Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.

Slides:



Advertisements
Similar presentations
Cyclic Code.
Advertisements

Error Control Code.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Chapter 6 Errors, Error Detection, and Error Control
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Medium Access Control Sublayer
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Physical Layer (2). Goal Physical layer design goal: send out bits as fast as possible with acceptable low error ratio Goal of this lecture – Review some.
Wireless Communications
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Exercises. Problem 1 The link delay is 270ms. Each data frame is 1000 bits. Data rate is 1Mbps. What is the link efficiency of the Stop&Wait protocol?
Bandwidth and noise. Bandwidth basically means how fast your signal can change or how fast can you send out symbols. – Symbol is something you send out.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Physical Layer – How bits are sent. Goal Physical layer design goal: send out bits as fast as possible with acceptable low error ratio Goal of this lecture:
Cyclic Code. Linear Block Code Hamming Code is a Linear Block Code. Linear Block Code means that the codeword is generated by multiplying the message.
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Physical Layer Continued. Review Discussed how to design the communication scheme depending on the physical mediums – pulling voltage up and down for.
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Data Link Layer. Data link layer The communication between two machines that can directly communicate with each other. Basic property – If bit A is sent.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lec # 15.
Multiple Access Methods
Packetizing Error Detection
Lab 7 – CSMA/CD (Data Link Layer Layer)
Multiple Access Mahesh Jangid Assistant Professor JVW University.
CS 457 – Lecture 6 Ethernet Spring 2012.
Data Link Layer.
Multiple Access Methods
Lecture 7 review Consider a link running the Go-Back-N protocol. Suppose the transmission delay and propagation delay are both 1ms, the window size is.
Data Communication Networks
Lecture 5- Data Link Layer
Multiple Access Methods
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Selective Repeat.
Presentation transcript:

Midterm Review

Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the capacity of the channel, B is the bandwidth of the channel, S is power of the signal and N is the power of the noise – Channel capacity means how many bits you can send out per second reliably – Bandwidth means how fast you can change the voltage. More precisely, the range of frequencies pass the channel. – Noise: anything other than the intended signal. Added to the signal.

Detection – with Noise Detection really depends on the noise. In the binary case when the transmitted signal is either 0 or 5V with equal probability, if we know that noise takes values - 3V and 2V with probability 0.7 and 0.3, respectively. How would you design the detector? First step, check the possible outcomes: – If send 0V, two possible outcomes: -3V. Prob: V. Prob: 0.3. – If send 5V, two possible outcomes: 2V. Prob: V. Prob: 0.3. – So, a total of only 3 possible outcomes. Second step, check for each outcome, what should the output be. – No ambiguity when received -3V and 7V, 0 and 1, respectively. – What should we say when received 2v? From 0V, probability 0.5*0.3= From 5V, 0.5*0.7=0.35. So will say when received 2V, the bit is 1. – What is the probability that we give the wrong detection result? When received 2V and was from bit 0 and we say it is from bit 1, so it is 0.15.

Basic Wireless System The very basic wireless communication system – Sender: given the bit stream, convert it to the baseband waveform by a Low Pass Filter, then multiply with the carrier waveform (2.4GHz if g, 1.8GHz if some cellphones), and send. – Receiver: given the signal received from the antenna, multiply it with a locally generated carrier, send it to the low pass filter, regenerate the baseband waveform.

Some Important Concepts Bandwidth – How fast can signals change. Or, the width of the frequency range that can pass the system. Noise – Will be added to the signal. Random, but some statistics can be known with which we make our detection rules. Data rate – How fast can we send bits, can be measured in bps. Upper bounded by the Shannon’s theorem given the bandwidth and noise. Propagation delay – How long does it take for the symbol to reach to the destination. Symbol – A point on the plane to represent one bit or multiple bits. Sample – A reading of the received signal at some time instant. Usually a corrupted version of the symbol. Filter – Some device or software that can remove certain frequency components in the received waveform. Carrier – A sine wave to be multiplied with the baseband waveform. Baseband waveform – The waveform that is a smoothed version of the square waveform after the low pass filter. To be multiplied with the carrier.

Error Correction The (7,4) Hamming code: Error correction – calculating the syndrome, check it matches with row of H.

