Digital Communication Networks

Size: px
Start display at page:

Download "Digital Communication Networks"

Transcription

1 Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 24-28, 2006 Professor Muriel Medard, MIT Professor, MIT Slide 1

2 Digital Communication Networks Introduction Slide 2

3 Course syllabus Monday AM: Introduction to layering, the physical layer PM: The data link layer Tuesday AM: Delay models and queueing PM: Higher layer protocols: TCP/IP, ATM Wednesday AM: Routing PM: More routing, flow control Thursday AM: Multiple access PM: LANs, MANs, SANs, and switching Friday AM: Wireless Networks PM: Optical Networks Slide 3

4 Logistics Morning lectures: 9:00am - 12:00pm (break around 10:15) Lunch: on your own, 12:00-1:30pm Afternoon lecture: 1:30-4:30 (break around 2:45) Friday: start at 9:00 and end at 3:30pm (lunch: 11:45-12:30) Social: Dinner on Thursday evening Slide 4

5 Reference textbooks Computer Networks, by Peterson and Davie Most current on the internet Data Networks, by Bertsekas and Gallager Strong on probabilistic modeling and analysis Network Optimization: Continuous and Discrete Models, by Dimitri P. Bertsekas Network algorithms and routing, network flows, optimization theory Introduction to Probability, by Dimitri P. Bertsekas and John N. Tsitsiklis Slide 5

6 Data Networks Fundamental aspects of network Design and Analysis: Architecture Layering Topology design Protocols Pt.-to-Pt. Multiple access End-to-end Algorithms Error recovery Routing Flow Control Analysis tools Probabilistic modeling Queueing Theory Slide 6

7 Network Applications Resource sharing Computing Mainframe computer (old days) Today, computers cheaper than comm (except LANS) Printers, peripherals Information DB access and updates E.g., Financial, Airline reservations, etc. Services , FTP, Telnet, Web access Video conferencing DB access Client/server applications Slide 7

8 Network coverage areas Wide Area Networks (WANS) Span large areas (countries, continents, world) Use leased phone lines (expensive!) 1980 s: 10 Kbps, 2000 s: 2.5 Gbps User access rates: 56Kbps 155 Mbps typical Shared comm links: switches and routers E.g, IBM SNA, X.25 networks, Internet Local Area Networks (LANS) Span office or building Single hop (shared channel) (cheap!) User rates: 10 Mbps 1 Gbps E.g., Ethernet, Token rings, Apple-talk Metro Area networks (MANS) Storage area networks Slide 8

9 Network services Synchronous Session appears as a continuous stream of traffic (e.g, voice) Usually requires fixed and limited delays Asynchronous Session appears as a sequence of messages Typically bursty E.g., Interactive sessions, file transfers, Connection oriented services Long sustained session Orderly and timely delivery of packets E.g., Telnet, FTP Connectionless services One time transaction (e.g., ) QoS Slide 9

10 Switching Techniques Circuit Switching Dedicated resources Packet Switching Shared resources Virtual Circuits Datagrams Slide 10

11 Circuit Switching Each session is allocated a fixed fraction of the capacity on each link along its path Dedicated resources Fixed path If capacity is used, calls are blocked E.g., telephone network Advantages of circuit switching Fixed delays Guaranteed continuous delivery Disadvantages Circuits are not used when session is idle Inefficient for bursty traffic Circuit switching usually done using a fixed rate stream (e.g., 64 Kbps) Difficult to support variable data rates Slide 11

12 Problems with circuit switching Many data sessions are low duty factor (bursty), (message transmission time)/(message interarrival time) << 1 Same as: (message arrival rate) * (message transmission time) << 1 The rate allocated to the session must be large enough to meet the delay requirement. This allocated capacity is idle when the session has nothing to send If communication is expensive, then circuit switching is uneconomic to meet the delay requirements of bursty traffic Also, circuit switching requires a call set-up during which resources are not utilized. If messages are much shorter than the call set-up time then circuit switching is not economical (or even practical) More of a problem in high-speed networks Slide 12

13 Circuit Switching Example L = message lengths λ = arrival rate of messages R = channel rate in bits per second X = message transmission delay = L/R R must be large enough to keep X small Bursty traffic => λx << 1 => low utilization Example L = 1000 bytes (8000 bits) λ = 1 message per second X < 0.1 seconds (delay requirement) => R > 8000/0.1 = 80,000 bps Utilization = 8000/80000 = 10% With packet switching channel can be shared among many sessions to achieve higher utilization Slide 13

14 Packet Switched Networks Messages broken into Packets that are routed To their destination PS PS PS PS Packet Network PS PS PS Buffer Packet Switch Slide 14

