OSI Reference Model. Application Layer. Presentation Layer. Session Layer. Chapter 4: Application Protocols. Transport Layer.
|
|
- Lorraine Chambers
- 5 years ago
- Views:
Transcription
1 Chapter 2: Computer Networks 2.1: Physical Layer and Data Link Layer 2.2: Examples for Local Area Networks 2.3: Examples for Wide Area Networks 2.4: Wireless Networks OSI Reference Model Application Layer Presentation Layer Chapter 4: Application Protocols Chapter 3: Internet Protocols Session Layer Transport Layer Network Layer Data Link Layer Computer Networks Physical Layer Page 1
2 Layer 1 Physical Layer Connection parameters mechanical electric and electronic functional and procedural More detailed: Physical transmission medium (Copper cable, optical fiber, radio,...) Pin usage in network connectors Representation of raw bits (Code, voltage, etc.) Data rate Control of bit flow: serial or parallel transmission of bits synchronous or asynchronous transmission simplex, half-duplex or full-duplex transmission mode Page 2
3 Transmission Media Copper conductor Braided outer conductor Coaxial cable Twisted Pair Interior insulation Protective outer insulation Several media, varying in transmission technology, capacity, and bit error rate (BER) Glass core Optical fiber Satellites Glass cladding Plastic Radio connections Page 3
4 Twisted Pair Lehrstuhl für Informatik 4 Characteristics: Data transmission through electrical signals Problem: electromagnetic signals of the environment can disturb the transmission within copper cables Solution: two insulated, twisted copper cables Twisting reduces electromagnetic interference with environmental disturbances Simple principle (costs and maintenance) Well known (e.g. telephony) Can be used for digital as well as analogous signals Bit error rate ~ 10-5 Twisted Pair: 4 pairs of twisted copper cables in one outer insulation are named Twisted Pair cable! Insulation Copper core Page 4
5 Coaxial Cable Lehrstuhl für Informatik 4 Structure Insulated copper cable as center conductor Braided outer conductor reduces environmental disturbances Interior insulation separates center and outer conductor Braided outer conductor Copper conductor Interior insulation Protective outer insulation Characteristics: Higher data rates over larger distances than twisted pair: 1-2 GBit/sec up to 1 km Better shielding than for twisted pair, resulting in better signal quality Bit Error Rate ~ 10-9 Early networks were build with coaxial cable, in the last ten years however it was more and more replaced by twisted pair. Page 5
6 Optical Fiber Lehrstuhl für Informatik 4 Characteristics: Nearly unlimited data rate (theoretically up to GBit/s) over very large distances Wavelength in the range of microns (determined by availability of light emitters and attenuation of electromagnetic waves: range of the wavelength around 0.85µm, 1.3µm and 1.55µm are used) Insensitive to electromagnetic disturbances Good signal-to-noise-ratio Bit Error Rate: ~ Page 6
7 Optical Transmission Structure of an optical transmission system Optical source (converts electrical into optical signals; normally in the form 1 light pulse ; 0 no light pulse ) Communication medium (optical fiber) Detector (converts optical into electrical signals) electrical signal optical signal electrical signal optical source optical fiber optical detector Physical principle: Total reflection of light at another medium Medium 2 Medium 1 Refractive index: Indicates refraction effect relatively to air Page 7
8 Optical Fiber Lehrstuhl für Informatik 4 Structure of a fiber Core: optical glass (extremely thin) Internal glass cladding Protective plastic covering The transmission takes place in the core of the cable: Core has higher refractive index, therefore the light remains in the core Ray of light is reflected instead of transiting from medium 1 to medium 2 Refractive index is material dependent A cable consists of many fibers Medium 2 optical source (LED, Laser) Medium 1 (core) Medium 2 Page 8
9 Problems with Optical Fiber The ray of light is increasingly weakened by the medium! Absorption can weaken a ray of light gradually Impurities in the medium can deflect individual rays Dispersion (less bad, but transmission range is limited) Rays of light are spreading in the medium with different speed: - Ways (modes) of the rays of light have different length (depending on the angle of incidence) - Rays have slightly different wavelengths (and propagation speed) Refractive index in the medium is not constant (effect on speed) Here only a better quality of radiation source and/or optical fiber helps! kurzes, Electrical starkes input signal Signal Optical Glasfaser Fiber langes, Electrical schwaches output signal Signal Page 9
10 Encoding of Information Shannon: The fundamental problem of communication consists of reproducing on one side exactly or approximated a message selected on the other side. Objective: useful representation (encoding) of the information to be transmitted Encoding categories Source encoding (Layer 6 and 7) Channel encoding (Layer 2 and 4) Cable encoding (Layer 1) Encoding of the original message E.g. ASCII-Code (text), tiff (pictures), PCM (speech), MPEG (video), Representation of the transmitted data in code words, which are adapted to the characteristics of the transmission channel (redundancy). Protection against transmission errors through error-detecting and/or -correcting codes Physical representation of digital signals Page 10
