Networks: Transmission Errors1 Transmission Errors Error Detection and Correction.

Slides:



Advertisements
Similar presentations
Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Advertisements

Applied Algorithmics - week7
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Information Technologies
Data and Computer Communications
Reliability & Channel Coding
Chapter 6 Errors, Error Detection, and Error Control
Error Detection and Correction
Transmission Errors Error Detection and Correction
Chapter 10 Error Detection and Correction
ELEN 602 Lecture 4 Review of last lecture –Communication basics More on transmission media Errors in Transmission.
Error Detection and Correction
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
Error Detection and Correction
PART III DATA LINK LAYER. Position of the Data-Link Layer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
Transmission Errors1 Error Detection and Correction.
Chapter 6 Errors, Error Detection, and Error Control
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Error Detection and Correction
Transmission Errors Error Detection and Correction
Data link layer: services
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
CSC 535 Communication Networks I Section 3.8 Error Detection and Correction Dr. Cheer-Sun Yang.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer: Error Detection and Correction
Chapter 3 Digital Transmission Fundamentals Line Coding Error Detection and Correction.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Cyclic Redundancy Check CRC Chapter CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword.
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques:
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
PREPARED BY: ENGR. JO-ANN C. VIÑAS
Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
Error Detection. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. An error-detecting code can.
Transmission Errors Error Detection and Correction.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
Coding and Error Control
Lecture 4 Error Detecting and Correcting Techniques Dr. Ghalib A. Shah
Applied Algorithmics - week8
CSE 5345 – Fundamentals of Wireless Networks
Subject Name: COMPUTER NETWORKS-1
DATA COMMUNICATION AND NETWORKINGS
The Three Main Sources of Transmission Errors
Advanced Computer Networks
CIS 321 Data Communications & Networking
Part III Datalink Layer 10.
Chapter 10 Error Detection And Correction
Chapter 3 Digital Transmission Fundamentals
EEC-484/584 Computer Networks
Lecture 3 Digital Transmission Fundamentals
Transmission Errors Error Detection and Correction
Coding and Error Control
Protocols and the TCP/IP Suite
EEC-484/584 Computer Networks
Error Detection and Correction
Error Detection and Correction
Transmission Errors Error Detection and Correction
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Networks: Transmission Errors1 Transmission Errors Error Detection and Correction

Networks: Transmission Errors2 Transmission Errors Transmission errors are caused by: – thermal noise {Shannon} – impulse noise (e..g, arcing relays) – signal distortion during transmission (attenuation) – crosstalk – voice amplitude signal compression (companding) – quantization noise (PCM) – jitter (variations in signal timings) – receiver and transmitter out of synch.

Networks: Transmission Errors3 Error Detection and Correction error detection :: adding enough “extra” bits to deduce that there is an error but not enough bits to correct the error. If only error detection is employed in a network transmission  retransmission is necessary to recover the frame (data link layer) or the packet (network layer). At the data link layer, this is referred to as ARQ (Automatic Repeat reQuest).

Networks: Transmission Errors4 Error Detection and Correction error correction :: requires enough additional (redundant) bits to deduce what the correct bits must have been. Examples Hamming Codes FEC = Forward Error Correction found in MPEG-4.

Networks: Transmission Errors5 Hamming Codes codeword :: a legal dataword consisting of m data bits and r redundant bits. Error detection involves determining if the received message matches one of the legal codewords. Hamming distance :: the number of bit positions in which two bit patterns differ. Starting with a complete list of legal codewords, we need to find the two codewords whose Hamming distance is the smallest. This determines the Hamming distance of the code.

Networks: Transmission Errors6 Error Correcting Codes Figure 3-7. Use of a Hamming code to correct burst errors. Note Check bits occupy power of 2 slots

Networks: Transmission Errors7 x = codewordso = non-codewords x x x x x x x o o o o o o o o o o o o x x x x x x x o o o o o o o o o o o o A code with poor distance properties A code with good distance properties (a) (b) Figure 3.51Copyright ©2000 The McGraw Hill CompaniesLeon-Garcia & Widjaja: Communication Networks

Networks: Transmission Errors8 Hamming Codes To detect d single bit errors, you need a d+1 code distance. To correct d single bit errors, you need a 2d+1 code distance.  In general, the price for redundant bits is too expensive to do error correction for network messages.  Network protocols use error detection and ARQ.

Networks: Transmission Errors9 Error Detection Remember – errors in network transmissions are bursty.  The percentage of damage due to errors is lower.  It is harder to detect and correct network errors. Linear codes –Single parity check code :: take k information bits and appends a single check bit to form a codeword. –Two-dimensional parity checks IP Checksum Polynomial Codes Example: CRC (Cyclic Redundancy Checking)

Networks: Transmission Errors10 Channel Encoder User information Pattern Checking All inputs to channel satisfy pattern/condition Channel output Deliver user information or set error alarm Figure 3.49 General Error-Detection System Copyright ©2000 The McGraw Hill CompaniesLeon-Garcia & Widjaja: Communication Networks

Networks: Transmission Errors11 Calculate check bits Channel Recalculate check bits Compare Information bits Received information bits Check bits Information accepted if check bits match Received check bits Figure 3.50 Error-Detection System using Check Bits Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks

Networks: Transmission Errors Bottom row consists of check bit for each column Last column consists of check bits for each row Figure 3.52 Two-dimensional parity check code Copyright ©2000 The McGraw Hill CompaniesLeon-Garcia & Widjaja: Communication Networks

Networks: Transmission Errors Two errors One error Three errors Four errors Arrows indicate failed check bits Figure 3.53 Copyright ©2000 The McGraw Hill Companies

Networks: Transmission Errors14 Figure 3.54 Copyright ©2000 The McGraw Hill CompaniesLeon-Garcia & Widjaja: Communication Networks

Networks: Transmission Errors15 Polynomial Codes [LG&W pp ] Used extensively. Implemented using shift-register circuits for speed advantages. Also called CRC (cyclic redundancy checking) because these codes generate check bits. Polynomial codes :: bit strings are treated as representations of polynomials with ONLY binary coefficients (0’s and 1’s).

Networks: Transmission Errors16 Polynomial Codes The k bits of a message are regarded as the coefficient list for an information polynomial of degree k-1. I :: i(x) = i x k-1 + i x k-2 + … + i x + i k-1 k Example: i(x) = x 6 + x 4 + x 3

Networks: Transmission Errors17 Polynomial Notation Encoding process takes i(x) produces a codeword polynomial b(x) that contains information bits and additional check bits that satisfy a pattern. Let the codeword have n bits with k information bits and n-k check bits. We need a generator polynomial of degree n-k of the form G = g(x) = x n-k + g x n-k-1 + … + g x + 1 n-k-1 1 Note – the first and last coefficient are always 1.

Networks: Transmission Errors18 CRC Codeword n bit codeword k information bits n-k check bits

Networks: Transmission Errors19 Addition: Multiplication: Division: x 3 + x + 1 ) x 6 + x 5 x 3 + x 2 + x x 6 + x 4 + x 3 x 5 + x 4 + x 3 x 5 + x 3 + x 2 x 4 + x 2 x 4 + x 2 + x x = q(x) quotient = r(x) remainder divisor dividend 35 ) Figure 3.55 Polynomial Arithmetic Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks

Networks: Transmission Errors20 CRC Steps: 1) Multiply i(x) by x n-k (puts zeros in (n-k) low order positions) 2) Divide x n-k i(x) by g(x) 3) Add remainder r(x) to x n-k i(x) (puts check bits in the n-k low order positions): quotient remainder transmitted codeword b(x) = x n-k i(x) + r(x) x n-k i(x) = g(x) q(x) + r(x) Figure 3.56 CRC Algorithm Copyright ©2000 The McGraw Hill CompaniesLeon-Garcia & Widjaja: Communication Networks

Networks: Transmission Errors21 Information: (1,1,0,0) i(x) = x 3 + x 2 Generator polynomial: g(x)= x 3 + x + 1 Encoding: x 3 i(x) = x 6 + x ) x 3 + x + 1 ) x 6 + x 5 x 3 + x 2 + x x 6 + x 4 + x 3 x 5 + x 4 + x 3 x 5 + x 3 + x 2 x 4 + x 2 x 4 + x 2 + x x Transmitted codeword: b(x) = x 6 + x 5 + x b = (1,1,0,0,0,1,0) Figure 3.57 Copyright ©2000 The McGraw Hill CompaniesLeon-Garcia & Widjaja: Communication Networks 010

Networks: Transmission Errors22 Cyclic Redundancy Checking Figure 3-8. Calculation of the polynomial code checksum.

Networks: Transmission Errors23 1. Single bit errors: e(x) = x i 0  i  n-1 If g(x) has more than one term, it cannot divide e(x) 2. Double bit errors: e(x) = x i + x j 0  i < j  n-1 = x i (1 + x j-i ) If g(x) is primitive, it will not divide (1 + x j-i ) for j-i  2 n-k  1 3. Odd number of bit errors: e(1) =1 If number of errors is odd. If g(x) has (x+1) as a factor, then g(1) = 0 and all codewords have an even number of 1s. Figure 3.60 Generator Polynomial Properties for Detecting Errors Copyright ©2000 The McGraw Hill CompaniesLeon-Garcia & Widjaja: Communication Networks

Networks: Transmission Errors24 4.Error bursts of length b: e(x) = x i d(x) where deg(d(x)) = L-1 g(x) has degree n-k; g(x) cannot divide d(x) if deg(g(x))> deg(d(x)) L = (n-k) or less: all errors will be detected L = (n-k+1): deg(d(x)) = deg(g(x)) i.e. d(x) = g(x) is the only undetectable error pattern, fraction of bursts which are undetectable = 1/2 L-2 L > (n-k+1): fraction of bursts which are undetectable = 1/2 n-k L ith position error pattern d(x) Figure 3.61 Generator Polynomial Properties for Detecting Errors Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks

Networks: Transmission Errors25 Packet sequence Error-free packet sequence Information frames Control frames TransmitterReceiver CRC Information packet Header Station A Station B Information Frame Control frame CRC Header Figure 5.8 Basic ARQ with CRC Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks