IT-101 Section 001 Lecture #5 Introduction to Information Technology.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
Advertisements

The Binary Numbering Systems
Chapter 4 Making Connections. 2 Introduction  Examine the interface between a computer and a device. This interface occurs at the physical layer.  Connecting.
Chapter 7 Data Link Layer
Chapter 6 Errors, Error Detection, and Error Control.
Lecture 4a: Communication and Networking CSCI102 - Introduction to Information Technology B ITCS905 - Fundamentals of Information Technology.
1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi Information Systems Spring 2011.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
Communicating over the Network
The Data Link Layer Chapter 3. Position of the data-link layer.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Input/Output and Communication
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
TDC 461 Basic Communications Systems 8 May, 2001.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
SIMS-201 Representing Information in Binary. 2  Overview Chapter 3: The search for an appropriate code Bits as building blocks of information Binary.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Overview of Data Communications and Networking UNIT I UNIT I.
Local Asynchronous Communication
Digital Logic Chapter 2 Number Conversions Digital Systems by Tocci.
OSI Model Honolulu Community College Cisco Academy Training Center
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
Chapter 13 Communication Protocols Information Technology in Theory By Pelin Aksoy and Laura DeNardis.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
Communication methods
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Part 2: Packet Transmission Packets, frames Local area networks (LANs) Wide area networks (LANs) Hardware addresses Bridges and switches Routing and protocols.
CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
Networks. Common Xmit Media Shared Media Networks are a shared communication resource Only one user can access at a time.
CENG 490/510 Network Programming Russell Deaton Rm
Networking Basics Networking and Web Design Mrs. Zajicek Spring 2013.
OSI Model Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Communication Systems 3.1) Characteristics of a Communication System.
PREPARED BY: ENGR. JO-ANN C. VIÑAS
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
FUNDAMENTALS OF NETWORKING
When we communicate, we are sharing information. This sharing can be local or remote. Between individuals, local communication usually occurs face to face,
AGBell – EECT by Andrew G. Bell (260) Lecture 2.
© 2009 Pearson Education, Upper Saddle River, NJ All Rights ReservedFloyd, Digital Fundamentals, 10 th ed Digital Logic Design Dr. Oliver Faust.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
Networks Standardisation & Protocols. Learning Objectives Explain the advantages of standardisation and describe some areas of standardisation such as.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
Chapter 3: Network Protocols and Communications
Chapter 3: Network Protocols and Communications
Overview of Data Communications and Networking
PROTOCOLS PROTOCOLS.
Data Link Layer.
Input/Output and Communication
Part III Datalink Layer 10.
Packetizing Error Detection
Packetizing Error Detection
Network Protocol Layers
Overview of Data Communications and Networking
Chapter Nine: Data Transmission
Packetizing Error Detection
Objectives of Today’s Lecture
Objectives of Today’s Lecture
Data Link Layer. Position of the data-link layer.
Introduction Communication Modes Transmission Modes
Presentation transcript:

IT-101 Section 001 Lecture #5 Introduction to Information Technology

 Overview Chapter 3: Error detection and correction Parity checking Repetition Redundancy check Chapter 4: Protocols

 Error Detection and Correction Many factors can lead to errors during transmission or storage When binary information is sent across a physical channel such as wire, coax cable, optical fiber or air, there is always the possibility that some bits will be received in error due to interference form other sources or signal attenuation due to long distances or events like rain or snow etc… Clever code construction or additional information added to the transmission can increase the odds of the sent information being received correctly. We will discuss 3 methods: Parity checking Repetition Redundancy code word checking

Adding redundancy to a code increases the number of bits that need to be transmitted, but leads to the detection and fundamental decrease in errors at the receiver Just about any system that uses digital information employs some form of error detection and/or correction. For example, information on a CD is encoded to allow the CD player to detect and correct errors that might arise due to smudged or scratched disks

Parity Checking Error detection can be accomplished by appending an extra bit called a parity bit to the code Even parity is when the parity bit is set so that the total number of 1’s in the word is even 11   10 1 Odd parity is when the parity bit is set so that the total number of 1’s in the word is odd 11   10 0 Parity bit

