1 / 17

ECE453 – Introduction to Computer Networks

ECE453 – Introduction to Computer Networks. Lecture 4 – Data Link Layer (I). Design Issues. Provide a well-defined service interface Group bits (PHY) into frames (DL) Deal with transmission errors Regulate the flow of frames. M. H. H. H. H. H. H. H. H. H. t. t. l. t. n. l. t.

Download Presentation

ECE453 – Introduction to Computer Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ECE453 – Introduction to Computer Networks Lecture 4 – Data Link Layer (I)

  2. Design Issues • Provide a well-defined service interface • Group bits (PHY) into frames (DL) • Deal with transmission errors • Regulate the flow of frames

  3. M H H H H H H H H H t t l t n l t n n M M application transport network link physical M Link Layer: Setting the Context • two physically connected devices: • host-router, router-router, host-host • unit of data: frame • Protocols implemented in “adapter” network link physical data link protocol M frame phys. link adapter card

  4. Link Layer – The Logical & Physical Flows

  5. Framing • Character count • Flag bytes with byte stuffing • Starting and ending flags with bit stuffing

  6. Framing – Byte Stuffing Tightly tied to the used of 8-bit characters

  7. Framing – Bit Stuffing • Flag pattern: 01111110 • Sender stuff: add 0 after 11111 • Receiver destuff: delete 0 after 11111

  8. Error Detection and Correction1 • Use redundancy • Error detection and retransmission • Over low error rate media • Error correction • Over high error rate media

  9. The Hamming Distance • Codewords (n bits): message (m bits) + check bits (r bits) • Complete list of codewords? • Hamming distance: the number of positions in which two codewords differ • Hamming distance of the complete code: two codewords with the minimum Hamming distance • To detectd errors, Hamming distance of the code: (d+1) • To correctd errors, Hamming distance of the code: (2d+1)

  10. Parity Bit • Even parity • Odd parity • A code with a single parity bit has a Hamming distance of ??? • It can be used to detect ??? errors

  11. Example 0000000000 0000011111 1111100000 1111111111 The code has a Hamming distance of ??? It can detect ??? errors It can correct ??? errors Arrival Original 0000000111 0000011111 0000000111 0000000000

  12. The Hamming Code • Theorem: Given a code with m message bits and r check bits (n=m+r) which allows all single errors to be corrected, the lower limit on r is (m+r+1)<=2r • Hamming code (the bits that are power of 2 are check bits, others are message bits, each check bit forces the parity of some collection of bits, including itself) • Can only correct single bit error

  13. Example - Hamming Code 10010000

  14. How to Correct Burst Errors • Uses kr check bits to make blocks of km data bits immune to a single burst error of length k or less

  15. Error Detecting Code - I x x x x x x x o x x x x x x x o x x x x x x x o x x x x x x x o x x x x x x x o x x x x x x x o x x x x x x x o o o o o o o o o

  16. Error-Detecting Codes • Polynomial code (CRC – Cyclic Redundancy Check) • Generator polynomial G(x) • Message polynomial M(x) • Method: append a checksum of r bits to the end of M(x) such that the appended polynomial T(x) is divisible by G(x) Q(x) … R(x) = xrM(x)/G(x) T(x) = xrM(x) + R(x)

  17. More on Polynomial Code • Single error detection? • Double error detection? • No polynomial with an odd number of terms is divisible by x+1 • A polynomial code with r check bits will detect all burst errors of length <=r • Burst error: at least the first and the last bits of a bit stream are wrong • Hardware implementation: shifted register circuit • International standard of G(x) • X32+x26+X23+X22+X16+X12+X11+X10+X8+X7+X5+X4+X2+X1+1

More Related