Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Size: px
Start display at page:

Download "Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science"

Transcription

1 Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

2 Lectures Seminars Course Plan Reading of various Research Papers Presentations by the students on selected topics Quizzes and Reports Recommended Books Data Communication & Networks by Behrouz A. Forouzan Computer Networks by Andrew Tannenbaum Department of Computer Science 2

3 Grading Percentage Grade GP 90% and above A 4 80% to 89% B % to 79% C 3 60% to 69% D 2.5 Below 60% F 0 Department of Computer Science 3

4 Marks Distribution Description Weight age Quiz/Assignment 25% Midterm 25% Final 50% Department of Computer Science 4

5 Layer Task The Letter is written, put in envelop and dropped in mailbox. The Letter is picked up, removed from the envelop and read. The Letter is carried from mailbox to a post office. The Letter is carried from the post office to the mailbox. The Letter is delivered to a carrier by the post office. The Letter is delivered from the carrier to the post office Department of Computer Science 5

6 OSI layers Department of Computer Science 6

7 Internet Model H2 H3 H4 H5 D5 (Application Layer) D4 ( Transport Layer) D3 ( Network Layer) D2 ( Data Link Layer) Physical Layer Layered Architecture Department of Computer Science 7

8 Organization of layers TCP/IP protocol suite can be divided into three subgroups Network support layers Deals with the physical aspect of the moving data from one device to other device Electrical specification, physical connections, addressing timing and reliability User support layer Transport layer links the two subgroups Department of Computer Science 8

9 Physical Layer Functionality of layers Responsible for transmitting individual bits from one node to another. It defines the physical characteristics of the interface between the device and transmission media. Representation of bits into signals. Data rate such as duration of bits. Clock Synchronization of bits. Multiplexing Department of Computer Science 9

10 Data link Layer Functionality of layers Responsible for transmitting frames from one node to another. Framing: it divides stream of bits received from network layer into manageable data units called frames. Physical addressing Flow Control Error Control: it adds reliability to the physical layer by adding mechanism to detect and retransmit damaged or lost frames. Trailer Access control Department of Computer Science 10

11 Network Layer Functionality of layers Responsible for original source to final destination delivery of packet across multiple networks. It oversees the delivery of the packets between two systems on the same networks. Logical addressing. Routing Department of Computer Science 11

12 Transport Layer Functionality of layers Responsible for delivery of a message from process to process delivery. Also maintaining the logical connections between sender and receiver Port Addressing. Segmentation and reassembly. Connection control Flow control Error Control Department of Computer Science 12

13 Application Layer Functionality of layers Responsible for providing services to user. Mail services File Transfer and access. Remote login Accessing www Department of Computer Science 13

14 OSI Model Presentation Layer It is concerned with the syntax and semantics of the information exchange between two systems. Translation: sender dependent format to common format. Encryption Compression Department of Computer Science 14

15 Summary Node-to-Node Delivery (At MAC Layer) Host-to-Host Delivery (At Network Layer) Process-to-Process Delivery (At Transport Layer) Department of Computer Science 15

16 TCP/IP Suit Department of Computer Science 16

17 Comparison of Network models Department of Computer Science 17

18 Functioning of Layers Department of Computer Science 18

19 Data Link Layer Common responsibilities and functionalities provided by DATA Link Layer, Hop to Hop Delivery Also include framing, addressing, flow control, error control, and media access control. The data link layer divides the stream of bits received from the network layer into manageable data units called frames. The data link layer adds a header to the frame to define the addresses of the sender and receiver of the frame. Department of Computer Science 19

20 Flow Control Data Link Layer If the rate at which the data are absorbed by the receiver is less than the rate at which data are produced in the sender, the data link layer imposes a flow control mechanism to avoid overwhelming the receiver. Error Control It also adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged, duplicate, or lost frames. Department of Computer Science 20

21 Access Control DATA Link Layer When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time. Due to this functionality it is also called MAC layer. Department of Computer Science 21

