Chapter 6 Errors, Error Detection, and Error Control

Slides:



Advertisements
Similar presentations
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Advertisements

EIE325: Telecommunication TechnologiesMaciej J. Ogorza ł ek, PolyU, EIE Telecommunication Technologies Week 8 Flow Control Error Control.
William Stallings Data and Computer Communications 7th Edition
Reliability & Channel Coding
Chapter 6 Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control.
Chapter 7 – Data Link Control Protocols
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Sixth Edition.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 6: Errors, Error Detection, and Error Control
Data Communications Chapter 7 Error Detection. Despite the best prevention techniques, errors may still happen. To detect an error, something extra has.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
Chapter 6 Errors, Error Detection, and Error Control
Data Link Layer RAHUL DEVA.
Chapter 5 Data Link Layer.
Lecture 06 Errors, Error Detection, and Error Control.
Data Link Control Protocols
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
William Stallings Data and Computer Communications 7th Edition
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
1 Chapter 6 Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach.
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Eighth Edition.
Errors, Error Detection, and Error Control
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Chapter 6: Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Third Edition.
Session 4. Objectives: By the end of this session, the student will be able to: Identify the different types of noise commonly found in computer networks.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Eighth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange.
Copyright ©2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible web site, in whole.
FUNDAMENTALS OF NETWORKING
Chapter Two Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User's Approach Eighth Edition.
Chapter 9: Data Link Control Business Data Communications, 4e.
Data and Computer Communications Digital Data Communications Techniques + Error Control+ Digital Data Communications Techniques + Error Control+Multiplexing.
Coding and Error Control
Chapter 9: Data Link Control
Data Link Layer Flow Control.
Chapter Two Fundamentals of Data and Signals
Data Link Layer.
Chapter Six Errors, Error Detection, and Error Control
Chapter 4 Data Link Layer.
Data link layer (LLC).
The Three Main Sources of Transmission Errors
Transmission Problems
CIS 321 Data Communications & Networking
Chapter Six - Errors, Error Detection, and Error Control
Chap. 4 Data link layer 2.
Chapter 4 Data Link Layer
Data Link Layer What does it do?
CIS 321 Data Communications & Networking
Chapter 4 Data Link Layer.
Data Link Layer: Data Link Control
Packetizing Error Detection
Packetizing Error Detection
Business Data Communications
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Chapter 7 Error Detection and Correction
Transmission Errors Error Detection and Correction
Packetizing Error Detection
Transmission Errors Error Detection and Correction
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Error detection: Outline
Chapter 9: Data Link Control
Error Checking continued
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Chapter 6 Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Chapter 6 Errors, Error Detection, and Error Control

Last time Multiplexing Again at data link level This time - errors and error detection and error control

Transmission Error

OSI vs Internet Model Error Error detection detection and and control

Error detection in different layers Some error detection in other layers Transport layer in OSI Network layer in Internet model Focus on the data link layer Independent of the medium or physical layer

Data Link Layer Responsible for taking the data and transforming it into a frame with header, control and address information. Physical path communication Error detection Error correction Resolve competing requests

Overview Errors Happen Noise and Errors Error Prevention Error Detection Techniques Error Control 1) Do nothing 2) Return a message 3) Correct the error

Introduction Data Communications and Computer Networks Chapter 6 Introduction Noise is always present. If a communications line experiences too much noise, the signal will be lost or corrupted. Communication systems should check for transmission errors. Once an error is detected, a system may perform some action. Some systems perform no error control, but simply let the data in error be discarded.

Noise and Errors – White Noise Data Communications and Computer Networks Chapter 6 Noise and Errors – White Noise Also known as thermal or Gaussian noise Relatively constant and can be reduced. If white noise gets to strong, it can completely disrupt the signal.

Data Communications and Computer Networks Chapter 6

Noise and Errors – Impulse Noise Data Communications and Computer Networks Chapter 6 Noise and Errors – Impulse Noise One of the most disruptive forms of noise. Random spikes of power that can destroy one or more bits of information. Difficult to remove from an analog signal because it may be hard to distinguish from the original signal. Impulse noise can damage more bits if the bits are closer together (transmitted at a faster rate).

Data Communications and Computer Networks Chapter 6

Data Communications and Computer Networks Chapter 6 The bottom figure should show much more distortion, completely blowing out one or two bits of information.