15 Packet Switching Datagram packet switching Route chosen on packet-by-packet basis Different packets may follow different routes Packets may arrive out of order at the destination E.g., IP (The Internet Protocol) Virtual Circuit packet switching All packets associated with a session follow the same path Route is chosen at start of session Packets are labeled with a VC# designating the route The VC number must be unique on a given link but can change from link to link Imagine having to set up connections between 1000 nodes in a mesh Unique VC numbers imply 1 Million VC numbers that must be represented and stored at each node E.g., ATM (Asynchronous transfer mode) Slide 15

16 Virtual Circuits Packet Switching For datagrams, addressing information must uniquely distinguish each network node and session Need unique source and destination addresses For virtual circuits, only the virtual circuits on a link need be distinguished by addressing Global address needed to set-up virtual circuit Once established, local virtual circuit numbers can then be used to represent the virtual circuits on a given link: VC number changes from link to link Merits of virtual circuits Save on route computation Need only be done once at start of session Save on header size Facilitate QoS provisioning More complex Less flexible 3 6 VC13 VC7 VC3 5 8 Node 5 table VC4 VC3 VC7 (3,5) VC13 -> (5,8) VC3 (3,5) VC7 -> (5,8) VC4 (6,5) VC3 -> (5,8) VC7 2 9 Slide 16

17 Circuit vs packet switching Advantages of packet switching Efficient for bursty data Easy to provide bandwidth on demand with variable rates Disadvantages of packet switching Variable delays Difficult to provide QoS assurances (Best-effort service) Packets can arrive out-of-order Switching Technique Network service Circuit switching => Synchronous (e.g., voice) Packet switching => Asynchronous (e.g., Data) Virtual circuits => Connection oriented Datagram => Connectionless Slide 17

18 Circuit vs Packet Switching Can circuit switched network be used to support data traffic? Can packet switched network be used for connection oriented traffic (e.g., voice)? Need for Quality of service (QoS) mechanisms in packet networks Guaranteed bandwidth Guaranteed delays Guaranteed delay variations Packet loss rate Etc... Slide 18

19 7 Layer OSI Reference Model Application Application Virtual network service Presentation Presentation Virtual session Session Session Virtual link for end to end messages Transport Transport Virtual link for end to end packets Network Network Network Network Data link Control Virtual link for reliable packets DLC DLC DLC DLC Data link Control physical interface Virtual bit pipe phys. int. phys. int. phys. int. phys. int. physical interface Physical link Slide 19 External Site subnet node subnet node External site

20 Layers Presentation layer Provides character code conversion, data encryption, data compression, etc. Session layer Obtains virtual end to end message service from transport layer Provides directory assistance, access rights, billing functions, etc. Standardization has not proceeded well here, since transport to application are all in the operating system and don't really need standard interfaces Focus: Transport layer and lower Slide 20

21 Transport Layer The network layer provides a virtual end to end packet pipe to the transport layer. The transport layer provides a virtual end to end message service to the higher layers. Slide 21 The functions of the transport layer are: 1) Break messages into packets and reassemble packets of size suitable to network layer 2) Multiplex sessions with same source/destination nodes 3) Resequence packets at destination 4) recover from residual errors and failures 5) Provide end-to-end flow control

22 Network layer The network layer module accepts incoming packets from the transport layer and transit packets from the DLC layer It routes each packet to the proper outgoing DLC or (at the destination) to the transport layer Typically, the network layer adds its own header to the packets received from the transport layer. This header provides the information needed for routing (e.g., destination address) Transport layer Each node contains one network Layer module plus one Link layer module per link Network layer DLC layer link 1 DLC layer link 2 DLC layer link 3 Slide 22

23 Link Layer Responsible for error-free transmission of packets across a single link Framing Determine the start and end of packets Error detection Determine which packets contain transmission errors Error correction Retransmission schemes (Automatic Repeat Request (ARQ)) Slide 23

24 Physical Layer Responsible for transmission of bits over a link Propagation delays Time it takes the signal to travel from the source to the destination Signal travel approximately at the speed of light, C = 3x10 8 meters/second E.g., LEO satellite: d = 1000 km => 3.3 ms prop. delay GEO satellite: d = 40,000 km => 1/8 sec prop. delay Ethernet cable: d = 1 km => 3 µs prop. delay Transmission errors Signals experience power loss due to attenuation Transmission is impaired by noise Simple channel model: Binary Symmetric Channel P = bit error probability Independent from bit to bit In reality channel errors are often bursty 0 1 P 1-P 1-P P 0 1 Slide 24

25 Internet Sub-layer A sublayer between the transport and network layers is required when various incompatible networks are joined together This sublayer is used at gateways between the different networks It looks like a transport layer to the networks being joined It is responsible for routing and flow control between networks, so looks like a network layer to the end-to-end transport layer In the internet this function is accomplished using the Internet Protocol (IP) Often IP is also used as the network layer protocol, hence only one protocol is needed Slide 25

26 Internetworking with TCP/IP FTP client FTP Protocol FTP server TCP TCP Protocol TCP ROUTER IP IP Protocol IP Protocol IP IP Ethernet driver Ethernet Protocol Ethernet driver token ring driver token ring Protocol token ring driver Ethernet token ring Slide 26

27 Encapsulation user data Appl header user data Application IP header TCP header TCP header IP datagram application data TCP segment application data Ethernet IP TCP Ethernet header header header application data trailer Ethernet frame 46 to 1500 bytes TCP IP Ethernet driver Ethernet Slide 27

28 Physical Layer and Coding Muriel Médard EECS LIDS MIT

29 Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media: basic models Nyquist sampling theorem How we use the channels: modulation Modeling the net effect of channels: transition probabilities and errors Making up for channel errors: principles of coding theoretical limits MIT

30 Signals Channel has a physical signal traversing a physical medium Electromagnetic signal Polarization of the wave TM TE Propagation of the wave MIT

31 Signals What do we mean by frequency? We can express a signal by a superposition of sinusoids, each of them with its own frequency A continuous signal is bandlimited to a bandwidth W at carrier frequency f 0 if it can be expressed in terms of sinusoids in a range of frequencies of width W around a frequency f 0 If we multiply the signal by a frequency shift, then we operate around 0, the baseband representation passband baseband f 0 -W/2 f 0 f 0 +W/2 -W/2 0 W/2 MIT

32 Nyquist sampling theorem We can wholly reconstruct a signal from its periodic samples as long as those samples are within 1/W of each other Continuous signal x(t), discrete time signal is x[n] = x(n T) where T = 1/W x(t) 0 T 2T 3T 4T 5T 6T t MIT

33 Modulation: creating signals How we generate signals, by varying amplitude, phase, frequency On-off keyed (OOK): send 1, 0, a special case of amplitude modulation Frequency-shift keyed (FSK), change frequencies: Phase-shift key (PSK): 2 PSK 4 PSK MIT

34 Modulation Pulse position modulation (PPM) Combining phase and amplitude, for instance: PAM 5x5 symbol code for 100BASE-T2 PHY MIT

35 Channels Canonical channel model: signal goes into channel, there is a non-additive effect and addition of noise N[n] Tx X[n] G G(X[n]) Y[n] Rx Very commonly, G is a multiplicative effect: Y[n] = g X[n] + N[n] Y[n] = g -1 X[n-1] + g 0 X[n] + N[n] INTERSYMBOL-INTERFERENCE (ISI) MIT

36 Effect of the channel If we put in a certain string of input signals X[1], X[2],, then we have a certain probability of having a certain output string Y[1], Y[2], The net effect is what is the probability of having a certain output when a given input is given MIT

37 Channel model The channel is described by an input alphabet, an output alphabet, a set of probabilities on the input alphabet and a set of channel transitions, for a memoryless channel (on every bit the channel behaves independently of other times): Tx Rx k m Channel with input alphabet of size k+1 and output alphabet of size m+1 p(y x) is transition probability, probability of getting output y for input x MIT

38 How do we determine the probabilities? We want to get to p(x y) Use Bayes s rule: p(x y) = p( x, y) / p(y) Also p(x, y) = p(y x) p(x) p(y) = p(y x i ) p(x i )! i For the case where all the inputs have the same probability, then p(x y) = 1/n p(y x) / p (y x i )! i How can we try to make up for the effect of the channel? MIT

39 When do we use codes Two different types of codes: source codes: compression channel codes: error-correction Source-channel separation theorem says the two can be done independently for a large family of channels stream Source encoder s Channel encoder x y Channel decoder Source decoder MIT Modulator, channel, receiver, etc...

40 What is a reasonable way to construct codes? Suppose that errors occur independently from symbol to symbol: a reasonable way to code is to make codewords as dissimilar as possible Number of bits in red: Hamming distance x 1 = x 2 = If we received y = , we would map to the first codeword - we ll make this more precise later MIT

41 What do we mean by constructing a code? Block code: map a block of bits to another, generally larger, block of bits (n, k) linear block code encodes k-bit message into n-bit code vector, rate of code is R = n/k In general, code maps a message from set M= 2 k onto a codeword of length n Every codeword is one-to-one correspondence with a message An error occurs in decoding if we map a received codeword to the wrong message or to more than one message MIT

