Dr. Clincy Professor of CS

Slides:



Advertisements
Similar presentations
Lecture 12 Layer 2 – Data Link Layer Protocols
Advertisements

The Binary Numbering Systems
Digital Fundamentals Floyd Chapter 2 Tenth Edition
1 Information Representation (level ISA-3) Signed numbers and bit-level operations.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
CS 151 Digital Systems Design Lecture 4 Number Codes and Registers.
Data Communications Chapter 7 Error Detection. Despite the best prevention techniques, errors may still happen. To detect an error, something extra has.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
MOHD. YAMANI IDRIS/ NOORZAILY MOHAMED NOOR 1 Overflow Signed binary is in fixed range -2 n-1  2 n-1 If the answer for addition/subtraction more than the.
Data Representation – Chapter 3 Sections 3-2, 3-3, 3-4.
© 2009 Pearson Education, Upper Saddle River, NJ All Rights ReservedFloyd, Digital Fundamentals, 10 th ed Digital Fundamentals Tenth Edition Floyd.
Chapter 2: Data Representation
Lecture 6 Topics Character codes Error Detection and Correction
Binary Arithmetic & Data representation
Cosc 2150: Computer Organization
Digital Logic Lecture 4 Binary Codes The Hashemite University Computer Engineering Department.
1 Digital Systems and Binary Numbers EE 208 – Logic Design Chapter 1 Sohaib Majzoub.
Digital Logic Design Lecture 3 Complements, Number Codes and Registers.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Practical Session 10 Error Detecting and Correcting Codes.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
PREPARED BY: ENGR. JO-ANN C. VIÑAS
Data Representation, Number Systems and Base Conversions
Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
© 2009 Pearson Education, Upper Saddle River, NJ All Rights ReservedFloyd, Digital Fundamentals, 10 th ed Digital Logic Design Dr. Oliver Faust.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Transmission Errors Error Detection and Correction.
Data Link Layer 1. 2 Single-bit error 3 Multiple-bit error 4.
Nguyen Le CS147.  2.4 Signed Integer Representation  – Signed Magnitude  – Complement Systems  – Unsigned Versus Signed Numbers.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
Number Systems. The position of each digit in a weighted number system is assigned a weight based on the base or radix of the system. The radix of decimal.
Lecture Coding Schemes. Representing Data English language uses 26 symbols to represent an idea Different sets of bit patterns have been designed to represent.
Hamming Codes The Hamming Code is a Forward Error-correcting Code (FEC) that uses redundant bits to correct a single bit error For 4 bit codes, 3 redundant.
Dr. Clincy Professor of CS
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Signed binary numbers & Binary Codes
Lec 3: Data Representation
CS2100 Computer Organisation
Dr. Clincy Professor of CS
Digital Logic and Computer Organization
ERROR DETECTION AND CORRECTION
ERROR CORRECTING CODES
Dr. Clincy Professor of CS
Dr. Clincy Professor of CS
Error Correcting Code.
Representing characters
Part III Datalink Layer 10.
Dr. Clincy Professor of CS
CS1010 Programming Methodology
Chapter 1 Number Systems, Number Representations, and Codes
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
Dr. Clincy Professor of CS
Digital Logic & Design Lecture 03.
Dr. Clincy Professor of CS
Dr. Clincy Professor of CS
Data Representation – Chapter 3
Fundamentals of Data Representation
Dr. Clincy Professor of CS
Chapter Nine: Data Transmission
Floating Point Numbers - continuing
Chapter 10 Error Detection and Correction
Dr. Clincy Professor of CS
Presentation transcript:

Dr. Clincy Professor of CS CS 6021 - Chapter 2 Dr. Clincy Professor of CS Dr. Clincy Lecture 3

Multiplication in base 2 – dealing with negative numbers By hand – signed case – best to use 2’s complement If both numbers are negative, perform as if both numbers are positive If one is negative and one number is positive, see below – extend out left-most bit Dr. Clincy Dr. Clincy Lecture 2

How does the computer multiply integers (shifting) ? Computer doesn’t actually multiply – it adds and shifts Dr. Clincy Dr. Clincy Lecture 3