Noise and Errors - Crosstalk Data Communications and Computer Networks Chapter 6 Noise and Errors - Crosstalk Unwanted coupling between two different signal paths. For example, hearing another conversation while talking on the telephone. Relatively constant and can be reduced with proper measures.

Data Communications and Computer Networks Chapter 6

Noise and Errors - Echo Data Communications and Computer Networks Chapter 6 Noise and Errors - Echo The reflective feedback of a transmitted signal as the signal moves through a medium. Most often occurs on coaxial cable. If echo bad enough, it could interfere with original signal. Relatively constant, and can be significantly reduced.

Data Communications and Computer Networks Chapter 6

Noise and Errors - Jitter Data Communications and Computer Networks Chapter 6 Noise and Errors - Jitter The result of small timing irregularities during the transmission of digital signals. Occurs when a digital signal is repeater over and over. If serious enough, jitter forces systems to slow down their transmission. Reduce jitter - shielding

Data Communications and Computer Networks Chapter 6

Noise and Errors – Delay Distortion Data Communications and Computer Networks Chapter 6 Noise and Errors – Delay Distortion Occurs because the velocity of propagation of a signal through a medium varies with the frequency of the signal. Can be reduced using equalizers Attenuation The continuous loss of a signal’s strength as it travels through a medium. Use less lossy medium Use amplifiers

Attenuation When signal travels, it gets weaker. If too weak, cannot tell 1s and 0s. Distance

Distortion As signal travels, it become distorted. Changes shape Successive bits may merge, making reception difficult Distance

Interference Unwanted signal from outside sources Often intermittent, difficult to diagnose Signal Strength Signal Interference

Error Prevention Data Communications and Computer Networks Chapter 6 Error Prevention To prevent errors from happening, several techniques may be applied: - Proper shielding of cables to reduce interference - Telephone line conditioning or equalization - Replacing older media and equipment with new, possibly digital components - Proper use of digital repeaters and analog amplifiers - Observe the stated capacities of the media

Error Detection – Data Level Data Communications and Computer Networks Chapter 6 Error Detection – Data Level Despite the best prevention techniques, errors may still happen. To detect an error, something extra has to be added to the data/signal. This extra is an error detection code. Let’s examine two basic techniques for detecting errors: parity checking cyclic redundancy checksum (CRC).

Parity Value of parity bit is such that character has even (even parity) or odd (odd parity) number of ones Even number of bit errors goes undetected Simple Parity Longitudinal Redundancy Check/Vertical Redundancy Check (LRC/VRC)

Parity Examples - Using Even Parity Even Parity of 1’s LRC/VRC

Parity Checks Data Communications and Computer Networks Chapter 6 Parity Checks Simple parity - If performing even parity, add a parity bit such that an even number of 1s are maintained. If performing odd parity, add a parity bit such that an odd number of 1s are maintained. For example, if the character 1001010 is to be sent, using even parity, a parity bit = 1 would be added to the character. If the character 1001011 is to be sent, using even parity, a parity bit = 0 would be added to the character.

Parity Checks Data Communications and Computer Networks Chapter 6 Parity Checks What happens if the character 10010101 (parity bit is the last bit) and the first two 0s accidentally become two 1s? Thus, the following character is received: 11110101. Will there be a parity error? Problem: Simple parity only detects odd numbers of bits in error (50%)

Parity Checks Data Communications and Computer Networks Chapter 6 Parity Checks Longitudinal parity adds a parity bit to each character then adds a row of parity bits after a block of characters. The row of parity bits is actually a parity bit for each “column” of characters. The row parity bits plus the column parity bits add a great amount of redundancy to a block of characters.

Data Communications and Computer Networks Chapter 6

Data Communications and Computer Networks Chapter 6

Parity Checks Both simple parity and longitudinal parity do not catch all errors. Simple parity only catches odd numbers of bit errors (50% of all errors) Longitudinal parity is better at catching errors but requires too many check bits added to a block of data. As such, these methods are not that often used. However, a parity bit exists in 1 byte of data. We need a better error detection method. What about cyclic redundancy checksum?

Cyclic Redundancy Checksum (CRC) Data Communications and Computer Networks Chapter 6 Cyclic Redundancy Checksum (CRC) The CRC error detection method treats the packet of data to be transmitted as a large polynomial. The transmitter takes the message polynomial and using polynomial arithmetic, divides it by a given generating polynomial. The quotient is discarded but the remainder is “attached” to the end of the message (remainder (mod) arithmetic)

Cyclic Redundancy Checksum Data Communications and Computer Networks Chapter 6 Cyclic Redundancy Checksum The message (with the remainder) is transmitted to the receiver. The receiver divides the message and remainder by the same generating polynomial. If a remainder not equal to zero results, there was an error during transmission. If a remainder of zero results, there was no error during transmission.

