Protocols and the TCP/IP Suite

Slides:



Advertisements
Similar presentations
Lecture 12 Layer 2 – Data Link Layer Protocols
Advertisements

Introduction to Information Technologies
Error Detection and Correction
Transmission Errors Error Detection and Correction
Error Detection and Correction
Fundamentals of Computer Networks ECE 478/578 Lecture #4: Error Detection and Correction Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
Error Detection and Correction
PART III DATA LINK LAYER. Position of the Data-Link Layer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 11 Introduction to Computer Networks.
Chapter 10 Error Detection and Correction
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Error Detection and Correction : Data Link Layer.
Transmission Errors Error Detection and Correction
Data link layer: services
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Data Link Layer: Error Detection and Correction
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
ECE453 – Introduction to Computer Networks Lecture 4 – Data Link Layer (I)
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques:
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, October 2011.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
1 © Unitec New Zealand CRC calculation and Hammings code.
Error Detection.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Data Link Layer 1. 2 Single-bit error 3 Multiple-bit error 4.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
10.1 Types of Errors 10.2 Detection 10.3 Error Correction.
Coding and Error Control
Lecture 4 Error Detecting and Correcting Techniques Dr. Ghalib A. Shah
CS4470 Computer Networking Protocols
Error Detection and Correction
Introduction to Information Technologies
ERROR DETECTION AND CORRECTION
Data Link Layer.
Subject Name: COMPUTER NETWORKS-1
Advanced Computer Networks
CIS 321 Data Communications & Networking
Data Link Layer What does it do?
Part III Datalink Layer 10.
Data Link Layer.
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, August 2010.
Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted during transmission. For.
Chapter 7 Error Detection and Correction
Computer Networks Bhushan Trivedi, Director, MCA Programme, at the GLS Institute of Computer Technology, Ahmadabad.
Chapter 9 Error Detection and Correction
Introduction to Information Technologies
DATA COMMUNICATION Lecture-35.
Transmission Errors Error Detection and Correction
Error Detection Neil Tang 9/26/2008
COMPUTER NETWORKS CS610 Lecture-5 Hammad Khalid Khan.
Chapter 9 Error Detection and Correction
Error Detection and Correction
Error Detection and Correction
Transmission Errors Error Detection and Correction
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Protocols and the TCP/IP Suite Lecture 4 Error Detection Forward Error Correction (Hamming Code) Chapter 2

Protocols and the TCP/IP Suite 1- Error Detection 1.1 Parity check 1.2 Two dimensional parity check 1.3 Checksum 1.4 Cyclic redundancy check Chapter 2

Protocols and the TCP/IP Suite 1.1 Parity check - Appends a parity bit to the end of the data. 10110010 0 Even 10110010 1 Odd - It can detect all single bit errors. It can also detect burst errors, if the number of bits in error is odd. Chapter 2

1.2 Two Dimensional Parity Check Protocols and the TCP/IP Suite 1.2 Two Dimensional Parity Check Parity check bits are calculated for each row, which is equivalent to a simple parity check bit. Parity check bits are also calculated for all columns. Both are sent along with the data. Chapter 2

1.2 Two Dimensional Parity Check Protocols and the TCP/IP Suite 1.2 Two Dimensional Parity Check Chapter 2

Protocols and the TCP/IP Suite 1.3 Checksum - At the sender’s end, the data is divided into segments. The segments are added using ones complement arithmetic to get the sum. The sum is complemented to get the checksum which is sent along with the data segments. At the receiver, the received segments are added using ones complement arithmetic to get the sum. If the complement of the sum is zero, the received data is accepted. Chapter 2

Protocols and the TCP/IP Suite 1.3 Checksum Ex: Find the checksum at the sender and receiver for the following sequence: 10110011 10101011 01011010 11010101 10110011 10101011 __________ 01011110 1 _______________ 01011111 01011010 10111001 11010101 ______________ 10001110 _____________ 10001111 01110000 ________________ Sum: 11111111 Checksum: 00000000 10110011 10101011 __________ 01011110 1 _______________ 01011111 01011010 10111001 11010101 ______________ 10001110 _____________ sum: 10001111 Checksum: 01110000 Chapter 2

1.4 Cyclic Redundancy Check Protocols and the TCP/IP Suite 1.4 Cyclic Redundancy Check The sender generates a bit sequence known as a frame check sequence (FCS), so that the resulting frame consisting of the original data followed by this FCS. - FCS is the remainder which obtained from dividing the original data M(X) by generator polynomial G(x). - The receiver divides the incoming frame by G(X), if there is no remainder the received data has no errors. Chapter 2

1.4 Cyclic Redundancy Check Protocols and the TCP/IP Suite 1.4 Cyclic Redundancy Check 1 0 1 0 0 1 1 1 0 1 1 ________ 0 0 1 0 0 0 0 0 _________ 0 1 0 1 __________ 0 0 0 1011 1001 1 0 1 0 0 0 0 1 0 1 1 ________ 0 0 1 0 0 0 0 0 _________ 0 1 0 0 __________ 1 0 0 0 FCS 0 1 1 1011 1001 Chapter 2

1.4 Cyclic Redundancy Check Protocols and the TCP/IP Suite 1.4 Cyclic Redundancy Check C3 C1 C0 + 1010000 000 001 010 101 100 011 1 Initial FCS Chapter 2

2- Forward Error Correction Protocols and the TCP/IP Suite 2- Forward Error Correction Forward Error correction (FEC) which based on the receiver only is used mainly when retransmissions cannot be requested, e.g., simplex links. Backward error correction which based on retransmission of the frame when an error is detected is commonly used. Hamming Code: It can correct any single bit error Bits in power of 2 positions (1,2,4,8,) are check bits, the rest are m data bits Check bit forces the parity of some collection of bit “1” to be even To see which check bits the data bit in position k contributes to, rewrite k as a sum of powers of 2. 11=1+2+8, 29=1+4+8+16 Chapter 2

Protocols and the TCP/IP Suite Hamming Code EX: If a 12-bit hamming code 100110111000 arrives at receiver, is there any bit error? If so, which bit is wrong? 1 2 3=2+1 4 5=4+1 6=4+2 7=4+2+1 8 9=8+1 10=8+2 11=8+2+1 12=8+4 1 0 0 1 1 0 1 1 1 0 0 0 Check bit Checked Data bits Bits Sequence 1 3 5 7 9 11 1 0 1 1 1 0 (Yes) 2 3 6 7 10 11 0 0 0 1 0 0 (No) 4 5 6 7 12 1 1 0 1 0 (No) 8 9 10 11 12 1 1 0 0 0 (Yes) Hence bit 6 = 2+4 is wrong, so correct hamming code should be 100111111000 Chapter 2