Examples of Integer Multiplication by 2 Dr. Clincy 4 4

Another Example of Integer Multiplication by 2 Dr. Clincy 5 5

Examples of Integer Division by 2 Dr. Clincy 6 6

Booth’s Algorithm – Faster 2’s Complement Multiplication Dr. Clincy 7

Booth’s Algorithm Concept Dr. Clincy 8

Booth’s Algorithm Concept Dr. Clincy 9

Booth’s Algorithm Standard Approach Booth’s Algorithm Approach This is where 2’s complement comes into play Dr. Clincy 10

Booth’s Algorithm Only consider the first 16 bits – ignore beyond the 16th bit Dr. Clincy 11

Character Codes Calculations aren’t useful until their results can be displayed in a manner that is meaningful to people. We also need to store the results of calculations, and provide a means for data input. Thus, human-understandable characters must be converted to computer-understandable bit patterns using some sort of character encoding scheme. Dr. Clincy

Character Codes Binary-coded decimal (BCD) was one of these early codes. It was used by IBM mainframes in the 1950s and 1960s. In 1964, BCD was extended to an 8-bit code, Extended Binary-Coded Decimal Interchange Code (EBCDIC). Until recently, ASCII was the dominant character code outside the IBM mainframe world. Many of today’s systems embrace Unicode, a 16-bit system that can encode the characters of every language in the world Dr. Clincy

ASCII Dr. Clincy

EBCDIC Dr. Clincy

Character Codes Calculations aren’t useful until their results can be displayed in a manner that is meaningful to people. We also need to store the results of calculations, and provide a means for data input. Thus, human-understandable characters must be converted to computer-understandable bit patterns using some sort of character encoding scheme. Dr. Clincy Lecture 9 and 10

Character Codes Binary-coded decimal (BCD) was one of these early codes. It was used by IBM mainframes in the 1950s and 1960s. In 1964, BCD was extended to an 8-bit code, Extended Binary-Coded Decimal Interchange Code (EBCDIC). Until recently, ASCII was the dominant character code outside the IBM mainframe world. Many of today’s systems embrace Unicode, a 16-bit system that can encode the characters of every language in the world Dr. Clincy Lecture 9 and 10

Error Detection Vs Error Correction Error Detection – determining if an error occurred or not Error Correction – given an error has occurred, correcting the error – much more complex than error detection (Method 1) Fix the error by retransmitting the frame that is in error - Rx ask the Tx to retransmit (Method 2) Forward error control – fixing the error on the Rx side (complex) Dr. Clincy Lecture 9 and 10

Error Control Techniques Trade off between detection probability and processing requirements Approaches Detection Simple Parity (Double Parity) Cyclic Redundancy Checksum Error correction Hamming Approach Dr. Clincy Lecture 9 and 10

Error Detection: Single Parity Bit added to each character to make all bits add up to an even number (even parity) or odd number (odd parity) Good for detecting single-bit errors only High overhead (one extra bit per 7-bit character=12.5%) Examples of parity bits What’s the disadvantage ?: what happens for 2 bit errors ? . Dr. Clincy Dr. Clincy Lecture 9 and 10 Lecture 20 20

Do Some Examples w/students Even, 110101 Odd, 110110 Odd, 1010101 Even, 11111 Dr. Clincy Dr. Clincy Lecture 9 and 10 Lecture 21 21

Parity Bit Concept Given the word: 1011011 – add “parity bit” Even Parity: even # of 1’s: 11011011 Odd Parity: odd # of 1’s: 01011011 What’s the disadvantage ?: what happens for 2 bit errors ? Another Example: Encode 1100 in (a), even parity added in (b), Error in AC in (c) NOW, do we see how we can use the Parity Bit Concept to Detect Errors Dr. Clincy Lecture

Error Detection: Double Parity Uses horizontal and longitudinal parity Individual characters are grouped together in a block Each row (character) would have a parity bit Each column would have a parity bit The group of parity bits formed by the rows and columns Parity bits (B) 1 1 0 1 0 1 1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 0 1 0 0 1 1 0 0 1 1 0 1 0 0 1 1 1 0 If 1 bit is in error, (B) catches it, if 2 bits are in error, (A) catches it Parity bits (A) Dr. Clincy Lecture

Do some examples w/students Even 111101 101010 110011 Odd 11101 11010 11000 Even 110001 100010 110011 Odd 10001 11010 11100 Dr. Clincy Lecture