11 Baseband and Broadband The transmission of information can take place either on the baseband or on broadband. This means: Baseband The digital information is transmitted over the medium as it is. For this, encoding procedures are necessary, which specify the representation of 0 resp. 1 (cable codes). Broadband The information is transmitted analogous (thereby: larger range), by modulating it onto a carrier signal. By the use of different carrier signals (frequencies), several information can be transferred at the same time. While having some advantages in data communications, broadband networks are rarely used baseband networks are easier to realize. But in optical networks and radio networks as well as for Cable TV this technology is used. Page 11
12 Cable Code: Requirements How can digital signals be represented electrically? As high robustness against distortion as possible 1 1 Transmission 0 0 T 2T 3T 4T 5T 6T 7T t 0 0 T 2T 3T 4T 5T 6T 7T t Efficiency: as high data transmission rates as possible by using code words binary code: +5V/- 5V? ternary code: +5 V/0V/- 5V? quaternary code: 4 states (coding of 2 bits at the same time) Synchronization with the receiver, achieved by frequent changes of voltage level regarding to a fixed cycle Avoiding direct current: positive and negative signals should alternatively arise Page 12
13 NRZ: Non Return to Zero Simple approach: Encode 1 as positive tension (+5V) Encode 0 as negative tension (- 5V) +5V V Advantage: Very simple principle The smaller the clock pulse period, the higher the data rate Disadvantage: Loss of clock synchronization as well as direct current within long sequences of 0 or 1 Page 13
14 Differential NRZ Differential NRZ: similar principle to NRZ Encode 1 as tension level change Encode 0 as missing tension level change +5V -5V Very similar to NRZ, but disadvantages only hold for sequences of zeros. Remark: In some implementations (e.g. CISCO) the level change is effected in the middle of the bit (not at the beginning of the bit) but this is no principal difference. Page 14
15 Manchester Code For automatic synchronization, with each code element the clock pulse is transferred. Used is a tension level change in the middle of each bit: encode 0 as tension level change of positive (+5V) to negative (-5V) encode 1 as tension level change of negative (- 5V) to positive (+5V) +5V -5V Advantages Clock synchronization with each bit, no direct current End of the transmission easily recognizable Disadvantage Capacity is used only half! Page 15
16 Differential Manchester Code Variant of the Manchester Code. Similar as it is the case for the Manchester code, a tension level change takes place in the bit center, additionally a second change is made: Encode 1 as missing level change between two bits Encode 0 as level change between two bits +5V -5V Page 16
17 4B/5B Code Lehrstuhl für Informatik 4 Disadvantage of the Manchester code: 50% efficiency, i.e. 1B/2B Code (one bit is coded into two bits) An improvement is given with the 4B/5B Code: four bits are coded in five bits: 80% efficiency Functionality: Level change with 1, no level change with 0 (differential NRZ code) Coding of hexadecimal characters: 0, 1,, 9, A, B,, F (4 bits) in 5 bits, so that long zero blocks are avoided Selection of the most favorable 16 of the possible 32 code words (maximally 3 zeros in sequence) Further 5 bit combinations for control information Expandable to 1000B/1001B Codes? Page 17
18 4B/5B Code Table Decimal Data Transmitted Symbol Assignment Q uiet -line state (status) Invalid Invalid Invalid Halt -line state (status) Invalid Invalid R-Reset (logical 0)-control (control) Invalid Data Data Data Invalid T-Ending delimiter (control) Data Data Invalid K-starting delimiter (control) Data Data Data Data Data Data J-starting delimiter (control) S - set (logical 1) - control (control) Data Data Data Data Data Chapter 2.1: Physical 31 Layer and Data Link Layer Idle-line state (status) Worst case: Zeros Page 18
19 Sicherungsebene Lehrstuhl für Informatik 4 Layer 2: Division into two Parts Logical Link Control (LLC) (Layer 2b) Organization of the data to be sent into frames Guarantee (if possible) an error free transmission between neighboring nodes through: Detection (and recovery) of transfer errors Flow Control (avoidance of overloading the receiver) Buffer Management Medium Access Control (MAC) (Layer 2a) Control of the access to the communication channel in broadcast networks Data Link Layer LLC MAC (Medium MAC Access Control) CSMA/CD (Ethernet) Token Bus IEEE Logical Link Control Token Ring DQDB ANSI X3T9.5 FDDI ATM Forum ATM LAN Emulation ISO/OSI Existing Reale Networks Netze Page 19
20 LLC: Frame Construction Organization of a message into uniform units (for simpler transmission) Well-defined interface to the upper layer (layer 3) Marking of the units: Header Data Trailer Error check (checking sequence for the frame) Control information (addresses, frame numbers, ) FCS = Frame Checking Sequence (Physical) mark the frame by: Start and end flags Start flag and length Code injuries Next task of the LLC layer: protected transmission of the frames to the communication partner. The transmission over layer 1 is not necessarily free of errors! Question: how can errors be recognized and repaired? Page 20
21 Error-detecting and -correcting Codes From the data, compute a short checksum and send it together with the data to the receiver. The receiver also computes a checksum from the received data and compares it with those of the sender. Simplest procedure - parity bit: count the number of 1s: Sender: PB: 1 sends: Receiver: PB computes: 0 1-Bit errors are detected 2-Bit errors are not detected Variant: double parity Corrections are not possible! Improvement of the parity bit procedure by further parity bits. For this, several blocks of bits are grouped and treated together: Sender: Receiver: An incorrect bit can be identified and corrected by this procedure. Page 21
22 Error-correcting Codes Error correction Error correction generally means: Transmission of redundancies: Length of the transmission: n bit (2 n possible binary sequences) Message length: m (<n) bit (2 m permissible code words) k parity bits (k = n - m) Form a sphere of code words around each message Hamming Distance D: Number of places, in which two binary sequences differ Then: D 2t + 1 code is t-error-correcting D t + 1 code is t-error-detecting That means: for error-correction, a relatively large overhead has to be transmitted and it is not guaranteed, that the identified correction really is the right one. Page 22
23 Hamming Code Goal: Use of several parity bits, each of them considering several bits (overlapping). Errors can be identified and corrected by combining the parity bits. The Hamming code is the minimal code of this category. Idea: Representation of each natural number by sum of powers to two. In a code word w = z 1,, z n the parity bits are placed exactly at the k positions, for them the index is a power of two. At the remaining m = n - k positions the data bits are placed. Each of the k additional bits is a parity bit for all places, for which the representation in powers of two contains the position of the additional bit. Page 23
24 Hamming Code ASCII-Code H A M M I N G Parity bit 1: Data bit 3, 5, 7, 9, 11 3 = Parity bit 2: Data bit 3, 6, 7, 10, 11 5 = Parity bit 4: Data bit 5, 6, 7 6 = Parity bit 8: Data bit 9, 10, 11 7 = Problem with Hamming code: errors involving several following bits are usually wrongly corrected 9 = = = Codeword Receiver: examine parity bits if necessary, sum up indices of the incorrect parity bits index of the incorrect bit 1-bit errors can definitely be identified and corrected Page 24
25 Hamming Code Transmission error Receiver computes parity bits: Summing up the indizes 1, 2 and 4, bit 7 is detected as false Weaknesses: 2-bit errors are not corrected (or wrongly corrected!) 3-bit errors are not recognized a) Bit 4 and bit 11 inverted: parity bits 1, 2, 4, 8 are wrong bit 15 is to be corrected, but does not exist b) Bit 2 and bit 4 inverted parity bits 2, 4 wrong bit 6 is falsely recognized as incorrect c) Bits 1, 8, 9 inverted all parity bits are correct no error is recognized Page 25
26 Error Detection with Cyclic Codes Problem: how to recognize errors in several bits, especially sequences of bit errors? The use of simple parity bits is not suitable. However, in data communication (modem, telephone cables) such errors arise frequently. Most often used: Polynomial Codes Idea: a k-bit PDU (a k-1,, a 0 ) is seen as a polynomial a k-1 x k a 0 with the coefficients 0 and 1. Example: is seen as x 6... x 1 x 0 = x 6 + x 5 + x For computations, polynomial arithmetic modulo 2 is used, i.e. addition and subtraction without carriage. Both operations become Exclusive-OR operations. Page 26
27 Error Detection with Cyclic Codes Idea for error detection: Sender and receiver agree upon a generator polynomial G(x) = x r + + x 0. The first and the last coefficient have to be 1. The sender interprets a data block of length m as polynomial M(x). The sender extends M(x), i.e. adds redundant bits in a way that the extended polynomial M (x) is divisible by G(x). (Redundancy = remainder R(x) by division of the sequence with G(x)) The receiver divides the received extended M(x) by G(x). If the remainder is 0, there was (probably!) no error, otherwise some error occurred. Name: Cyclic Redundancy Checksum (CRC) Note: also the parity bit can be seen as CRC, with generator polynomial x + 1! Page 27
28 CRC - Example Data to be transmitted: Generator polynomial: x 4 + x +1 Note: usually, the extra positions are preset with zeros but in some cases, e.g. Ethernet, uses the inverted bits as presets. Sender: : = = x = R(x) CRC = 1001, sending Receiver: : = Data received correctly Page 28
29 Computation of CRC: Shift Registers Implementation by Shift Registers: XOR for substraction AND for applying substraction: first register = 0: no substraction first register = 1: substraction Generator polynomial x 4 + x +1: R R R R R Simplified realization: R R R R R When no more input is given in the leftmost register, the other registers contain the CRC result. Page 29
30 Shift Registers - Example Data to be transmitted: Generator polynomial: x 4 + x Sent data Sent data Sent data Page 30
31 Shift Registers - Example Sent data Sent data Sent data Sent data Page 31
32 Shift Registers - Example Sent data Sent data Sent data Sent data Page 32
33 Shift Registers - Example Sent data Sent data Sent data x Sent data x x 0 0 Page 33
34 Shift Registers - Example Sent data x x 0 1 x Sent data x x x 1 x Sent data x x x x x 0 0 Page 34
35 CRC is not perfect Receiver: : = Error detected Receiver: : = Error not detected Page 35