42 What do we mean by decoding? We choose most likely input to have yielded observed output - Maximum Likelihood Decoding Given that we observe the output vector y, the probability that x 1 was transmitted is p(x 1 y) and the probability that x 2 was transmitted is p(x 2 y) (let s look at 2 codewords) Then we pick x 1 when p(x 1 y) / p(x 2 y) > 1 or equivalently when ln(p(x 1 y) ) - ln(p(x 1 y) ) > 0 in terms of log likelihoods MIT

43 Decoding example Consider the binary symmetric channel (BSC) 0 Tx 1-p Rx p 0 1 p 1 1-p The probabilities are: p(x 1 y) = (1-p) 13 p 13 no errors and 1 error p(x 1 y) = (1-p) 11 p 3 11 no errors and 3 errors The BER is p MIT

44 Hamming distance and code capability Minimum Hamming Distance d min of a code is the minimum Hamming Distance between any two codewords A code can detect up to t errors iff d min t + 1 A code can correct up to t errors iff d min 2t + 1 A code can correct up to t errors and detect up to t > t errors iff d min 2t + 1 and d min t + t + 1 How does d min relate to r = n-k, the number of redundant bits? Singleton bound: r + 1 d min Example take strings of k bits and add a parity check code: r is 1 and d min is 2 These are bounds, most codes don t achieve these bounds MIT!!!!!

45 Linear codes: how do we build them? Code word x = s G where for (n,k) code G is a matrix with k rows and n columns Linear code because sums of codewords are codewords How can we find d min? The Hamming distance between two binary codewords is the same as the Hamming weight of their sum Thus, the minimum Hamming distance is the minimum weight of non-zero code vectors MIT

46 Syndromes and parity-check For any code, it is always possible to find a systematic code, i.e. a code for which G = [I k x k P k x r ]by manipulating the rows using linear operations We define the parity-check matrix H to be: & P r x k # $ - I! % k x k " We have x H = 0 Syndrome s = y H Define error sequence e = y + x Then s = e H Decoding is done by finding the minimum Hamming weight sequence that satisfies s = e H and decoding to the codeword y + z MIT

47 Let s think in 3-D Hamming distance between codes is related to t, the number of errors to correct in a (n, k) linear block code Example: rate (3,1) repetition code: can correct at most 1 error and detect 2 errors MIT

48 Further bounds Hamming bound: r Gilbert bound: there exists a code such that: MIT

49 Cyclic Codes Cyclic codes are codes with cyclic shift property in code words: if (a, b, c, d, e) is a codeword, so is (b, c, d, e, a) A generator matrix is then Can we make use of the regular structure of this matrix to simplify things? MIT

50 Polynomials on fields Galois field: a field with a finite number of elements We can define a polynomial over a finite field (Galois Field) GF(q) as f(d) = f n D n + f n-1 D n f 0 D is not a variable in the field, it is an indeterminate - think of the D-transform or the Z-transform For polynomials, addition and multiplication can be defined, they are commutative, associative, closure holds, an addition inverse is defined BUT NO MULTIPLICATIVE INVERSE Instead, we have the following theorem: let f(d) and g(d) be polynomials over GF(q) and let g(d) have degree at least 1. Then there exist unique polynomials h(d) and r(d) over GF(q) for which the degree of r(d) is less than that of g(d) and f(d) = g(d) h(d) + r(d) (Euclidean division algorithm) MIT

51 Relation between polynomials and cyclic codes Represent a vector x = (x n-1 x 0 ) as x(d) = x n-1 D n x 0 We say that x(d) is a codeword when the coefficients for the letters of a codeword If we have a cyclic code, then it is the case that the remainder of dividing D x(d) by D n - 1 ( also called the remainder of D x(d) modulo D n - 1 ) is also a code word To see this: Dx(D) = x n-1 D n + + x 0 D = x n-1 (D n - 1) + + x 0 D + x n-1 Define g(d) to be the lowest degree monic polynomial which is a code word in a cyclic code define m to be its degree Because of linearity, any D j g(d) is also a codeword, so in general a(d) g(d) is a codeword Moreover all code words have this form MIT

52 Implementing systematic cyclic codes In polynomial form, a systematic binary code is of the form: x(d) = D r t(d) - d(d) = D r t(d) + d(d) The check bits are d(d) and d(d) has degree less than r Let s take d(d) to be the remainder of D r t(d) / g(d) What about the syndrome? s(d) = x(d) / g(d) = D r t(d) / g(d) + d(d) / g(d) = 2 d(d) = 0 For some q(d), we have g(d) q(d) + d(d) = D r t(d) So g(d) q(d) = D r t(d) - d(d) = D r t(d) + d(d) which is our codeword x(d) MIT

