CSC 535 Communication Networks I Section 3.8 Error Detection and Correction Dr. Cheer-Sun Yang.

Slides:



Advertisements
Similar presentations
Networks: Transmission Errors1 Transmission Errors Error Detection and Correction.
Advertisements

EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Introduction to Information Technologies
Error Detection and Correction
Transmission Errors Error Detection and Correction
Chapter 10 Error Detection and Correction
ELEN 602 Lecture 4 Review of last lecture –Communication basics More on transmission media Errors in Transmission.
Error Detection and Correction
Coding and Error Control
Error Detection and Correction
PART III DATA LINK LAYER. Position of the Data-Link Layer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
Transmission Errors1 Error Detection and Correction.
Data Communications Chapter 7 Error Detection. Despite the best prevention techniques, errors may still happen. To detect an error, something extra has.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
Adapted from Tanenbaum's Slides for Computer Networking, 4e The Data Link Layer Chapter 3.
Data Communication and Networks Lecture 3 Data Link Control (Part 1) September 18, 2003 Joseph Conron Computer Science Department New York University
Chapter 10 Error Detection and Correction
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
Transmission Errors Error Detection and Correction
Data link layer: services
Channel Coding and Error Control
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
Data and Computer Communications
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer: Error Detection and Correction
Chapter 3 Digital Transmission Fundamentals Line Coding Error Detection and Correction.
Data and Computer Communications Chapter 6 – Digital Data Communications Techniques.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Lecture 3-2: Coding and Error Control (Cont.) ECE
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques:
1 Chapter 8. Coding and Error Control Wen-Shyang Hwang KUAS EE.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
CSCI 465 D ata Communications and Networks Lecture 9 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Error Detection.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
Digital Transmission Fundamentals
1/30/ :20 PM1 Chapter 6 ─ Digital Data Communication Techniques CSE 3213 Fall 2011.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Transmission Errors Error Detection and Correction.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
William Stallings Data and Computer Communications Chapter 7 Data Link Control.
Coding and Error Control
Lecture 4 Error Detecting and Correcting Techniques Dr. Ghalib A. Shah
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Chap. 4 Data link layer 2.
Data Link Layer What does it do?
Digital data communication (Error control)
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
Chapter 3 Digital Transmission Fundamentals
Chapter 7 Error Detection and Correction
Lecture 3 Digital Transmission Fundamentals
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Transmission Errors Error Detection and Correction
Coding and Error Control
Protocols and the TCP/IP Suite
Error Detection and Correction
Transmission Errors Error Detection and Correction
Chapter 10 Error Detection and Correction
Presentation transcript:

CSC 535 Communication Networks I Section 3.8 Error Detection and Correction Dr. Cheer-Sun Yang

2 Data Link Layer Functions zFraming zError detection and correction zFlow control zError recovery (frame level)

3 Error Detection zAdditional bits added by transmitter for error detection code zParity yValue of parity bit is such that character has even (even parity) or odd (odd parity) number of ones yEven number of bit errors goes undetected

4 Cyclic Redundancy Check zFor a block of k bits transmitter generates n bit sequence zTransmit k+n bits which is exactly divisible by some number zReceive divides frame by that number yIf no remainder, assume no error yFor math, see Stallings chapter 7

5 Error Control zForward Error Correction (FEC): Detection and correction of errors yFEC is appropriate when a return channel is not available, retransmission requests are not easily accommodated, or retransmission is not efficient. zAutomatic repeat request (ARQ) yError detection yPositive acknowledgment yRetransmission after timeout yNegative acknowledgement and retransmission

6 Error Control Techniques zParity checking - a single bit error detection zInternet checksum zpolynomial codes (cyclic redundency checking) - single bit error correction and multiple bit error detection

7 Automatic Repeat Request (ARQ) zStop-and-wait ARQ zGo-Back-N ARQ zSelective Repeat ARQ ( also known as selective reject or selective retransmission)

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks8 Channel Encoder User information Pattern Checking All inputs to channel satisfy pattern/condition Channel output Deliver user information or set error alarm Figure 3.49

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks9 Calculate check bits Channel Recalculate check bits Compare Information bits Received information bits Check bits Information accepted if check bits match Received check bits Figure 350

