra word can also be appended to a sequence of data words to provide parity for each bit position within the sequence (vertical parity). When combined, the two kinds of parity can identify and repair a single-bit error with the data. remainder The amount left over after performing an integer division. When dividing by a 2 n (a power of two) the quotient can be found by shifting the data to the right by n bits; the bits that are shifted out of the word on the right-hand side contain the remainder. signal-to-noise ratio (SNR, or S/N ratio) The strength of the content part of a signal divided by the combined strengths of all sources of noise impressed upon the signal. The SNR measures the quality of a communication channel, and a low SNR will threaten the integrity of data transmitted over it. (The number of bars on a WiFi or cellular telephone transceiver are related to the SNR of the communications channel being used. More bars indicate a higher SNR.) signal (incommunications)aquantitythatvariesovertime(orspace) in order to convey a message. Time-varying signals include speech as well as the modulatation of electrical voltage, light intensity, or electromagnetic wave frequency in computer communications networks. (Space-varying signals include photographic images.)
8 26 CHAPTER 3. BASIC COMMUNICATION CONCEPTS XOR Acronym for exclusive OR. A bitwise function whose output is 1 when exactly one of its inputs is 1. (The output is 0 if all inputs are 0 or more than one input is 1.) As a binary arithmetic operator it is often written as. A B A B It is equivalent to addition (and subtraction) in modulo 2 arithmetic. Copyright 2014 E.W. Cooper and I.K. Piumarta All rights reserved. Permission is granted for you to download, save and then view or print one copy of this document for personal study purposes. No other form of publishing, duplication or redistribution is permitted without explicit prior consent.
4.1 Introduction to Media and Devices
Chapter 4 Network Hardware 4.1 Introduction to Media and Devices Many of the issues discussed in this course, such as topology, scalability, and speed, depend on hardware. Unlike many of your computer
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationChapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify
More informationCS 4453 Computer Networks Winter
CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session
More informationCOMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?
Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationThe MAC Address Format
Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number
More informationLink layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationLecture 2 Error Detection & Correction. Types of Errors Detection Correction
Lecture 2 Error Detection & Correction Types of Errors Detection Correction Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind
More informationCSC 4900 Computer Networks: The Link Layer
CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationCMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd.
Parity Even parity: Odd parity: Add a bit to make the number of ones (1s) transmitted even. Add a bit to make the number of ones (1s) transmitted odd. Example and ASCII A is coded 100 0001 Parity ASCII
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need
More informationCS 43: Computer Networks The Link Layer. Kevin Webb Swarthmore College November 28, 2017
CS 43: Computer Networks The Link Layer Kevin Webb Swarthmore College November 28, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network Layer
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:
More informationComputer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1
Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter
More informationWEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS
WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS PHYSICAL LAYER Physical (hardware) layer: lowest level layer of the Internet Model. - Contains the actual network hardware cables, antennas, network interfaces
More informationGoal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste
Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a
More informationData Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1
Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationNetwork Media and Layer 1 Functionality
Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationMessage, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control
Links EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/ Announcements Homework
More informationPART III. Data Link Layer MGH T MGH C I 204
PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationOverview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer
Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology
More informationGoals of Today s Lecture. Adaptors Communicating
Goals of Today s Lecture EE 122: Link Layer Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationData Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow
More informationData Link Layer Overview
Data Link Layer Overview First of four classes on the data link layer Internet Architecture Bottom up: Physical: electromagnetic signals on the wire Link: data transfer between neighboring network elements
More informationComputer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University
Computer Networks Week 04 Media and Devices College of Information Science and Engineering Ritsumeikan University Network Media and Devices l When you build a network, the network hardware may be used
More informationData Link Layer Overview
Data Link Layer Overview : 9/7/2007 CSC 257/457 - Fall 2007 1 Internet Architecture Bottom-up: physical: electromagnetic signals on the wire link: data transfer between neighboring network elements network:
More informationData Link Layer Overview
Data Link Layer Overview First of four classes on the data link layer Internet Architecture Bottom up: Physical: electromagnetic signals on the wire Link: data transfer between neighboring network elements
More information(Refer Slide Time: 2:20)
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-15 Error Detection and Correction Hello viewers welcome to today s lecture
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationIntroduction to Computer Networks. 03 Data Link Layer Introduction
Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple
More informationLecture 8 Link Layer: functionality, error detection, media access algorithm
Lecture 8 Link Layer: functionality, error detection, media access algorithm From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright
More informationHigh Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection
High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution
More informationChapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationCSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images Prof Bill Buchanan
CSN874 Telecommunications 5: Error Coding Data, Audio, Video and Images http://asecuritysite.com/comms Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding: Modulo-2 Data, Audio, Video and Images
More informationLecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn
Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat
More informationUNIT-II 1. Discuss the issues in the data link layer. Answer:
UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing
More informationEE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002
EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More information2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not
CS475 Networks Lecture 5 Chapter 2: Direct Link Networks Assignments Reading for Lecture 6: Sections 2.6 2.8 Homework 2: 2.1, 2.4, 2.6, 2.14, 2.18, 2.31, 2.35. Due Thursday, Sept. 15 2.4 Error Detection
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 5: The Link Layer I Errors and medium access Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You should
More informationChapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 5 Link Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can
More informationLecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1
Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework
More informationData Link Layer Overview
Data Link Layer Overview First of four classes on the data link layer 9/9/2009 CSC 257/457 - Fall 2009 1 Internet Architecture Bottom-up: physical: electromagnetic signals on the wire link: data transfer
More informationLink Layer: Retransmissions
Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability
More informationChapter 8 OSI Physical Layer
Chapter 8 OSI Physical Layer Upper OSI layer protocols prepare data from the human network for transmission to its destination. The Physical layer controls how data is placed on the communication media.
More informationET4254 Communications and Networking 1
Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission
More informationError Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.
Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced
More informationCSCD 330 Network Programming
CSCD 330 Network Programming Spring 2018 Lecture 17 Link Layer Hardware and Protocols Who is this? Reading: Chapter 5 in text Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved,
More informationChapter 10 Error Detection and Correction 10.1
Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationToday. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?
Embedded networks Characteristics Requirements Simple embedded LANs Bit banged SPI I2C LIN Ethernet Last Time CAN Bus Intro Low-level stuff Frame types Arbitration Filtering Higher-level protocols Today
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationMedium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra
Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationCSE 461: Framing, Error Detection and Correction
CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages
More informationData Link Layer. Srinidhi Varadarajan
Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request
More informationChapter 6 Digital Data Communications Techniques
Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit
More informationCommunication Fundamentals in Computer Networks
Lecture 7 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07
More information3. Data Link Layer 3-2
3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along
More informationCh. 7 Error Detection and Correction
Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us
More informationCS321: Computer Networks Error Detection and Correction
CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must
More informationCCNA 1 Capítulo 8 OSI Physical Layer. 2004, Cisco Systems, Inc. All rights reserved.
CCNA 1 Capítulo 8 OSI Physical Layer 1 Physical Layer Protocols & Services There are three basic forms of network media on which data is represented: Copper cable Fiber Wireless 2 Physical Layer Protocols
More informationData Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)
Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationTransmission Media :- It can be broadly classified into two types
Transmission Media :- It can be broadly classified into two types - Guided Transmission Media:- in this type of media, a physical path is established between source and destination. The signal or electrical
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer
More informationECSE 414 Fall 2014 Final Exam Solutions
ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:
More informationDigital Fundamentals
Digital Fundamentals Tenth Edition Floyd Chapter 1 Modified by Yuttapong Jiraraksopakun Floyd, Digital Fundamentals, 10 th 2008 Pearson Education ENE, KMUTT ed 2009 Analog Quantities Most natural quantities
More informationThe following CompTIA Network+ domain objectives and examples are covered in this module:
Module 1 / Topologies and Infrastructure Topologies and the OSI Model The following CompTIA Network+ domain objectives and examples are covered in this module: CompTIA Network+ Certification Domain Areas
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationLecture 5: Data Link Layer Basics
Lecture 5: Data Link Layer Basics Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Layer 2 PDU: Frame 2 1 Bit-oriented vs. Byte-oriented Layer 2 protocols
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You
More informationSRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of
More informationOverview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi
Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some
More information