53 Implementing cyclic codes Divide by g(d) circuit D r s(d) g g g r-1... s 1 + s s r-1 + D r s(d)... Divide by g(d) MIT + Encoder Circuits are easily implemented using shift registers to represent polynomials in D

54 Decoding Brute force: divide y(d) by g(d), from there get syndrome, check syndrome against syndrome table, generate n-bit error pattern, then add to y(d) to obtain corrected word However, we know that we can only correct a number t of errors Let s define the Meggitt set to be the set of error patterns such that e n-1 = 1 Use Meggitt s theorem: suppose that g(d) h(d) = D n - 1 and e(d) / g(d) = s(d) then [D b e(d) mod (D n - 1)]/g(D) = [D b s(d)]/g(d) So only need to store syndromes for error patterns in the Meggitt set MIT

55 MIT Different types of codes: Hamming codes Hamming codes are some of the few perfect codes Sphere of radius v: set of all sequences at distances v or less from a sequence A v-error-correcting sphere-packed code has the property that the spheres of size v around the code are non-overlapping and that every sequence is at most v+1 in distance from some code word A v-error-correcting sphere-packed code for which every sequence is at most v+1 in distance from some code word is perfect Hamming codes: rows of H are all the different nonzero sequences of length n-k Thus n = 2 n-k -1 For all Hamming codes, the minimum Hamming distance is 3, so they can correct 1 error or detect 2 The rate of a Hamming code is R = (2 r - r -1 )/(2 r -1 )

56 Cyclic Redundancy Check Codes (CRCs) Normally look only to see whether the syndrome is 0 or not, which is why they are error-detecting This is not a function of the CRC code, it s more of the way it s decoded Usually used in a concatenated fashion with an error correcting code g(d) = (x+1) p(d) where p(d) is a primitive polynomial, which means that it divides D 2r but no lower order polynomial of the form D v -1 Length n = 2 r-1-1 Usually used in shortened mode: for a systematic code, stuff with 0s and those 0s need not be transmitted but must be taken into account at the decoding MIT

57 Convolutional codes Rather than map a block to a block, we code continuously Tend to be used in lower BER channels We can define the code as a set of states: for M memory elements in the encoder, there are 2 M states The trellis structure is as follows, say M=2 Decoding 11 We use a time between known states 01 Possible ways of getting from one state 00 to another are called the adversary paths 10 t t + 1 Trellis MIT Viterbi algorithm is a means of applying dynamic programming to path selection

58 Beyond codes based on distance What is the best performance we can get with a coded system? Let us consider a channel with bandwidth W, with noise energy N per Hz, and with a maximum E on the mean transmitted Shannon s limit is that if we have no delay constraint and no complexity constrain on the coder and decoder, the best achievable error-free rate (capacity) is given by Bits per second A modulation to achieve this limit is a one that itself looks like noise and the codes are random MIT

59 Recall the BSC 0 X p 1-p Y 0 1 p 1 1-p Capacity is: I(X; Y) = H(Y) - H(Y X) H is entropy H(Z) = - Σ p Z (z) log(p Z (z) ) Let s work it out... MIT

60 Random codes The codes are random in that the codewords are selected at random from a large number of codewords The coding theorem gives results based on the fact that an error is unlikely because the for long enough codewords, two codewords are unlikely to be the close enough to be confused Codes have emerged which work on that principle Examples: Turbo Codes and Low Density Parity Check Codes MIT

61 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start and end of packets Error Detection: Determine when a packet contains errors Error recovery: Retransmission of packets containing errors DLC layer recovery May be done at higher layer Slide 1

62 Framing Where is the DATA?? Three approaches to find frame and idle fill boundaries: 1) Character oriented framing 2) Length counts - fixed length 3) Bit oriented protocols (flags) Slide 2

63 Character Based Framing Frame SYN SYN STX Header Packet ETX CRC SYN SYN SYN is synchronous idle STX is start text ETX is end text Standard character codes such as ASCII and EBCDIC contain special communication characters that cannot appear in data Entire transmission is based on a character code Slide 3

64 Issues With Character Based Framing Character code dependent How do you send binary data? Frames must be integer number of characters Errors in control characters are messy NOTE: Primary Framing method from 1960 to ~1975 Slide 4

65 Length field approach (DECNET) Use a header field to give the length of the frame (in bits or bytes) Receiver can count until the end of the frame to find the start of the next frame Receiver looks at the respective length field in the next packet header to find that packet s length Length field must be log 2 (Max_Size_Packet) + 1 bits long This restricts the packet size to be used Issues with length counts Difficult to recover from errors Resynchronization is needed after an error in the length count Slide 5