Data Communications and Computer Networks Chapter 6 r is the degree of the generating polynomial

Error Control Data Communications and Computer Networks Chapter 6 Error Control Once an error is detected, what is the receiver going to do? 1. Do nothing 2. Return an error message to the transmitter 3. Fix the error with no further help from the transmitter

Flow Control Flow Control refers to mechanisms that make sure that the sending station cannot overwhelm the receiving station with data. Preventing buffer overflow Transmission time Time taken to emit all bits into medium Propagation time Time for a bit to traverse the link

Stop-and-Wait Flow Control The simplest form of flow control is Stop and Wait Flow Control. Stop and Wait Flow Control works like this: The sending station sends a frame of data and then waits for an acknowledgement from the other station before sending further data The other party can stop the flow of data by simply withholding an acknowledgement

Stop-and-Wait Flow Control Source may not send new frame until receiver acknowledges the frame already sent Very inefficient, especially when a single message is broken into separate frames

Stop-and-Wait Flow Control Stop and Wait Flow control works great if data is sent as a few large frames. However large frames are undesirable for the following reasons: Large frame means one station occupies the link for a longer time (undesirable on a multipoint link) There is more chance of error in a large frame resulting in more lost data and more retransmission

Stop and Wait Control Source transmits single frame Wait for ACK (Acknowledgement) If received frame damaged, discard it Transmitter has timeout If no ACK within timeout, retransmit If ACK damaged,transmitter will not recognize it Transmitter will retransmit Receive gets two copies of frame Use ACK0 and ACK1

Error Control Steps Error Control consists of the following steps (not all are necessary): Error detection (Parity, CRC, etc. are used) Positive Acknowledgment (ACK) means no detected error Retransmission after time-out -- because a frame or an ACK might have been lost Negative acknowledgment (NAK) and retransmission Collectively all these mechanisms are called Automatic Repeat reQuest ARQ

Error Control Data Communications and Computer Networks Do nothing Chapter 6 Error Control Do nothing Seems like a strange way to control errors but some newer systems such as frame relay perform this type of error control. Assumption is higher mechanism will detect and handle frame errors.

Error Control Data Communications and Computer Networks Chapter 6 Error Control Return a message has three basic ARQ formats: 1. Stop-and-wait ARQ 2. Go-back-N ARQ 3. Selective-reject ARQ

Error Control Data Communications and Computer Networks Chapter 6 Error Control Stop-and-wait ARQ is the simplest of the error control protocols. A transmitter sends a frame then stops and waits for an acknowledgment. If a positive acknowledgment (ACK) is received, the next frame is sent. If a negative acknowledgment (NAK) is received, the same frame is transmitted again.

Data Communications and Computer Networks Chapter 6

Error Control Data Communications and Computer Networks Chapter 6 Error Control Go-back-N ARQ and selective reject are more efficient protocols. They assume that multiple frames are in transmission at one time (sliding window). A sliding window protocol allows the transmitter to send up to the window size frames before receiving any acknowledgments. When a receiver does acknowledge receipt, the returned ack contains the number of the frame expected next.

Error Control Data Communications and Computer Networks Chapter 6 Error Control For a receiver to correct the error with no further help from the transmitter requires a large amount of redundant information accompany the original data. This redundant information allows the receiver to determine the error and make corrections. This type of error control is often called forward error correction.

Error Control – redundancy Data Communications and Computer Networks Chapter 6 Error Control – redundancy 011001 becomes 000 111 111 000 000 111 If 001 110 111 000 000 111 is transmitted, what do we conclude? Applications? Space, valuable data Wastes BW

Error Detection and Error Control in Action Data Communications and Computer Networks Chapter 6 Error Detection and Error Control in Action Asynchronous transfer mode (ATM) incorporates many types of error detection and error control. ATM inserts a CRC into the data frame (the cell), which checks only the header and not the data. This CRC is also powerful enough to perform simple error correction on the header. A second layer of ATM applies a CRC to the data, with varying degrees of error control.

What we covered Types of errors and their prevention Error detection Parity – 50% CRC – can detect nearly all errors Error correction 1. Do nothing 2. Return an error message to the transmitter 3. Fix the error with no further help from the transmitter