36 CRC: Characteristics Common generator polynomials: CRC-16: G(x) = x 16 + x 15 + x 2 +1 CRC CCITT: G(x) = x 16 + x 12 + x 5 +1 Ethernet: G(x) = x 32 + x 26 + x 23 + x 22 + x 16 + x 12 + x 11 + x 10 + x 8 + x 7 + x 5 + x 4 + x 2 + x + 1 Error detection (for 16-bit generator polynomials): all single bit errors all double bit errors all three-bit errors all error samples with odd number of bit errors all error bursts with 16 or fewer bits % of all 17-bit error bursts % of all error bursts with length 18 bits Remaining error rate < 0.5 * 10-5 block error rate Page 36
37 CRC is not perfect 1.) There are still remaining some error-combinations which can occur undetected the probability is very small, but in principle it is possible 2.) Assume, the receiver only gets part of the original message: Header / Data FCS Header / Data The receiver interprets the end of the message as FCS and tries to check the rest of the received bits as sent data. Probability for assumed FCS = FCS for assumed data : 1/2 r for r-bit FCS, because each of the r bits is correct with probability ½. This problem can be eliminated by using a fixed byte structure for the data frame or a length field in the header. 3.) An error could consist of adding a multiple of G(x) to M (x) Page 37
38 CRC: Error Correction In exceptional cases even errors are correctable by CRCs. Example: ATM (Asynchronous Transfer Mode) Data units have fixed length 5 byte header + 48 byte data The last header byte is a checksum for the header Generator polynomial G(x) = x 8 + x 2 + x +1 It is even possible to correct a 1-bit error, due to: there are 40 possible 1-bit errors in the 40-bit header and those lead on 40 different non-zero remainders. Correction is not assigned with e.g. Ethernet: an Ethernet frame has a length between 64 and 1512 byte. Page 38
39 Error Protection Mechanisms Error correction: FEC (Forward Error Correction) Use of error-correcting codes Falsified data in most cases can be corrected. Uncorrectable data are simply dismissed. Feedback from the receiver to the sender is not necessary. Suitable for transmissions tolerating no transmission delays (video, audio) as well as for coding resp. protecting data on CDs or DVDs. Error detection: ARQ (Automatic Repeat Request) Use of error-detecting codes (CRC) Errors are detected, but cannot be corrected. Therefore, falsified data must be requested again. Introduction of flow control: number the data blocks to be sent acknowledgement of blocks by the receiver incorrectly transferred blocks are repeated Suitable for transmissions which do not tolerate errors (files). Page 39
40 Flow Control: Send and Wait Simple procedure: The sender sends a data block and waits, until an acknowledgement of the receiver arrives or a timeout is reached. Incorrect blocks are repeated, otherwise the next block is sent. Disadvantage: large waiting periods between the transmission of single blocks. Thus much transmission capacity is wasted. Waiting period Transmitter ACK time out ACK Receiver 1 F 2 3 ACK: Acknowledgment, i.e. everything ok Page 40
41 Flow control: Sliding Window Introduction of a transmission window Common procedure to avoid long waiting periods of the sender Sender and receiver agree upon a transmission window. If W is the window size, it means: the sender may send maximally W messages without an acknowledgement of the receiver. The messages are sequentially numbered in the frame header (0, 1, 2,, MODULUS-1, 0, ; whereby W < MODULUS). The sender may send sequentially numbered messages up to W, without getting an acknowledgement for the first frame. The receiver confirms by acknowledgements (ACK). The sender moves the window as soon as an ACK arrives. Advantages of the procedure: The sender can take advantage of the network capacity A sender who is too fast for the receiver is slowed down (the receiver only can read data from the network slowly, thus it rarely sends ACKs) Sending and receiving speed are adapted Page 41
42 Sliding Window Example (for 3-bit sequence/acknowledgement number) with 3 bits for sequence/acknowledgement number, m = 8 possible combinations Stations agree upon a window size W with 1 W < m, e.g. W = 7 The window limits the number of unconfirmed frames allowed at one time (here max. 7, because of W = 7) With receipt of an acknowledgement, the window is shifted accordingly Frames are numbered sequentially modulo m (for m = 8 thus numbers from 0 to 7) ACK 6 0 ACK 2 ACK Station Station sendet sends Station Station receives erhält Station Station verschiebt slides Station Station receives erhält Station Station verschiebt slides Frames - Quittung 0 Fenster um 1, Quittung 1, 2 Fenster um 2, frames 0-6 acknowledgement 0 sendet window Frame by 1 7 acknowledgement sendet window Frame by 0, 2 Time 1 and sends 1,2 and sends frame 7 frames 0, Page 42
43 Maximum Window Size with Sliding Window There is a reason why window size W has to be smaller than MODULUS: Sequence numbers e.g. have 3 bits: 2 3 = 8 sequence numbers (0,, 7) I.e. MODULUS = 8 Assume the window size to be W = 8. A sends frames to B. A has recently received an ACK for frame 2; A is allowed to send 8 more frames A receives ACK 2. There are two possibilities: Case 1: B only has received and retransmits the (old) number ACK number. Everything in between has been lost. Case 2: B has received and confirms the (new) number 2 (all ACKs may have been lost or forgotten in between) A does not know whether case 1 or 2 holds: the ACK is ambiguous! W must be less than 8 (W < MODULUS in general). Page 43
44 Elimination of Errors: Go-back-n The sender sends data blocks continuously (within the transmission window). The receiver answers: ACK j : everything up to block j is correct REJ j /NACK j : up to block j-1 everything is correct, block j is incorrect Go-back-n: with a REJ j, starting from block j everything is transferred again Disadvantage: With a REJ j the transmitter must repeat all blocks starting from j Advantage: the receiver needs only one buffer place Example of W = 5; MODULUS = 8 Source Destination ACK 0 ACK 1 REJ 2 ACK 2 Page 44
45 High Level Data Link Control (HDLC) Protocol for layer 2: HDLC Frame identification: mark the beginning and end with a flag: Flag may never occur within a frame Used for this purpose: Bitstuffing Sender inserts a zero after each sequence of five ones. The receiver removes this zero. Sender: Receiver: Page 45
46 HDLC Frame Lehrstuhl für Informatik (16) Address Control DATA FCS Flag Header Data Trailer Flag Bits For synchronization on layer 1 D/C N(S) P/F N(R) D/C: DATA (0) resp. control (1) P/F: Poll/final for the coordination of several senders In the idle state, only 1 s are sent. The receiver recognizes a transmission with the first 0. Address contains an identifier to inform the receiver about what to do, e.g means IP protocol used for processing the data. The checksum is computed by using a CRC. Since CRC conducts no error correction, flow control is necessary. Control contains the sequence number N(S) for the message; at the same time, in the opposite direction a message can be acknowledged using the acknowledgement number N(R) ( Piggybacking ). Page 46
47 Medium Access Control (MAC) Controlling the competitive access of several users to a shared medium Simplest procedures: firm assignment of a limited capacity Time Division Multiple Access (TDMA) Frequency Time Each user gets the entire transmission capacity for fixed time intervals (Baseband transmission) Frequency Division Multiple Access (FDMA) Frequency User 1 User 2 User 3 Time Each user gets a fixed portion of the transmission capacity (a frequency range) for the whole time (Broadband transmission) Page 47
48 MAC - Reservation Protocols Communication follows a two-phase schema (alternating phases): In the reservation phase the sender makes a reservation by indicating the wish to send data (or even the length of the data to be sent) In the transmission phase the data communication takes place (after successful reservation) Advantage: very efficient use of the capacity Disadvantage: Delay by two-phase procedure; further, often a master station is needed, which cyclically queries all other stations whether they have to send data. This master station assigns sending rights. Techniques for easy reservation without master station: Explicit reservation Implicit reservation Page 48
49 Explicit Reservation Uses two frame types: reservation frame (very small) in the first phase data frame (constant length) in the second phase Variant 1: without contention Only suitable for small number of users Each user i is assigned the i-th slot in the reservation frame. If it wants to send data, it sets the i-th bit in the reservation frame to 1. After the reservation phase, all stations having set their reservation bit can send their data in the order of their bits in the reservation frame. reservation frame data frames of stations having reserved This procedure is called Bitmap Protocol Page 49
50 Explicit Reservation Uses two frame types: reservation frame (very small) in the first phase data frame (constant length) in the second phase Variant 2: with contention For higher number of users The reservation frame consists of a limited number of contention slots (smaller than the number of participating stations) Users try to get a contention slot (and by that make a reservation for a data slot) by random choice, writing their station number into a slot If there is no collision in the reservation phase, a station may send. reservation frame with contention slots data frames of stations having reserved Page 50
51 Implicit Reservation No reservation slots, only data slots of certain length. A window consists of N data slots, windows a cyclically repeated The duration of the window must be longer than the round-trip time Procedure: A station which wants to send observes N slots without doing anything and marks the slots as follows: 0, if the slot if empty or collided 1, if the slot is used by somebody else In the following window the station randomly chooses one of the slots marked with 0 (Simplification: choose the first slot marked with 0 ) Two cases: conflict: try again successful transmission: slot reserved for the station as long as it sends data. If the station is not using its slot in one window, the reservation is dismissed. Page 51
52 Implicit Reservation Example: 8 data slots, Stations A - F Reservation Slots: Window 1 Stations observing 8 slots ACDABA-F Window 2 A C D A B A B/D F Collision within slot 7; the other slots are reserved Window 3 A C A B A AC-ABA-- Window 4 A B/F B A F A---BAF- Window 5 A B A F D A---BAFD Window 6 A C E E B A F D t Page 52