22 Error Detection and Correction A system must guarantee that the data received should be identical to the data transmitted. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. Many factors can alter one or more bits of a message. Department of Computer Science 22

23 Error vs. Fault Error Detection and Correction Fault leads to error and error leads to failure. Types of errors Single bit error Single-bit errors are the least likely type of error in serial data transmission. Burst error The term burst error means that 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1. Department of Computer Science 23

24 Burst Error DATA Link Layer In figure below, was sent, but was received. Burst error does not occur in consecutive bits. The length of the burst is measured from the first corrupted bit to the last corrupted bit. Burst error of length 8 Department of Computer Science 24

25 Redundancy Data link layer The central concept in detecting or correcting errors is redundancy. This is done through by sending extra bits with the data to be sent. These redundant bits are added by the sender and removed by the receiver. It helps the receiver to detect and then correct the corrupted bits. Department of Computer Science 25

26 Coding Data link layer Redundancy is achieved through various coding schemes. The sender adds redundant bits through a process that creates a relationship between the redundant bits and the actual data bits. The receiver checks the relationships between the two sets of bits to detect or correct the errors. Block coding is used to do the stuff. Department of Computer Science 26

27 Data Link Layer Sender Encoder Message Receiver Message Decoder Accepted or discarded Generator Checker Message + redundancy Received DATA Unreliable transmission Department of Computer Science 27

28 DATA Link Layer For block coding we use modulo-2 arithmetic's. In this arithmetic, the modulus N is 2. Mean that use only 0 and 1. Operations in this arithmetic are very simple. The following shows how we can add or subtract 2 bits. In this arithmetic we use the XOR (exclusive OR) operation for both addition and subtraction. Adding: 0+0=0 0+1=1 1+0=1 1+1=0 Subtracting: 0-0=0 0-1=1 1-0 =1 1-1 =0 Department of Computer Science 28

29 BLOCK Coding In this coding the actual message is divided into blocks each of k-bits, called data words. Then add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords. E.g. The 4B/5B block coding Department of Computer Science 29

30 Block Coding How can errors be detected by using block coding? Two ways, 1. The receiver has (or can find) a list of valid codeword. 2. The original codeword has changed to an invalid one. Department of Computer Science 30

31 Example Let us assume that k = 2 and n = 3. Table below shows the list of datawords and codewords. A code for error detection Department of Computer Science 31

32 Solution Assume the sender encodes the dataword 01 as 011 and sends it to the receiver. Consider the following cases, The receiver receives 011. It is a valid codeword. The codeword is corrupted during transmission, and 111 is received. This is not valid codeword so it is discarded. The codeword is corrupted during transmission, and 000 is received. This is a valid codeword. The receiver incorrectly extracts the dataword 00. Two corrupted bits have made the error undetectable. Department of Computer Science 32

33 Error Correction Mechanism Structure of encoder and decoder in error correction, Department of Computer Science 33

34 Hamming Distance It is a central concept in coding for error control. The Hamming distance between two words (of the same size) is the number of differences between the corresponding bits. It is depicted as d(x, y). It can easily done by applying the XOR operation on the two words and count the number of 1 s in the result. The Hamming distance d(10101, 11110) is 3 because xor is (three 1 s). Department of Computer Science 34

35 Minimum Hamming Distance The minimum Hamming distance is the smallest Hamming distance between all possible pairs in a set of words. For example, d(00000, 01011) = 3 d(01011, 10101) = 4 d(00000, 10101) = 3 d(01011, 11110) = 3 d(00000, 11110) = 4 d(10101, 11110) = 3 The d min in this case is 3. Department of Computer Science 35

36 LINEAR BLOCK CODES Almost all block codes used today belong to a subset called linear block codes. Non linear block codes are not used widely b/c their structure makes the theoretical analysis and implementation difficult. A linear block code is a code in which the exclusive OR (addition modulo-2) of two valid codewords creates another valid codeword. Department of Computer Science 36

37 Some Linear Block Codes Following are some linear block codes are, Simple Parity-Check Code Most familiar error-detecting code is the simple parity-check code. A k-bit dataword is changed to an n-bit codeword where n = k + 1. The extra bit, called the parity bit, is selected to make the total number of 1 s in the codeword even. The minimum Hamming distance for this category is d min = 2 The code is a single-bit error-detecting code; it cannot correct any error. Department of Computer Science 37

38 Simple parity-check code C(5, 4) Simple parity-check code Department of Computer Science 38

39 Simple parity-check code Encoder and decoder for simple parity-check code. Department of Computer Science 39

40 Calculating parity mechanism This is normally done by adding the 4 bits of the dataword (modulo-2); the result is the parity bit. In other words, r 0 = a 3 + a 2 + a 1 + a 0 (modulo-2) If the number of 1 s is even, the result is 0; if the number of 1 s is odd, the result is 1. At the reciever end, the addition is done over all 5 bits. The result which is called the syndrome, is just 1 bit. s o = b 3 + b 2 +b 1 + b 0 + q 0 (modulo-2) If s o is equal to 0 then no error, if 1 then the dataword is not extracted and hence the dataword is not created. Department of Computer Science 40

41 Hamming Codes It is a category of error-correcting codes. These codes were originally designed with d min = 3, which means that they can detect up to two errors or correct one single error. First let us find the relationship between n and k in a Hamming code. We need to choose an integer m >= 3. The values of n and k are then calculated from m as n = 2 m - 1 and k = n - m. The number of check bits r = m. Department of Computer Science 41

42 Hamming Code Mechanism Department of Computer Science 42

43 Hamming Code Mechanism A copy of a 4-bit dataword is fed into the generator that creates three parity checks r 0, r 1, and r 2, r 0 = a 2 + a 1 + a 0 r 1 = a 3 + a 2 + a 1 r 2 = a 1 + a 0 + a 3 modulo-2 modulo-2 modulo-2 Each of the parity-check bits handles 3 out of the 4 bits of the dataword. The total number of 1 s in each 4-bit combination (3 dataword bits and 1 parity bit) must be even. Above three equations are not unique. A combination of two equation cannot create the third one. Department of Computer Science 43

44 Hamming code C(7, 4) Department of Computer Science 44

45 Hamming Code Mechanism The checker in the decoder creates a 3-bit syndrome (S 2 S 1 S O ) in which each bit is the parity check for 4 out of the 7 bits in the received codeword. s 0 = b 2 + b 1 + b 0 +q 0 modulo-2 s 1 = b 3 + b 2 + b 1 +q 1 modulo-2 s 2 = b 1 + b 0 + b 3 +q 2 modulo-2 The equations used by the checker are the same as those used by the generator with the parity-check bits added to the right-hand side of the equation. Department of Computer Science 45

46 Hamming Code Mechanism The 3-bit syndrome creates eight different bit patterns (000 to 111) that can represent eight different conditions. Syndrome Error None q 0 q 1 b 2 q 2 b 0 b 3 b 1 Generator is not concerned with the four cases shaded b/c there is either no error or an error in the parity bit. In the other four cases, 1 of the bits must be flipped (changed from 0 to 1 or 1 to 0) to find the correct dataword. Department of Computer Science 46

47 Example Let us trace the path of three datawords from the sender to the destination: Dataword Codeword Received Syndrome Result: No error Result: b 2 is in error, after flipping b 2 we get Result: b 0 is in error, after flipping b 0 we get 0000, the wrong dataword. Note: This code cannot correct two errors. Department of Computer Science 47

48 Burst Error detection and correction The key is to split a burst error between several codewords. Normally we send a packet or a frame of data. Make the hamming code of size N codeword out of our frame to be sent. Instead of sending one frame, arrange codeword in table and send the bits in the table a column at a time. Bits are sent column by column. (from the left). Department of Computer Science 48