Parity Errors Even parity is set: is received Error present, but don’t know which one is the bit in error Parity can detect errors, but can’t correct them Odd parity is set: is received. Error? Even parity is set: is received. Error? Parity checking has a major disadvantage due to its inability to detect even number of inverted bits, e.g would go undetected even if the original transmission was , because there are 2 errors

Repetition Repetition is the provision of extra bits to ensure the information is received correctly Original data: Transmitted: Received: Errors in the first and third bits detected Errors in the first and third bits can be corrected

Redundancy Check Symbols are given a parity bit Total “word” is given a redundancy check The first bit of each symbol in the word is given parity, then the second bit of each symbol in the word is given parity The additional parity symbol is given its own parity and then appended to the transmitted information

Redundancy Check Information to be sent: With even parity, the above is converted to: First bits are: Odd parity bit: 1 Second bits are: Odd parity bit: 1 Odd parity bits: 1 1 Even parity bit: 0 Transmitted: Parity bits Symbol Word

Redundancy Check Error Transmitted: Received: Even parity tells us that the second symbol has an error Comparing Odd parity with the first bit in each symbol shows us that the first bit in the second symbol should be a 0 Comparing Odd parity with the second bit in each symbol shows us that everything is OK

In-class examples The following binary stream uses repetition to help detect errors. Find the erroneous 2-bit code word If an even-parity bit has been added to each 3-bit data unit for error detection, find the erroneous 4-bit code word in the following: Determine the check code word for the following stream of 2-bit words: Find and correct the error in the following received data sequence that is terminated in a redundancy check code word

 Protocols Believe it or not, you use protocols every day When you see a red, octagonal sign, you_____ When you pick up the telephone when it rings, you say _______ You know to wait in line at the DMV You understand how to mail a letter Protocols give structure and provide rules, but they aren’t based on anything other than human convention, agreement and understanding “Agreed upon sets of rules that provide order to different systems and situations.”

Protocols are a vital component of IT What type of connector or voltage level should be used by a device? How can information be formatted in a standard manner? Where in a bit stream do you begin? Which bits comprise the destination address? How can a document include bold, italics, different font sizes, etc. Interoperability requires sets of rules for communicating between various devices. Without agreed upon formats, we’d be drowning in a sea of 1s and 0s.

IT Protocols We’ve already discussed many IT standards. Internet addresses have 32 bits. The byte is commonly accepted as the smallest division of information for storage and manipulation. ASCII is the standard protocol for alphanumeric data IT is built on protocols Hypertext Markup Language (HTML) Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) Internet Protocol (IP) And just about everything else we will talk about To achieve interoperability, digital systems must organize, manage, and interpret information according to a set of widely accepted standards.

Who Sets Standards and Protocols? Technology Consortiums Internet Engineering Task Force (IETF) World Wide Web Consortium (W3C) International Organizations International Telecommunications Union (ITU) International Standards Organization (ISO) National Organizations American National Standards Institute (ANSI) Professional Organizations Institute of Electrical and Electronic Engineers (IEEE) Companies: Microsoft, Cisco, 3Com, others…..

Protocol example How do we know where the bit stream begins? Start bits; stop bits (These are protocols) Flags--used in Ethernet, High-Level Data Link Control (HDLC) Flag =

HDLC Protocol Challenges A protocol procedure like the HDLC flag byte would fail if that byte also occurred somewhere in the content bit stream. Recall that flag byte = ASCII ~ Furthermore, because the bit stream is read on a bit-by-bit basis, this pattern could appear under other circumstances. To fix this problem, a rule had to be incorporated into the protocol: Transmitter: Whenever you have five 1’s in a row, insert an unneeded 0 Receiver: Whenever you receive five 1’s in a row, followed by a 0, discard the 0 Note that this only happens in the data (or content) field AFTER the flag byte is transmitted. This procedure is known as Bit Stuffing, or Zero Bit Insertion

Bit Stuffing Example Original Data Insert 0 Transmitted Data

 Comments for next class Topics to be covered next class: Chapter 7: Compression Introduction Entropy Huffman coding Universal coding