53 MAC Decentralized Protocols Best known protocol has the name ALOHA Developed on the Hawaiian islands: stations are connected by satellite Very simple principle, no coordination: Stations are sending completely uncoordinated, all using the same frequencies When two (or more) stations are sending at the same time, a collision occurs: both messages are destroyed. Problem: collisions occur even with very small overlaps! Vulnerability period: 2 times the length of a frame When a collision occurs, frames are repeated after a random time Problem: since traffic runs over a satellite, a sender only hears after very long time, whether the transmission was successful or not. Collision Sender A Sender B Sender C t Page 53
54 MAC Decentralized Protocols Problem with ALOHA: even small laps already lead to transmission conflicts. Therefore often collisions arise, causing many repetitions: No guaranteed response times Low throughput Improvement: Slotted ALOHA (first version was pure ALOHA ) The whole time axis is divided into time slots (similar to TDMA, but time slots are not firmly assigned to stations) The transmission of a block starts at the beginning of a time slot fewer collisions, vulnerability period of one frame length But: the stations must be synchronized! Collision Sender A Sender B Sender C t Page 54
55 How to estimate the Efficiency of ALOHA? Which possible states do we have in ALOHA? G: average number of frames per time unit thinking users no conflict S: throughput, i.e. rate of successful transmissions Relation between G and S? common channel Depends significantly on the traffic structure. backlogged users total traffic G conflict Model A: only one sender. No collisions, so S = G is possible Model B: many users, each of them inactive most time new arrivals are totally random Page 55
56 Randomness Lehrstuhl für Informatik 4 Suppose that the total traffic is absolutely random. What is the biggest randomness possible? arrival Random arrivals: consider time interval of length h. Observe arrivals in that interval. h Arrivals have a certain intensity G (average rate per time unit) Randomness : probability of an arrival in a (small) time interval h is proportional to the intensity G o( h) to h h... to G h For very small h, only 0 or 1 arrivals are possible: Prob(exactly one arrival within interval length h) = G h + o(h) Prob(no arrivals within interval length h) = 1 G h + o(h) o(h): disturbance function with 0 for h 0 t Page 56
57 Application for ALOHA access protocol These conditions/requirements lead to the Poisson distribution. Consider the total number i of events in an interval of length T Prob(exactly i arrivals in [0;T]) = ( G T) i! Back to ALOHA: relation between S and G Suppose that G follows the poisson distribution, i.e. G is totally random. i e G T S = G Prob(no collision occurs) = G Prob(nobody else started in my vulnerability period) = G Prob(no arrival in interval of length T = 2) for pure ALOHA G Prob(no arrival in interval of length T = 1) for slotted ALOHA Prob(0 arrivals in [0;T]) = e -G T = G e -2G for pure ALOHA G e -G for slotted ALOHA Note: randomness (i.e. Poisson) is not valid for high traffic and if waiting time after retransmission is short Page 57
58 Throughput vs. Offered Traffic Analytical computation: Both, Pure ALOHA and Slotted ALOHA cannot achieve a high throughput But: simple principle, no coordination necessary between the stations Page 58
59 MAC Decentralized Protocols Variant of ALOHA for networks with small range exists Similar to ALOHA: no coordination of the stations But: each station which wants to send first examines whether already another station is sending If no sending takes place, the station begins to send (Carrier Sense Multiple Access, CSMA, see chapter 2.2) Note: this principle only works within networks having a short transmission delay using the principle within satellite systems is not possible because there would be no chance to know whether a conflict occurred before end of the transmission Advantages: simple, because no master station and no tokens are needed; nevertheless good utilization of the network capacity Disadvantage: no guaranteed medium access, a large delay up to beginning a transmission is possible Page 59
60 MAC Coordination by using a Token Introduction of a token (determined bit sequence) Only the holder of the token is allowed to send Token is cyclically passed on between all stations particularly suitable for ring topologies Token Ring (4/16/100 Mbit/s, see chapter 2.2) Characteristics: Guaranteed accesses, no collisions Very good utilization of the network capacity, high efficiency Fair, guaranteed response times Possible: multiple tokens But: complex and expensive Passing on of the token Page 60
Chapter 2: Computer Networks
Chapter 2: Computer Networks 2.1: Physical Layer: representation of digital signals 2.2: Data Link Layer: error protection and access control 2.3: Network infrastructure 2.4 2.5: Local Area Network examples
More informationPhysical-Layer Services and Systems
Physical-Layer Services and Systems Figure Transmission medium and physical layer Figure Classes of transmission media GUIDED MEDIA Guided media, which are those that provide a conduit from one device
More informationChapter 10 Error Detection and Correction 10.1
Data communication and networking fourth Edition by Behrouz A. Forouzan Chapter 10 Error Detection and Correction 10.1 Note Data can be corrupted during transmission. Some applications require that errors
More informationData and Computer Communications