49 Burst error correction using H. Code Department of Computer Science 49

50 Cyclic codes are special linear block. Cyclic Codes In a cyclic code, if a codeword is cyclically shifted (rotated), the result is another codeword. For example if is a codeword, then is also a codeword after left shifting the dataword. Department of Computer Science 50

51 A CRC is an error-detecting code. Cyclic Redundancy Check Its computation resembles a polynomial long division operation in which the quotient is discarded and the remainder becomes the result. The coefficients are calculated according to the carry-less arithmetic of a finite field. The length of the remainder is always less than the length of the divisor. Department of Computer Science 51

52 To compute an n-bit binary CRC Computation of CRC Line the bits representing the input in a row. Put the divisor underneath the left-hand end of the row. Here is the first calculation for computing a 3-bit CRC, <--- input 1011 <--- divisor (4 bits) <--- Result Department of Computer Science 52

53 Direct method calculation, CRC If the input bit above the leftmost divisor bit is 0, do nothing and move the divisor to the right by one bit. If the input bit above the leftmost divisor bit is 1, the divisor is XORed into the input. The divisor is then shifted one bit to the right, and the process is repeated until the divisor reaches the right-hand end of the input row. Complete calculation is on the next slide. Department of Computer Science 53

54 CRC Department of Computer Science 54

55 2 nd Method of Calculating CRC In the encoder, the dataword has k bits(4 here). The codeword has n bits(7 here). The size of the dataword is augmented by adding n k (3 here). The n-bit result is fed into the generator. The generator uses a divisor of size n - k + 1(4 here), predefined and agreed upon i.e The generator divides the augmented dataword by the divisor (modulo-2 division). The quotient of the division is discarded; the remainder (r 2 r 1 r o ) is appended to the dataword to create the codeword. Department of Computer Science 55

56 2 nd Method of Calculating CRC CRC encoder and decoder Department of Computer Science 56

57 At decoder end, Receives the corrupted codeword. CRC All n bits are fed into checker which is replica of the generator. Remainder produced by the checker is a syndrome of n-k bits, which is fed into decision logic analyzer. If all bits of the syndrome is zero then no error take the 4 leftmost bits of the codeword are accepted, else discarded. Department of Computer Science 57

58 At Encoder side Department of Computer Science 58

59 At Decoder Side Department of Computer Science 59

60 At decoder end If the code word changes during transmission, then, Department of Computer Science 60

61 Simulation of division in CRC encoder Department of Computer Science 61

62 Polynomial representation A pattern of Os and 1 s can be represented as a polynomial with coefficients of 0 and 1. The power of each term shows the position of the bit; the coefficient shows the value of the bit. Department of Computer Science 62

63 Polynomial representation X 6 + x + 1 We have seven bit number, the degree of the polynomial is 6 one less then the number of bits in the pattern. Department of Computer Science 63

64 Adding and subtracting Polynomial operation Adding or subtracting is done by combining terms and deleting pairs of identical terms. For example adding x 5 + x 4 + x 2 and x 6 + x 4 + x 2 gives just x 6 + x 5. The terms x 4 and x 2 are deleted. If we add three polynomial of the same degree then two of them deleted, one is kept left. Multiplying or Dividing Terms In multiplications, the powers are added. For division subtract the power of the second term from the power of first. Department of Computer Science 64

65 Polynomial operation Multiplying Two Polynomials Each term of the first polynomial must be multiplied by all terms of the second. The result, of course, is then simplified, and pairs of equal terms are deleted. Shifting Shifting number of bits to the right or left of the given pattern. Shifting left 3 bits: becomes x 4 +x+ 1 becomes x 7 +x 4 +x 3 Shifting right 3 bits: becomes 10 x 4 + x + 1 becomes x Department of Computer Science 65