Error Correction How is G chosen such that it can correct one error? The key is – First: ANY linear combinations of the row vectors of G has weight at least 3 (having at least three `1’s) ANY codeword is a linear combination of the row vectors So a codeword has weight at least 3. Second: The sum of any two codeword is still a codeword So the distance (number of bits that differ) is also at least 3. So if one bit is wrong, won’t confuse it with other codeword. Because if there is only one bit wrong, the received vector will have one bit difference with the original codeword C0. If it is also only one bit away from another codeword C1, it means that C0 and C1 have at most two bit difference, a contradiction.

Cyclic Code Cyclic code is a linear code that any cyclic shift of a codeword is still a codeword. A (n,k) cyclic code can be generated by a polynomial g(x) which has – degree n-k and – is a factor of x n - 1. Call it the generator polynomial. C(x) can be considered as the product of m(x) and g(x). Systematic code: CRC: Given the packet, regard it as the message polynomial, generate the systematic code. The is the r(x) checksum. Remember this is binary field!

Stop-and-Wait Sender (maintains “m” as the current sequence number, i.e., up to m-1 has been ACKed) 1.Grab data from the network layer. 2.Send to physical layer with the current sequence number, i.e., m, and start timer. 3.Wait for ACK. If get ACKm, m:=m+1, repeat 1. Else, timeout, repeat 2. Receiver (maintains “m” as the current sequence number, i.e., up m-1 has been received) 1.Wait for data from the physical layer. 2.Get data from the physical layer. If it is with the expected sequence number, i.e., m, give it to the network layer when the network layer is ready, m:=m+1. 3.Send ACKm-1. Goto 1.

Go-Back-N Sender. Assume the current window is m+1 to m+n. while (1) { If network layer has data and if current window not full yet: read data, send to physical layer with the current sending frame ID, start timer, increment sending ID. If got ACKw: if w is outside the window, don’t do anything; if w is inside the window, consider all frames in the window with ID no more than w acked and let m=w. If timeout for frame w: start to resend all frames in the window with frame ID no less than w. } Receiver. Assume the expected sequence number is m. while (1){ Wait to get data from the physical layer (blocked here until data received). (1) If the data has frame ID m, give it to the network layer, m=m+1; (2) Send ACKm-1. } Note: assuming the sequence number is the frame ID. Note: for simplicity, assume the receiver network layer is always ready. 3/16/2016 8:14:57 PM

Selective Repeat Sender. Assume the current window is m+1 to m+n. while (1) { If network layer has data and if current window not full yet: read data, send to physical layer with the current sending frame ID, start timer, increment sending ID. If got ACKw: if w is outside the window, don’t do anything; if w is inside the window, consider all frames in the window with ID no more than w acked and let m=w. If timeout for frame w, resend frame w. } Receiver. Assume the current window is m+1 to m+n. while (1) { Wait (blocked here) and get frame from the physical layer. If it is within the receiver window and hasn’t been received before, fill in the slot, forward the beginning of the receiver window if necessary, and deliver to the network layer all frames between the beginning of the old receiver window and the new receiver window – 1, inclusive. Send ACKm (m+1= the beginning of the current receiver window). } Note: assuming the sequence number is the frame ID. Note: for simplicity, assume the receiver network layer is always ready. 3/16/2016 8:14:57 PM

MAC In broadcast channels/multiaccess channels/random access channels, multiple sources may compete for a shared channel. Two properties: When one station transmits, anyone can hear (something) When more than station transmit, collision The biggest problem now is how to determine who gets the channel. ALOHA as the starting point. Then tricks such as – CSMA: listen before transmit – CD: collision detection. Early abort. – CA: collision avoidance. Minimize the probability of collision. Wait for a random time after the medium is free. – Exponential backoff: If collision, double the window size. Adaptively adjust the contention window based on the local belief about the number of contending stations. – Ethernet: CSMA/CD/ Exponential backoff. – Wi-Fi: CSMA/CA/ Exponential backoff.

DCF’s Main Idea When get a packet to send, sense the channel. If channel is busy, wait until the channel is free for DIFS. Start to backoff for a random time. If busy before reaching zero, freeze bo counter, and reactivate when idle for DIFS again. If counted to 0 and channel is still idle, send. After receives a packet, send ACK. If no ACK received, double the window and retry.

An Exam Problem Consider a link running the Go- Back-N protocol. Suppose the transmission delay and propagation delay are both 1ms, the window size is 3, and the timeout is 3ms (start to count after the last bit of a frame is sent). Suppose the sender starts to send at time 0 and no data frame is ever lost, and all ACKs are received except the ACKs the receiver sends at time 6ms and 7 ms. Please finish the following figure for both the sender and receiver side till 14ms.