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks10 x = codewordso = non-codewords x x x x x x x o o o o o o o o o o o o x x x x x x x o o o o o o o o o o o o A code with poor distance properties A code with good distance properties (a) (b) Figure 3.51

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks Bottom row consists of check bit for each column Last column consists of check bits for each row Figure 3.52

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks Two errors One error Three errors Four errors Arrows indicate failed check bits Figure 3.53

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks13 Figure 3.54

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks14 Addition: Multiplication: Division: x 3 + x + 1 ) x 6 + x 5 x 3 + x 2 + x x 6 + x 4 + x 3 x 5 + x 4 + x 3 x 5 + x 3 + x 2 x 4 + x 2 x 4 + x 2 + x x = q(x) quotient = r(x) remainder divisor dividend 35 ) Figure 3.55

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks15 Steps: 1) Multiply i(x) by x n-k (puts zeros in (n-k) low order positions) 2) Divide x n-k i(x) by g(x) 3) Add remainder r(x) to x n-k i(x) (puts check bits in the n-k low order positions): quotient remainder transmitted codeword b(x) = x n-k i(x) + r(x) x n-k i(x) = g(x) q(x) + r(x) Figure 3.56

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks16 Generator polynomial: g(x)= x 3 + x + 1 Information: (1,1,0,0) i(x) = x 3 + x 2 Encoding: x 3 i(x) = x 6 + x ) x 3 + x + 1 ) x 6 + x 5 x 3 + x 2 + x x 6 + x 4 + x 3 x 5 + x 4 + x 3 x 5 + x 3 + x 2 x 4 + x 2 x 4 + x 2 + x x Transmitted codeword: b(x) = x 6 + x 5 + x b = (1,1,0,0,0,1,0) Figure 3.57

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks17 reg 0reg 1reg 2 ++ Encoder for clockinputreg 0reg 1reg =i =i =i =i check bits:r 0 = 0r 1 = 1r 2 = 0 r(x) = x Figure 3.58

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks18 b(x) e(x) R(x) + (Receiver) (Transmitter) Error pattern Figure 3.59

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks19 1. Single errors:e(x) = x i 0  i  n-1 If g(x) has more than one term, it cannot divide e(x) 2. Double errors: e(x) = x i + x j 0  i < j  n-1 = x i (1 + x j-i ) If g(x) is primitive, it will not divide (1 + x j-i ) for j-i  2 n-k  1 3. Odd number of errors:e(1) =1 If number of errors is odd. If g(x) has (x+1) as a factor, then g(1) = 0 and all codewords have an even number of 1s. Figure 3.60

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks20 4. Error bursts of length b: e(x) = x i d(x) where deg(d(x)) = L-1 g(x) has degree n-k; g(x) cannot divide d(x) if deg(g(x))> deg(d(x)) xL = (n-k) or less: all will be detected xL = (n-k+1): deg(d(x)) = deg(g(x)) i.e. d(x) = g(x) is the only undetectable error pattern, fraction of bursts which are undetectable = 1/2 L-2 xL > (n-k+1): fraction of bursts which are undetectable = 1/2 n-k L ith position error pattern d(x) Figure 3.61

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks21 b e r + (receiver) (transmitter) error pattern b e r + (receiver) (transmitter) error pattern (a) Single bit input (b) Vector input Figure 3.62

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks s = H e = = single error detected s = H e = = + = double error detected s = H e = = + + = triple error not detected Figure 3.63

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks23 s = H r = He s = 0 no errors in transmission undetectable errors correctable errors uncorrectable errors (1-p) 7 7p37p3 1-3p 3p3p 7p7p 7p(1-3p)21p 2 Figure 3.64

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks24 If d min = 2t+1, non-overlapping spheres of radius t can be drawn around each codeword; t=2 in the figure b1b1 b2b2 oooo set of all n-tuples within distance t set of all n-tuples within distance t Figure 3.66

Copyright 2000 McGraw-Hill Leon-Garcia and Widjaja Communication Networks25 b1b1 b2b2 b3b3 b4b4 b L- 3 b L- 2 b L- 1 bLbL... L codewords written vertically in array; then transmitted row by row b1b1 b2b2 b3b3 b4b4 b L-3 b L-2 b L-1 bLbL... A long error burst produces errors in two adjacent rows Figure 3.66

26 Required Reading zSection 3.8