Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉 2004-02-6.

Slides:



Advertisements
Similar presentations
Lecture 12 Layer 2 – Data Link Layer Protocols
Advertisements

1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from the notes By Lami Kaya, © 2009 Pearson Education.
Introduction to Information Technologies
Reliability & Channel Coding
Chapter 6 Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control.
Data Link Layer – Part 1 V.T.Raja Oregon State University.
计算机 在分析化学的应用 ( 简介 ) 陈辉宏. 一. 概述 信息时代的来临, 各门学科的研究方法都 有了新的发展. 计算机的介入, 为分析化学的进展提供了 一种更方便的研究方法.
主要内容  LR(0) 分析. 0 S→  E # E→  E+T E→  T T→  id T→  ( E ) 1 S→E  # E→E  +T 5 T→id  3 E→E+  T T→  id T→  (E) 4 E→E+T  9 E→T  6 T→(  E) E→
绪 论绪 论绪 论绪 论 南京信息工程大学物理实验教学中心 第一次布置的作业 P37/3, 6P37/3, 6 作业做在实验报告册上!!
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
Lecturer: Mu Lingling (穆玲玲)
Long distance communication Multiplexing  Allow multiple signals to travel through one medium  Types Frequency division multiplexing Synchronous time.
CS335 Networking & Network Administration Wednesday, April 7 PacketsPackets, Frames, and Error DetectionFramesError Detection.
Chapter 6: Errors, Error Detection, and Error Control
1 Part II: Packet Transmission Packets on a Network Packets, Frames, LAN, WAN, Hardware Addresses, Bridges, Switches, Routing and Protocols Fall 2005 Qutaibah.
实验三: 用双线性变换法设计 IIR 数字滤波器 一、实验目的 1 熟悉用双线性变换法设计 IIR 数字滤波器的原理与方法。 2 掌握数字滤波器的计算机仿真方法。 3 通过观察对实际心电图信号的滤波作用, 获得数字滤波的感性知 识。
Chapter 6 Errors, Error Detection, and Error Control
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
第二章 通信技术基础 谈英姿 东南大学自控系工业自动化教研室. 通信技术基础 2.1 通信的基本概念 2.2 通信协议与网络层次分析 2.3 常用串行通信技术.
Synchronous - Asynchronous Data Transmission. Asynchronous ► The sender and receiver are not Synchronised. ► The sender sends only one character at a.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Error Detection and Correction : Data Link Layer.
Data link layer: services
Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Integrity in Data Communications Packets, Frames and Error Detection.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉
Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉
Part 2: Packet Transmission Packets, frames Local area networks (LANs) Wide area networks (LANs) Hardware addresses Bridges and switches Routing and protocols.
1 Part III Packet Transmission Chapter 7 Packets, Frames, and Error Detection.
Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉
1 Packets, Frames, and Error Detection. 2 The Problem Cannot afford individual network connection per pair of computers Reasons –Installing wires consumes.
1 ITGN 235: Principles of Networking ITGN 225: Networking Fall 2007/2008.
Layer Two Data Link Layer Collects bits from layer 1 and organizes into frames Passes bits that make up frames to layer 1 for transmission Concerned with.
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
Communication Systems 3.1) Characteristics of a Communication System.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Chapter 7 - Packets, Frames and Error Detection 1. Concepts of Packets 2. Motivation for Packet Switching 3. Framing 4. Frame Formats 5. Transmission Errors.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
1 Chapter 7 Switching, Packets, Frames, Parity, Checksums, and CRCs.
SEPT, 2005CSI Part I.2 Packets, Frames, Parity, Checksums, and CRCs Dr. R.L. Probert, SITE, University of Ottawa.
FUNDAMENTALS OF NETWORKING
Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
SME.USTB Human Factors 人机工程学 By Wei Dong Department of Industry Design, SME, USTB.
COMPUTER NETWORKS CS610 Lecture-4 Hammad Khalid Khan.
CS4470 Computer Networking Protocols
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Introduction to Information Technologies
ERROR DETECTION AND CORRECTION
DATA COMMUNICATION AND NETWORKINGS
The Three Main Sources of Transmission Errors
OCR AS Level F451: Data transmission
Chapter 7 Packets, Frames, and Error Detection
Packetizing Error Detection
Packetizing Error Detection
Introduction to Information Technologies
COMPUTER NETWORKS CS610 Lecture-6 Hammad Khalid Khan.
Packetizing Error Detection
Packets, Frames, Parity, Checksums, and CRCs
COMPUTER NETWORKS CS610 Lecture-5 Hammad Khalid Khan.
Error Detection and Correction
Packets, Frames, Parity, Checksums, and CRCs
Switching, Packets, Frames, Parity, Checksums, and CRCs
Types of Errors Data transmission suffers unpredictable changes because of interference The interference can change the shape of the signal Single-bit.
Presentation transcript:

Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉

PART II Packet Transmission Chapter 7 Packets, Frames, and Error Detection and Error Detection 包、帧与差错检测 包、帧与差错检测

7.1 Introduction

电路交换

分组交换

7.2 The Concept of Packets The network system divides data into small blocks called packets,which it sends individually. Computer networks are often called packet networks or packet switching networks because they use packet technology.

Two facts motivate the use of packets: First, a sender and receiver need to coordinate transmission to ensure that data arrives correctly. When transmission errors occur, data can be lost. Dividing the data into small blocks helps a sender and receiver determine which blocks arrive intact and which do not.

