8-Reliability and Channel Coding Dr. John P. Abraham Professor UTPA.

Slides:



Advertisements
Similar presentations
Chapter 3 The Data Link Layer.
Advertisements

Data Link Layer Protocols Flow Control in Data Link Layer.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
William Stallings Data and Computer Communications 7th Edition
Data Link Control We want to minimize the amount of error correcting and detecting we need to do.
Data and Computer Communications Updated: 2/9/2009.
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
Chapter 7 – Data Link Control Protocols
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 13 Introduction to Computer Networks.
The Data Link Layer Chapter 3. Position of the data-link layer.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 6 Errors, Error Detection, and Error Control
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
20101 The Data Link Layer Chapter Design Issues Controls communication between 2 machines directly connected by “wire”-like link Services Provided.
Link-Level Flow and Error Control
THE DATA LINK LAYER Out of order with the book Dr. John P. Abraham University of Texas, Panam.
Data Link Control Protocols
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
26-TCP Dr. John P. Abraham Professor UTPA. TCP  Transmission control protocol, another transport layer protocol.  Reliable delivery  Tcp must compensate.
Chapter 3 THE DATA LINK LAYER
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Chapt 3 Data Link Layer1 Data Link Layer Functions –Provides services to network layer Well-defined interface –Framing –Flow control – between adjacent.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Data Link Layer - 2 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
8-Reliability and Channel Coding Dr. John P. Abraham Professor UTPA.
Computer Networks Lecture 3: Data Link - part II Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn.
Eighth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange.
1 FIT1005 Topic 6 - Data Link Layer Reference: Chapter 7 -Stallings.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
CSCI 465 D ata Communications and Networks Lecture 11 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Data Link Layer Part II – Sliding Window Protocols.
Data and Computer Communications Data Link Control Protocols.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 3: The Data Link Layer –to achieve reliable, efficient communication between two physically connected machines. –Design issues: services interface.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lec # 15.
24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.
Computer Communication & Networks
2.10 Flow and Error Control Before that ...
Chapter 3 The Data Link Layer.
Chapter 9: Data Link Control
Data Link Layer Flow Control.
Data Link Layer.
Data link layer (LLC).
Data Link Layer What does it do?
CIS 321 Data Communications & Networking
Chapter 3 – Part 1 The Data Link Layer.
Rivier College CS575: Advanced LANs Chapter 6: Logical Link Control
Overview Jaringan Komputer (2)
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
8-Reliability and Channel Coding
8-Reliability and Channel Coding
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Chapter 9: Data Link Control
Data Link Layer. Position of the data-link layer.
Presentation transcript:

8-Reliability and Channel Coding Dr. John P. Abraham Professor UTPA

sources of transmission errors All data communication systems are susceptible to errors. Devices fail. Equipment that does not meet the engineering standards. We need to have ways to control and recover from errors –Interference –Distortion –Attenuation

Effect of transmission errors on data Single bit error –Result from very short-duration interference Burst Error –Multiple bits in a block of bits are changed. Results from longer-duration interference Erasure –Does not correspond to either a logical 1 or 0. Can result from distortion or intereference.

Link Layer The following topics fall under Layer 2 of OSI or the Data Link Layer. Towards the end of this presentation, I will present more on data link layer. This layer deals with issues of: –Framing, physical addressing, error control and reliability, flow control and medium access control. Chapter 13 of your book handles some of these issues.

Strategies for Handling channel Errors. Channel Coding Forward Error Correction (FEC) –Add additional bits for detection and correction. Automatic Repeat reQuest (ARQ) –Sender and receiver exchange messages to indicate to insure all data arrives correctly.

Use notes here to explain Hamming Code

CRC Given a from of k-bit Transmitter generates n-bit sequence called FCS (frame check sequence) The k+n bit is divisible by some predetermined number. The receiver divides the total by the predetermined number. If no remainder, then the block is fine.

ARQ Receiving side send Ack back if the message arrived correctly. If timed out the message is resent ARQ is provided if only error detection is implemented without error correction. There are 3 types of ARQ –Stop and wait –Go-back-n –Selective repeat

Sliding Window Protocols For full duplex two transmission lines are required One to send data and the other to receive data and/or ACKs Sending ACKs in a packet of its own is waste of resources May use pggybacking The acknowledgement is attached to an outgoing data frame(ack field in the frame header) Data link layer must wait until it has some thing to send before it can ack. This may cause time out and the frame may be re-sent.

The essence of sliding window protocols is that at any instant of time, the sender maintains a set of sequence numbers corresponding to frames it is permitted to send. These frames are said to fall within the sending window. Similarly, the receiver also maintains a receiving window corresponding to the set of frames it is permitted to accept. It is NOT necessary for the sender and receiver to have same number limits. Sequence numbers of frames sent but not acknowledged are kept in the senders window. Th receivers window corresponds to the frames it may accept. See page 204 in your text book.

One bit sliding window protocol uses stop and wait scheme, since the sender transmits a frame and waits for its acknowledgement before sending the next one. The acknowledgement field of the frame contains the number of the last frame received without error. If this number agrees with the sequence number of the frame the sender is trying to send, the sender knows that it is done and can proceed with the next frame.

A protocol using Go-Back-N Takes into account of round trip transmission time. Enough frames should be send to stuff the band with to avoid channel idling Consider a 50-kbps satellite channel with 500 m-sec round-trip propagation delay –Let us send 1000 bit frames –At t=0 starts sending the first frame, at t=20 msec the frames has been send –Receiver fully receives only at t=270msc, and ack will be received at t=520 msec. –Sender would be blocked 96% of time- only 4% of available band width was used.

Go-Back-N continued. Instead of sending 4 frames, the sender should have sent 26 frames. This will take t=520 msec. at t=520 the acknowledgement for the first frame will be received. The senders maximum window size is 26. This technique is called pipelining. If a frame in the middle of a stream gets damaged, what should the receiver do? Should all frames starting at that point be re- sent? Go-Back-N simply discards all frames including the damaged one, not sending acks. The time out at the sender will resend all subsequent frames. Can waste a lot of bandwidth in an unreliable channel.

Selective Repeat Receiver stores all good frames after the damaged frame. Notifies the sender of the bad frame, and sender re- sends that one. This technique requires the data link layer to have large amount of memory for the cache.

Data Link Layer Framing: bits from physical layer are grouped into units called frames. To distinguish one frame from the other there are frame delimiting techniques used such as byte or bit stuffing. Discussed in later chapters. A frame contains a header (control information) and the payload (data). Physical addressing – a 48 bit addressing scheme for Ethernet. Error control and reliability CRC, checksum, etc.- already discussed above. Flow control – sliding window discussed above. Medium Access – CSMA-CD and others discussed later. Bridging – connecting two LANS into one.

Point to Point Protocol (PPP) Used by ADSL (PPP over Ethernet) or POTS. Derived from High-Level Data Link Control (HDLC) PPP logs-in to authenticate using LCP (link control protocol) PPPoE used in ADSL runs in two stages: The discovery stage and the PPP session stage. –The discovery stage, user station discovers the MAC address of the access concentrator at the ISP. –In the session stage a session ID is assigned.