66 CRC division using polynomials Department of Computer Science 66

67 CHECKSUM The checksum is used in the Internet by several protocols. The checksum is based on the concept of redundancy. Basic Idea Suppose our data is a list of five 4-bit numbers. send the sum of the numbers along with the data. If the set of numbers is (7, 11, 12, 0, 6), we send (7, 11, 12, 0, 6, 36). The receiver adds the five numbers and compares the result with the sum. If the result is same then no error else data is not accepted. Department of Computer Science 67

68 Checksum Another heuristic is the negative (complement) of the sum called the checksum. We send (7, 11, 12, 0, 6, -36). Receiver add all the numbers, if result is 0 then no error otherwise an error. Department of Computer Science 68

69 One's Complement The previous example has one major drawback. The data is of 4 bit word (0 to 15) except checksum. One solution is to use the 1 s complement. Using unsigned numbers between 0 and 2 n - 1 using only n bits. If the number has more than n bits, then wrapping the bits. For example, 21 in binary is We can wrap the leftmost bit and add it to the four rightmost bits. We have ( ) = 0110 or 6. Department of Computer Science 69

70 Problem Checksum How can we represent the number -6 in one's complement arithmetic using only four bits? Department of Computer Science 70

71 Checksum using 1 s complement Let the data to be sent is (7, 11, 12, 0, 6) Figure below show the process at the sender and receiver. Department of Computer Science 71

72 Sender site: Checksum computation The message is divided into 16-bit words. The value of the checksum word is set to 0. All words including the checksum are added using one's complement addition. The sum is complemented and becomes the checksum. The checksum is sent with the data. Department of Computer Science 72

73 Receiver Site: Checksum computation The message (including checksum) is divided into 16-bit words. All words are added using one's complement addition. The sum is complemented and becomes the new checksum. If the value of checksum is 0, the message is accepted; otherwise, it is rejected. Department of Computer Science 73

74 Checksum computation Let us calculate the checksum for a text of 8 characters ("Forouzan"). The text needs to be divided into 2-byte (16-bit) words. We use ASCII to change each byte to a 2-digit hexadecimal number. F is represented as 0x46 and o is represented as 0x6F. Department of Computer Science 74

75 Solution Department of Computer Science 75

76 ASCII Chart Department of Computer Science 76

77 Department of Computer Science 77

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

UNIT-II 1. Discuss the issues in the data link layer. Answer:

UNIT-II 1. Discuss the issues in the data link layer. Answer: UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing

More information

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. TYPES OF ERRORS There are two types of errors, 1. Single Bit Error The term single-bit error

More information

CS321: Computer Networks Error Detection and Correction

CS321: Computer Networks Error Detection and Correction CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

PART III. Data Link Layer MGH T MGH C I 204

PART III. Data Link Layer MGH T MGH C I 204 PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control

More information

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd.

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd. Parity Even parity: Odd parity: Add a bit to make the number of ones (1s) transmitted even. Add a bit to make the number of ones (1s) transmitted odd. Example and ASCII A is coded 100 0001 Parity ASCII

More information

CS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos

CS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos CS254 Network Technologies Lecture 2: Network Models & Error Detection and Correction Dr Nikos Antonopoulos Department of Computing University of Surrey Autumn 2006 2.1 Layered Tasks Sender, Receiver,

More information

Error Correction and Detection using Cyclic Redundancy Check

Error Correction and Detection using Cyclic Redundancy Check Error Correction and Detection using Cyclic Redundancy Check Dr. T. Logeswari Associate Professor, Dept of Computer Science, New Horizon College, Banglore, Karnataka, India ABSTRACT: In this paper Cyclic

More information

Data Link Layer. Srinidhi Varadarajan

Data Link Layer. Srinidhi Varadarajan Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request

More information

(Refer Slide Time: 2:20)

(Refer Slide Time: 2:20) Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-15 Error Detection and Correction Hello viewers welcome to today s lecture

More information

MYcsvtu Notes DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes

MYcsvtu Notes DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes DATA REPRESENTATION Data Types Complements Fixed Point Representations Floating Point Representations Other Binary Codes Error Detection Codes Hamming Codes 1. DATA REPRESENTATION Information that a Computer

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

Lecture 2 Error Detection & Correction. Types of Errors Detection Correction

Lecture 2 Error Detection & Correction. Types of Errors Detection Correction Lecture 2 Error Detection & Correction Types of Errors Detection Correction Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted

More information

LECTURE #34. Data Communication (CS601)

LECTURE #34. Data Communication (CS601) LECTURE #34 Error Detection And Correction Methods Longitudinal Red Check(LRC) o In LRC, a block of bits is organized in a table (rows and columns) o For example instead of sending 32 bits, we organize

More information

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16 Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error

More information

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due Thursday!

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due Thursday! CSE 123: Computer Networks Alex C. Snoeren HW 1 due Thursday! Error handling through redundancy Adding extra bits to the frame Hamming Distance When we can detect When we can correct Checksum Cyclic Remainder

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

Lecture / The Data Link Layer: Framing and Error Detection

Lecture / The Data Link Layer: Framing and Error Detection Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start

More information

Chapter 5 Data-Link Layer: Wired Networks

Chapter 5 Data-Link Layer: Wired Networks Sungkyunkwan University Chapter 5 Data-Link Layer: Wired Networks Prepared by Syed M. Raza and H. Choo 2018-Fall Computer Networks Copyright 2000-2018 Networking Laboratory Chapter 5 Outline 5.1 Introduction

More information

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images Prof Bill Buchanan

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images  Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding Data, Audio, Video and Images http://asecuritysite.com/comms Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding: Modulo-2 Data, Audio, Video and Images

More information

CSE 123: Computer Networks

CSE 123: Computer Networks Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1, CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet

More information

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not CS475 Networks Lecture 5 Chapter 2: Direct Link Networks Assignments Reading for Lecture 6: Sections 2.6 2.8 Homework 2: 2.1, 2.4, 2.6, 2.14, 2.18, 2.31, 2.35. Due Thursday, Sept. 15 2.4 Error Detection

More information

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check. Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced

More information

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames. Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept

More information

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends

More information

Introduction to Computer Networks. 03 Data Link Layer Introduction

Introduction to Computer Networks. 03 Data Link Layer Introduction Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple

More information

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst EITF25 Internet Techniques and Applications L3: Data Link layer Stefan Höst Communication on physical layer To transmit on the physical medium use signals At each computer it can be seen as transmitting

More information

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes

More information

COMPUTER NETWORKS UNIT-3

COMPUTER NETWORKS UNIT-3 COMPUTER NETWORKS UNIT-3 Syllabus: The Data Link Layer - Data Link Layer Design Issues, Services Provided to the Network Layer Framing Error Control Flow Control, Error Detection and Correction Error-Correcting

More information

DATA LINK LAYER UNIT 7.

DATA LINK LAYER UNIT 7. DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission

More information

ES623 Networked Embedded Systems

ES623 Networked Embedded Systems ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Additional Interesting Codes m-out-of-n codes - each binary code word has m ones in a length n non-systematic codeword - used for unidirectional errors

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Last time How protocols are organized & why Network layer Data-link

More information

UNIT I FUNDAMENTALS & LINK LAYER

UNIT I FUNDAMENTALS & LINK LAYER Building a network: UNIT I FUNDAMENTALS & LINK LAYER A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing

More information

CHAPTER 2 Data Representation in Computer Systems

CHAPTER 2 Data Representation in Computer Systems CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting

More information

CHAPTER 2 Data Representation in Computer Systems

CHAPTER 2 Data Representation in Computer Systems CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting

More information

FAULT TOLERANT SYSTEMS

FAULT TOLERANT SYSTEMS FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded

More information

Point-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1

Point-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1 Point-to-Point Links Outline Encoding Framing Error Detection Sliding Window Algorithm Fall 2004 CS 691 1 Encoding Signals propagate over a physical medium modulate electromagnetic waves e.g., vary voltage

More information

Where we are in the Course

Where we are in the Course Link Layer Where we are in the Course Moving on up to the Link Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Scope of the Link Layer Concerns how to transfer messages

More information

Link Layer: Error detection and correction

Link Layer: Error detection and correction Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

More information

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of

More information

Inst: Chris Davison

Inst: Chris Davison ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of

More information

Fault-Tolerant Computing

Fault-Tolerant Computing Fault-Tolerant Computing Dealing with Mid-Level Impairments Oct. 2007 Error Detection Slide 1 About This Presentation This presentation has been prepared for the graduate course ECE 257A (Fault-Tolerant

More information

Error Detection and Correction

Error Detection and Correction CHAPTER 10 Error Detection and Correction Networks must be able to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee that the data received

More information

Data and Computer Communications. Protocols and Architecture

Data and Computer Communications. Protocols and Architecture Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or

More information

Digital Fundamentals

Digital Fundamentals Digital Fundamentals Tenth Edition Floyd Chapter 2 2009 Pearson Education, Upper 2008 Pearson Saddle River, Education NJ 07458. All Rights Reserved Decimal Numbers The position of each digit in a weighted

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview First of four classes on the data link layer Internet Architecture Bottom up: Physical: electromagnetic signals on the wire Link: data transfer between neighboring network elements

More information

Some portions courtesy Robin Kravets and Steve Lumetta

Some portions courtesy Robin Kravets and Steve Lumetta CSE 123 Computer Networks Fall 2009 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Administrative updates I m Im out all next week no lectures, but You

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Implementing CRCCs. Introduction. in Altera Devices

Implementing CRCCs. Introduction. in Altera Devices Implementing CRCCs in Altera Devices July 1995, ver. 1 Application Note 49 Introduction Redundant encoding is a method of error detection that spreads the information across more bits than the original

More information

Networking Link Layer

Networking Link Layer Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding

More information

Packet/Frame, Error Detection How to send data efficiently & reliably?

Packet/Frame, Error Detection How to send data efficiently & reliably? Packet/Frame, Error Detection How to send data efficiently & reliably? Packet and Packet Communication - Shared Network Resource, Fairness, Reliability Frame - Byte Oriented Frame and Bit Oriented Frame

More information

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) Data Link Control Contents Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) 2 Flow Control Flow control is a technique for assuring that a transmitting entity

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview First of four classes on the data link layer Internet Architecture Bottom up: Physical: electromagnetic signals on the wire Link: data transfer between neighboring network elements

More information

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination Data Link Protocols Data Link Services Connection-less services Functions of a Data Link Protocol Framing PDUs ing Destination Error Detection / Error Recovery Link Management Ethernet (covered elsewhere)

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview First of four classes on the data link layer 9/9/2009 CSC 257/457 - Fall 2009 1 Internet Architecture Bottom-up: physical: electromagnetic signals on the wire link: data transfer

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4 CompSci 356: Computer Network Architectures Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4 Xiaowei Yang xwy@cs.duke.edu Overview Review: link/network performance metrics

More information

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview : 9/7/2007 CSC 257/457 - Fall 2007 1 Internet Architecture Bottom-up: physical: electromagnetic signals on the wire link: data transfer between neighboring network elements network:

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

CSE123A discussion session

CSE123A discussion session CSE123A discussion session 2007/02/02 Ryo Sugihara Review Data Link layer (1): Overview Sublayers End-to-end argument Framing sublayer How to delimit frame» Flags and bit stuffing Topics Data Link Layer

More information

CSEP 561 Error detection & correction. David Wetherall

CSEP 561 Error detection & correction. David Wetherall CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002 EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

Chapter 2. Data Representation in Computer Systems

Chapter 2. Data Representation in Computer Systems Chapter 2 Data Representation in Computer Systems Chapter 2 Objectives Understand the fundamentals of numerical data representation and manipulation in digital computers. Master the skill of converting

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

ENEE x Digital Logic Design. Lecture 3

ENEE x Digital Logic Design. Lecture 3 ENEE244-x Digital Logic Design Lecture 3 Announcements Homework due today. Homework 2 will be posted by tonight, due Monday, 9/2. First recitation quiz will be tomorrow on the material from Lectures and

More information

CSE123A discussion session

CSE123A discussion session CSE23A discussion session 27/2/9 Ryo Sugihara Review Data Link Layer (3): Error detection sublayer CRC Polynomial representation Implementation using LFSR Data Link Layer (4): Error recovery sublayer Protocol

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1 Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data

More information

UNIT 7A Data Representation: Numbers and Text. Digital Data

UNIT 7A Data Representation: Numbers and Text. Digital Data UNIT 7A Data Representation: Numbers and Text 1 Digital Data 10010101011110101010110101001110 What does this binary sequence represent? It could be: an integer a floating point number text encoded with

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

CSCI-1680 Link Layer Reliability John Jannotti

CSCI-1680 Link Layer Reliability John Jannotti CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today

More information

CHW 261: Logic Design

CHW 261: Logic Design CHW 261: Logic Design Instructors: Prof. Hala Zayed Dr. Ahmed Shalaby http://www.bu.edu.eg/staff/halazayed14 http://bu.edu.eg/staff/ahmedshalaby14# Slide 1 Slide 2 Slide 3 Digital Fundamentals CHAPTER

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

Le L c e t c ur u e e 2 To T p o i p c i s c t o o b e b e co c v o e v r e ed e Variables Operators

Le L c e t c ur u e e 2 To T p o i p c i s c t o o b e b e co c v o e v r e ed e Variables Operators Course Name: Advanced Java Lecture 2 Topics to be covered Variables Operators Variables -Introduction A variables can be considered as a name given to the location in memory where values are stored. One

More information

Network Model: Each layer has a specific function.

Network Model: Each layer has a specific function. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.

More information

EE 8351 Digital Logic Circuits Ms. J.Jayaudhaya, ASP/EEE

EE 8351 Digital Logic Circuits Ms. J.Jayaudhaya, ASP/EEE EE 8351 Digital Logic Circuits Ms. J.Jayaudhaya, ASP/EEE Numbering Systems Types Of Numbers Natural Numbers The number 0 and any number obtained by repeatedly adding a count of 1 to 0 Negative Numbers

More information

Lecture 2: Number Systems

Lecture 2: Number Systems Lecture 2: Number Systems Syed M. Mahmud, Ph.D ECE Department Wayne State University Original Source: Prof. Russell Tessier of University of Massachusetts Aby George of Wayne State University Contents

More information

Digital Fundamentals

Digital Fundamentals Digital Fundamentals Tenth Edition Floyd Chapter 2 2009 Pearson Education, Upper 2008 Pearson Saddle River, Education NJ 07458. All Rights Reserved Quiz 2 Agenda Lecture: Chapter 2 (2-7 through 2-11):

More information

Network Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering

Network Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering Network Models Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering Objective At the end of this section students will be able to Understand the architecture of the OSI model Understand the

More information

ECE 333: Introduction to Communication Networks Fall Lecture 6: Data Link Layer II

ECE 333: Introduction to Communication Networks Fall Lecture 6: Data Link Layer II ECE 333: Introduction to Communication Networks Fall 00 Lecture 6: Data Link Layer II Error Correction/Detection 1 Notes In Lectures 3 and 4, we studied various impairments that can occur at the physical

More information

LECTURE # 8. Bad Technology Flow control, error control, addressing is multiple Session and Presentation(EMPTY), Network and DL(Full)

LECTURE # 8. Bad Technology Flow control, error control, addressing is multiple Session and Presentation(EMPTY), Network and DL(Full) Critique of OSI Model LECTURE # 8 Reasoning for OSI not getting Widespread Bad Timing(slide) (Apocalypse of Two Elephants) David Clarke of MIT If standards are written too early: subject is badly understood

More information