66 Fixed Length Packets (e.g., ATM) All packets are of the same size In ATM networks all packets are 53 Bytes Requires synchronization upon initialization Issues: Message lengths are not multiples of packet size Last packet of a message must contain idle fill (efficiency) Synchronization issues Fragmentation and re-assembly is complicated at high rates Slide 6

67 Bit Oriented Framing (Flags) A flag is some fixed string of bits to indicate the start and end of a packet A single flag can be used to indicate both the start and the end of a packet In principle, any string could be used, but appearance of flag must be prevented somehow in data Standard protocols use the 8-bit string as a flag Use (<16 bits) as abort under error conditions Constant flags or 1's is considered an idle state Thus is the actual bit string that must not appear in data INVENTED ~ 1970 by IBM for SDLC (synchronous data link protocol) Slide 7

68 BIT STUFFING (Transmitter) Used to remove flag from original data A 0 is stuffed after each consecutive five 1's in the original frame Stuffed bits Original frame Why is it necessary to stuff a 0 in ? Slide 8

69 DESTUFFING (Receiver) If 0 is preceded by in bit stream, remove it If 0 is preceded by , it is the final bit of the flag. Example: Bits to be removed are underlined below flag Slide 9

70 Overhead In general with a flag 01 K 0 the bit stuffing is require whenever 01 k-1 appears in the original data stream For a packet of length L this will happen about L/2 k times E{OH} = L/ 2 k + (k+ 2) bits For 8 bit flag OH ~ 8 + L/64 For large packets efficiency ~ 1-1/64 = 98.5 (or 1.5% overhead) Optimal flag length If packets are long want longer flag (less stuffing) If packets are short want short flag (reduce overhead due to flag) K opt ~ log 2 (L) Slide 10

71 Framing Errors All framing techniques are sensitive to errors An error in a length count field causes the frame to be terminated at the wrong point (and makes it tricky to find the beginning of the next frame) An error in DLE, STX, or ETX causes the same problems An error in a flag, or a flag created by an error causes a frame to disappear or an extra frame to appear Flag approach is least sensitive to errors because a flag will eventually appear again to indicate the end of a next packet Only thing that happens is that an erroneous packet was created This erroneous packet can be removed through an error detection technique Slide 11

72 Error detection techniques Used by the receiver to determine if a packet contains errors If a packet is found to contain errors the receiver requests the transmitter to re-send the packet Error detection techniques Parity check single bit Horizontal and vertical redundancy check Cyclic redundancy check (CRC) Slide 12

73 Effectiveness of error detection technique Effectiveness of a code for error detection is usually measured by three parameters: 1) minimum distance of code (d) (min # bit errors undetected) The minimum distance of a code is the smallest number of errors that can map one codeword onto another. If fewer than d errors occur they will always detected. Even more than d errors will often be detected (but not always!) 2) burst detecting ability (B) (max burst length always detected) 3) probability of random bit pattern mistaken as error free (good estimate if # errors in a frame >> d or B) Useful when framing is lost K info bits => 2 k valid codewords With r check bits the probability that a random string of length k+r maps onto one of the 2 k valid codewords is 2 k /2 k+r = 2 -r Slide 13

74 Parity check codes k Data bits r Check bits Each parity check is a modulo 2 sum of some of the data bits Example: c 1 = x 1 + x 2 + x 3 c 2 = x 2 + x 3 + x 4 c 3 = x 1 + x 2 + x 4 Slide 14

75 Single Parity Check Code The check bit is 1 if frame contains odd number of 1's; otherwise it is > > Thus, encoded frame contains even number of 1's Receiver counts number of ones in frame An even number of 1 s is interpreted as no errors An odd number of 1 s means that an error must have occured A single error (or an odd number of errors) can be detected An even number of errors cannot be detected Nothing can be corrected Probability of undetected error (independent errors) Slide 15 P(undet ected ) =! N$ ' # & p i (1 ( p) N (i N = packet size " i % p = error prob. i even

76 Horizontal and Vertical Parity Horizontal checks Vertical checks The data is viewed as a rectangular array (i.e., a sequence of words) Minimum distance=4, any 4 errors in a rectangular configuration is undetectable Can you find an example of a pattern of 6 errors that cannot be detected? Slide 16

77 Cyclic Redundancy Checks (CRC) M k Data bits T R r Check bits M = info bits R = check bits T = codeword T = M 2 r + R A CRC is implemented using a feedback shift register Bits in Bits out Slide 17

78 Cyclic redundancy checks T = M 2 r + R How do we compute R (the check bits)? Choose a generator string G of length r+1 bits Choose R such that T is a multiple of G (T = A*G, for some A) Now when T is divided by G there will be no remainder => no errors All done using mod 2 arithmetic T = M 2 r + R = A*G => M 2 r = A*G + R (mod 2 arithmetic) Let R = remainder of M 2 r /G and T will be a multiple of G Choice of G is a critical parameter for the performance of a CRC Slide 18

79 Example r = 3, G = 1001 M = => M2 r = Slide = R (3 bits) Modulo 2 Division

80 Checking for errors Let T be the received sequence Divide T by G If remainder = 0 assume no errors If remainder is non zero errors must have occurred Example: Send T = Receive T = (no errors) No way of knowing how many errors occurred or which bits are In error Slide => No errors

81 Performance of CRC For r check bits per frame and a frame length less than 2 r-1, the following can be detected 1) All patterns of 1,2, or 3 errors (d > 3) 2) All bursts of errors of r or fewer bits 3) Random large numbers of errors with prob r Standard DLC's use a CRC with r=16 with option of r=32 CRC-16, G = X 16 + X 15 + X 2 +1 = Slide 21

82 Physical Layer Error Characteristics Most Physical Layers ( communications channels) are not well described by a simple BER parameter Most physical error processes tend to create a mix of random & bursts of errors A channel with a BER of 10-7 and a average burst size of 1000 bits is very different from one with independent random errors Example: For an average frame length of 10 4 bits random channel: E[Frame error rate] ~ 10-3 burst channel: E[Frame error rate] ~ 10-6 Best to characterize a channel by its Frame Error Rate This is a difficult problem for real systems Slide 22

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

Lecture / The Data Link Layer: Framing and Error Detection

Lecture / The Data Link Layer: Framing and Error Detection Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

Introduction and Layered Network Architecture. EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Introduction and Layered Network Architecture. EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Introduction and Layered Network Architecture EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Fundamental Aspects of Network Analysis Architecture Layering

More information

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1 Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing. /9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1, CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames. Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept

More information

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1 Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter

More information

CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca

CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Snowcast milestone today! 4-7pm Sign up at http://tinyurl.com/cs168-calendar

More information

Networking Link Layer

Networking Link Layer Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding

More information

CS321: Computer Networks Introduction to Computer Networks and Internet

CS321: Computer Networks Introduction to Computer Networks and Internet CS321: Computer Networks Introduction to Computer Networks and Internet Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in What is Data Communication? Data communications

More information

Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3)

Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3) Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3) ECPE/CS 5516: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams (CS) Virginia Tech courses.cs.vt.edu/~cs5516

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

Lecture 6 Datalink Framing, Switching. From Signals to Packets

Lecture 6 Datalink Framing, Switching. From Signals to Packets Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to

More information

Data and Computer Communications. Protocols and Architecture

Data and Computer Communications. Protocols and Architecture Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4 CompSci 356: Computer Network Architectures Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4 Xiaowei Yang xwy@cs.duke.edu Overview Review: link/network performance metrics

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Network Architecture

Network Architecture Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

Introduction to Computer Networks. 03 Data Link Layer Introduction

Introduction to Computer Networks. 03 Data Link Layer Introduction Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple

More information

Data Link Control Layer, Error Detection, Error Correction, and Framing

Data Link Control Layer, Error Detection, Error Correction, and Framing Data Link Control Layer, Error Detection, Error Correction, and Framing EEE 538, WEEK 2 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Error Detection Techniques Used

More information

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components Networking 1 Network... communication system for connecting end- systems End-systems a.k.a. hosts PCs, workstations dedicated computers network components 2 Multiaccess vs.. Point-to-point Multiaccess

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

Computer Communication Networks

Computer Communication Networks Contents ELL 785 Computer Communication Networks Introduction Lecture 1 Taxonomy of communication works Computer Communication Networks Building a work ed work architecture 1-1 Introduction PC server wireless

More information

Direct Link Networks. Framing. Lecture - Encoding & Framing 1. Problems. Areas for Discussion

Direct Link Networks. Framing. Lecture - Encoding & Framing 1. Problems. Areas for Discussion Areas for Discussion Direct Link s Joseph Spring School of Computer Science 3COM0271 Computer Protocols & Architecture s Based on Chapter 2, Peterson & Davie, Computer s: A Systems Approach, 4 th Ed Problems

More information

Lecture 2: Internet Structure

Lecture 2: Internet Structure Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

ISO/OSI Reference Model. Data Link Layer. 7. Application. 6. Presentation. 5. Session. 4. Transport. 3. Network. 2. Data Link. 1.