Second, because multiple computer often share underlying connections and hardware, a network system cannot allow one computer to deny access to others. Using small packets helps ensure fairness.

How long does a file transfer require? If a file contains 5 megabytes and the communication system can transfer 56,000 bits per second.

7.3 Packets and Time-Division Multiplexing A network that permits many sources to take turns accessing a shared communication resource is providing a form of time-division multiplexing.

7.4 Packets and Hardware Frames The term packet refers to the general concept of a small block of data, there is no universal agreement on the exact format of packet. Each hardware technology defines the details of packets that can be transferred on that hardware, and specifies how individual bits of the packet are transmitted. We use the term frame to denote the definition of a packet used with a specific type of network.

RS-232 standard is a character-oriented transmission scheme, but it does not include a mechanism that allows the sender to signal the end of a block of characters RS-232 standard is a character-oriented transmission scheme, but it does not include a mechanism that allows the sender to signal the end of a block of characters

7.5 Byte Stuffing 字节填充 7.5 Byte Stuffing 字节填充 Although using characters to mark the beginning and end of each frame has advantages, most computer networks cannot afford to reserve characters for use by the network. The network permits an application to transfer arbitrary characters across the network.

To distinguish between data being sent and control information such as frame delimiters, network systems arrange for the sending side to change the data slightly before it is sent, and then arrange for the receiving side to restore the original data before passing it to the receiving application. To distinguish between data being sent and control information such as frame delimiters, network systems arrange for the sending side to change the data slightly before it is sent, and then arrange for the receiving side to restore the original data before passing it to the receiving application. Because network systems usually insert extra bits or bytes to change data for transmission, the technique is known as data stuffing. Because network systems usually insert extra bits or bytes to change data for transmission, the technique is known as data stuffing.

The term byte stuffing and character stuffing refer to data stuffing used with character-oriented hardware, and bit stuffing refers to data stuffing used with bit-oriented hardware. For example: The term byte stuffing and character stuffing refer to data stuffing used with character-oriented hardware, and bit stuffing refers to data stuffing used with bit-oriented hardware. For example:

字符填充

位填充

7.6 Transmission Errors 传输差错 Lightning,power surges,and other electro-magnetic interference can introduce unwanted electrical currents in the electronic components or wires used for communication. Called transmission errors, the problems of lost, changed, or spuriously appearing bits account for much of the complexity needed in computer networks.

7.7 Parity Bits and Parity Checking 奇偶位与奇偶校验 Known as a parity check, the mechanism requires the sender to compute an additional bit, called a parity bit, and to attach it to each character before sending. After all bits of a character arrive, the receiver removes the parity bit. There are two forms of parity: even and odd.

信息位校验位 信息位校验位 偶校验奇校验

7.8 Probability, Mathematics, and Detection 差错检测中概率和数学 A parity scheme which is designed to help detect transmission errors, sends one extra bit of information with each character. Although it allows a receiver to determine if a single bit has been changed, parity cannot detect transmission errors that change an even number of bits.

Differences among the mechanisms arise in three ways: 1) The size of the additional information; 2) The computational complexity of the algorithm; 3) The number of bit errors that can be detected All error detection methods are approximate The goal is to expend a reasonable effort to produce a low probability of accepting corrupted data.

7.9 Detecting Errors With Checksums Many computer network systems send a checksum( 校验和 ) along with each packet to help the receiver detect errors. To compute a checksum, the sender treats each pair of characters as a 16- bits integer and computes the sum. If the sum grows larger than 16 bits, the carry bits( 进位 ) are added into the final sum.

The small size of the checksum means the cost of transmitting the checksum is usually much smaller than the cost of transmitting the data.

Checksums have the disadvantage of not detecting all common errors. For example:

7.10 Detecting Errors With Cyclic Redundancy Checks 用循环冗余校验检测差错 How can a network system detect more errors without increasing the amount of additional information in each packet? The answer lies in CRC techniques. Hardware that calculates a CRC uses two simple components: a shift register( 移位寄存器 ) and an exclusive or (xor 异或 ) unit

7.11 Combining Building Blocks Three shift registers and three exclusive or units can be combined to compute a 16_bit CRC.

补充 可以用软件实现 CRC.

用多项式 表示除数

7.12 Burst Errors 突发错误 Two categories of common errors make CRCs especially useful. First, hardware failures sometimes cause a specific set of bits to be damaged. for example , vertical errors( 垂直错误 ) Second, CRCs are especially useful for detecting errors that involve changes to a small set of bits near a single location.such errors are called burst errors( 突发错误 ).

7.13 Frame Format and Error Detection Mechanisms Network usually associate error detection information with each frame. The sender calculates information such as a checksum or CRC, and transmits the additional information along with the data in the frame. The receiver calculates the same value and compares it to the additional information that arrives in the frame.

For example: No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

作业 课本: 7.1, 7.2, 7.7 课本: 7.1, 7.2, 7.7 什么是校验和,什么是 CRC? 什么是校验和,什么是 CRC? 对有效数据字符串 ”Hello!” ,应用 ” 校验和 ” 的方法,分别按照 4 位、 8 位进行校验计算, 给出二进制表示的 ” 校验和 ” ,并给出基本的 计算过程。 对有效数据字符串 ”Hello!” ,应用 ” 校验和 ” 的方法,分别按照 4 位、 8 位进行校验计算, 给出二进制表示的 ” 校验和 ” ,并给出基本的 计算过程。