ISO/OSI Reference Model. Data Link Layer. 7. Application. 6. Presentation. 5. Session. 4. Transport. 3. Network. 2. Data Link. 1. Data Link Layer 1 ISO/OSI Reference Model 7. Application E-Mail, Terminal, Remote login 6. Presentation System dependent presentation of data (EBCDIC/ASCII) 5. Session Connection establishment, termination,

More information

CSE123A discussion session

CSE123A discussion session CSE123A discussion session 2007/02/02 Ryo Sugihara Review Data Link layer (1): Overview Sublayers End-to-end argument Framing sublayer How to delimit frame» Flags and bit stuffing Topics Data Link Layer

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

More information

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology

More information

UNIT - IV Ques.4 Ques.5

UNIT - IV Ques.4 Ques.5 Immediately write your Roll No Bharati Vidyapeeth s Institute of Computer Applications and Management A-4, Paschim Vihar, New Delhi-63. Second Internal Examination 2012-15 Paper Code: MCA207 Subject: Data

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

Communication Networks. Part I

Communication Networks. Part I Communication Networks Part I Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What are the main uses of computer networks?» What are the common architectures of network applications?»

More information

Network Architecture. TOC Architecture

Network Architecture. TOC Architecture Network Architecture Introduction Layering Example Internet Layers First Look Layering Step by Step Downside of Layering Interconnecting Networks The Internet TOC Architecture Introduction Issues: Inter-operability

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

Inst: Chris Davison

Inst: Chris Davison ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of

More information

Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz)

Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz) Chapter2: Peak amplitude: it is the absolute value of the highest intensity. Frequency: it refers to the number of periods in 1 s. It is formally expressed in Hertz (Hz) Phase: it describes the position

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection 2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow

More information

CSEP 561 Error detection & correction. David Wetherall

CSEP 561 Error detection & correction. David Wetherall CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 5: The Link Layer I Errors and medium access Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You should

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

UNIT-II 1. Discuss the issues in the data link layer. Answer:

UNIT-II 1. Discuss the issues in the data link layer. Answer: UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing

More information

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Why not spawn processes

More information

Lecture 5: Data Link Layer Basics

Lecture 5: Data Link Layer Basics Lecture 5: Data Link Layer Basics Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Layer 2 PDU: Frame 2 1 Bit-oriented vs. Byte-oriented Layer 2 protocols

More information

Basics of datacommunication

Basics of datacommunication Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into

More information

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer: Comparison of ISO-OSI and TCP/IP Suit Functions of Data Link Layer: 1. Frame generation ( Character Count, Character Stuffing, Bit Stuffing) 2. Error Processing (Parity(EVEN or ODD), Block Parity, Hamming

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check. Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by: T305 T325 B BLOCK 4 T325 Summary Prepared by: Session 3 [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Dr. Saatchi, Seyed Mohsen T325 Error Control Coding

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Last time How protocols are organized & why Network layer Data-link

More information

Some portions courtesy Robin Kravets and Steve Lumetta

Some portions courtesy Robin Kravets and Steve Lumetta CSE 123 Computer Networks Fall 2009 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Administrative updates I m Im out all next week no lectures, but You

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Lecture 3: Modulation & Layering"

Lecture 3: Modulation & Layering Lecture 3: Modulation & Layering" CSE 123: Computer Networks Alex C. Snoeren HW 1 out Today, due 10/09! Lecture 3 Overview" Encoding schemes Shannon s Law and Nyquist Limit Clock recovery Manchester, NRZ,

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst EITF25 Internet Techniques and Applications L3: Data Link layer Stefan Höst Communication on physical layer To transmit on the physical medium use signals At each computer it can be seen as transmitting

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Advantages and disadvantages

Advantages and disadvantages Advantages and disadvantages Advantages Disadvantages Asynchronous transmission Simple, doesn't require synchronization of both communication sides Cheap, timing is not as critical as for synchronous transmission,

More information

Data Communication & Computer Networks INFO

Data Communication & Computer Networks INFO Data Communication & Computer Networks INFO Instructor: Dr. A. SARI Department: Management Information Systems Course Code: MIS 305 Academic Term: 2013/2014 Fall Title: Data Communication & Computer Networks

More information

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge. Code No: RR320503 Set No. 1 III B.Tech II Semester Supplimentary Examinations, Aug/Sep 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:

More information

Module 2 Overview of. Computer Networks

Module 2 Overview of. Computer Networks Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How

More information

PPP. Point-to-Point Protocol

PPP. Point-to-Point Protocol PPP Point-to-Point Protocol 1 Introduction One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs,

More information

Packet/Frame, Error Detection How to send data efficiently & reliably?

Packet/Frame, Error Detection How to send data efficiently & reliably? Packet/Frame, Error Detection How to send data efficiently & reliably? Packet and Packet Communication - Shared Network Resource, Fairness, Reliability Frame - Byte Oriented Frame and Bit Oriented Frame

More information

DATA LINK LAYER UNIT 7.

DATA LINK LAYER UNIT 7. DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information