Data and Computer Communications Error Detection Mohamed Khedr http://webmail.aast.edu/~khedr Syllabus Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12
More informationLecture 3 Data Link Layer - Digital Data Communication Techniques
DATA AND COMPUTER COMMUNICATIONS Lecture 3 Data Link Layer - Digital Data Communication Techniques Mei Yang Based on Lecture slides by William Stallings 1 ASYNCHRONOUS AND SYNCHRONOUS TRANSMISSION timing
More informationLecture 5 Transmission
Lecture 5 Transmission David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05 1 Physical and Datalink Layers: 3
More informationWireless Communications
3. Data Link Layer DIN/CTC/UEM 2018 Main Functions Handle transmission errors Adjust the data flow : Main Functions Split information into frames: Check if frames have arrived correctly Otherwise: Discard
More informationCSE 461: Bits and Bandwidth. Next Topic
CSE 461: Bits and Bandwidth Next Topic Focus: How do we send a message across a wire? The physical / link layers: 1. Different kinds of media 2. Encoding bits, messages 3. Model of a link Application Presentation
More informationDatacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction
Datacommunication I Lecture 3 signal encoding, error detection/correction Layers of the OSI-model repetition 1 The OSI-model and its networking devices repetition The OSI-model and its networking devices
More informationDigital Data Communication Techniques
Digital Data Communication Techniques Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 6-1 Overview
More informationLecture 5 Transmission. Physical and Datalink Layers: 3 Lectures
Lecture 5 Transmission Peter Steenkiste School of Computer Science Department of Electrical and Computer Engineering Carnegie Mellon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441
More informationWireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN)
Wireless Networks Why Wireless Networks? rate MBit/s 100.0 10.0 1.0 0.1 0.01 wired terminals WMAN WLAN CORDLESS (CT, DECT) Office Building stationary walking drive Indoor HIPERLAN UMTS CELLULAR (GSM) Outdoor
More informationDetecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson
Detecting and Correcting Bit Errors COS 463: Wireless Networks Lecture 8 Kyle Jamieson Bit errors on links Links in a network go through hostile environments Both wired, and wireless: Scattering Diffraction
More informationComputer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University
Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation
More informationLecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning
More informationDepartment of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.
Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name
More informationError Detection and Correction
. Error Detection and Companies, 27 CHAPTER Error Detection and Networks must be able to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee
More informationLayering and Controlling Errors
Layering and Controlling Errors Brad Karp (some slides contributed by Kyle Jamieson) UCL Computer Science CS 3035/GZ01 2 nd October 2014 Today s Agenda Layering Physical-layer encoding Link-layer framing
More informationModule 3: Physical Layer
Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud
More informationCSE 461 Bits and Links. David Wetherall
CSE 461 Bits and Links David Wetherall djw@cs.washington.edu Topic How do we send a message across a wire or wireless link? The physical/link layers: 1. Different kinds of media 2. Fundamental limits 3.
More informationSirindhorn International Institute of Technology Thammasat University
Name...ID... Section...Seat No... Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 1/2009 Course Title Instructor : ITS323 Introduction to Data Communications
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationCSEP 561 Bits and Links. David Wetherall
CSEP 561 Bits and Links David Wetherall djw@cs.washington.edu Topic How do we send a message across a wire or wireless link? The physical/link layers: 1. Different kinds of media 2. Fundamental limits
More informationDATA COMMUNICATION (CS601) FINAL TERM MEGA FILE
DATA COMMUNICATION (CS601) FINAL TERM MEGA FILE Question No: 1 representation of links that connect nodes is called as physical topology. geometrical logical physical Question No: 2 (Marks: 1 ) - Please
More informationThe Last Mile Problem
The Last Mile Problem LAN, MAN, WAN how to connect private users at home to such networks? Problem of the last mile: somehow connect private homes to the public Internet without laying many new cables
More informationWeek 2 Lecture 1. Introduction to Communication Networks. Review: Analog and digital communications
Week 2 Lecture 1 Introduction to Communication Networks Review: Analog and digital communications Topic: Internet Trend, Protocol, Transmission Principle Digital Communications is the foundation of Internet
More informationStructure of the Lecture
Structure of the Lecture Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Channels in a frequency band Static medium access methods Flexible medium access methods Chapter 3 Wireless
More informationCSE 123: Computer Networks Alex C. Snoeren. Project 1 out Today, due 10/26!
CSE 123: Computer Networks Alex C. Snoeren Project 1 out Today, due 10/26! Signaling Types of physical media Shannon s Law and Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI, etc.
More informationLecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Stefan Savage
Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Stefan Savage Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,
More informationBSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering. Cohorts: BCNS/17A/FT & BEE/16B/FT
BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering Cohorts: BCNS/17A/FT & BEE/16B/FT Examinations for 2016-2017 Semester 2 & 2017 Semester 1 Resit Examinations for BEE/12/FT
More informationMultiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access
More informationDepartment of Computer Science and Engineering. CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015
Department of Computer Science and Engineering CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015 Final Examination Instructions: Examination time: 180 min. Print your
More informationMULTIPLE CHOICE QUESTIONS
CHAPTER 7 2. Guided and unguided media 4. Twisted pair, coaxial, and fiber-optic cable 6. Coaxial cable can carry higher frequencies than twisted pair cable and is less sus-ceptible to noise. 8. a. The
More informationChapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationMedium Access Control
CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example
More informationPhysical Layer. Networked Systems 3 Lecture 5
Physical Layer Networked Systems 3 Lecture 5 Lecture Outline Physical layer concepts Wired links Unshielded twisted pair, coaxial cable, optical fibre Encoding data onto a wire Wireless links Carrier modulation
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More informationLecture 6: Reliable Transmission"
Lecture 6: Reliable Transmission" CSE 123: Computer Networks Alex C. Snoeren HW 2 out Wednesday! Lecture 6 Overview" Cyclic Remainder Check (CRC) Automatic Repeat Request (ARQ) Acknowledgements (ACKs)
More informationand coding (a.k.a. communication theory) Signals and functions Elementary operation of communication: send signal on
Fundamentals of information transmission and coding (a.k.a. communication theory) Signals and functions Elementary operation of communication: send signal on medium from point A to point B. media copper
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationMobile Computing. Chapter 3: Medium Access Control
Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More informationQUIZ : oversubscription
QUIZ : oversubscription A telco provider sells 5 Mpbs DSL service to 50 customers in a neighborhood. The DSLAM connects to the central office via one T3 and two T1 lines. What is the oversubscription factor?
More informationLecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren
Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Alex C. Snoeren Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,
More informationDigital to Digital Encoding
MODULATION AND ENCODING Data must be transformed into signals to send them from one place to another Conversion Schemes Digital-to-Digital Analog-to-Digital Digital-to-Analog Analog-to-Analog Digital to
More informationRECOMMENDATION ITU-R F (Question ITU-R 158/9) b) that it is desirable to specify the requirements of HF packet radio systems,
Rec. ITU-R F.764-1 1 RECOMMENDATION ITU-R F.764-1 MINIMUM REQUIREMENTS FOR HF RADIO SYSTEMS USING A PACKET TRANSMISSION PROTOCOL (Question ITU-R 158/9) (1992-1994) Rec. ITU-R F.764-1 The ITU Radiocommunication
More informationPhysical Layer. Networked Systems Architecture 3 Lecture 6
Physical Layer Networked Systems Architecture 3 Lecture 6 Lecture Outline Physical layer concepts Wired links Unshielded twisted pair, coaxial cable, optical fibre Encoding data onto a wire Wireless links
More informationWireless Transmission & Media Access
Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,
More informationROM/UDF CPU I/O I/O I/O RAM
DATA BUSSES INTRODUCTION The avionics systems on aircraft frequently contain general purpose computer components which perform certain processing functions, then relay this information to other systems.
More informationMultiple Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol
More informationComputer Networks
15-441 Computer Networks Physical Layer Professor Hui Zhang hzhang@cs.cmu.edu 1 Communication & Physical Medium There were communications before computers There were communication networks before computer
More informationCPSC Network Programming. How do computers really communicate?
CPSC 360 - Network Programming Data Transmission Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu February 11, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationMultiple Access System
Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationLecture Progression. Followed by more detail on: Quality of service, Security (VPN, SSL) Computer Networks 2
Physical Layer Lecture Progression Bottom-up through the layers: Application - HTTP, DNS, CDNs Transport - TCP, UDP Network - IP, NAT, BGP Link - Ethernet, 802.11 Physical - wires, fiber, wireless Followed
More informationFiber Distributed Data Interface
Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses
More informationTransmission Principles
Transmission Principles Serialization, Bit synchronization, Framing, Error Checking Physical Aspects of Transmission, Modem Agenda Introduction Bit synchronization asynchronous synchronous Frame synchronization
More informationRepresentation of Information. Transmission Principles. Agenda. Transmission of Information
Representation of Information information is stored, processed and exchanged by computer systems in binary form bit (binary digit) values or Transmission Principles Serialization, Bit synchronization,
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationMedia. Twisted pair db/km at 1MHz 2 km. Coaxial cable 7 db/km at 10 MHz 1 9 km. Optical fibre 0.2 db/km 100 km
Media Attenuation Repeater spacing Twisted pair 10-12 db/km at 1MHz 2 km Coaxial cable 7 db/km at 10 MHz 1 9 km Optical fibre 0.2 db/km 100 km conniq.com provides an excellent tutorial on physical media.
More informationCOMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES
COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES Encoding Coding is the process of embedding clocks into a given data stream and producing a signal that can be transmitted over a selected medium.
More informationEECS 122: Introduction to Computer Networks Encoding and Framing. Questions
EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationChapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA
Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationPhysical Layer. Transfers bits through signals overs links Wires etc. carry analog signals We want to send digital bits. Signal
Physical Layer Physical Layer Transfers bits through signals overs links Wires etc. carry analog signals We want to send digital bits 10110 10110 Signal CSE 461 University of Washington 2 Topics 1. Coding
More informationEncoding and Framing
Encoding and Framing EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Nov 2, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Questions
More informationLecture Progression. Followed by more detail on: Quality of service, Security (VPN, SSL) Computer Networks 2
Physical Layer Lecture Progression Bottom-up through the layers: Application - HTTP, DNS, CDNs Transport - TCP, UDP Network - IP, NAT, BGP Link - Ethernet, 802.11 Physical - wires, fiber, wireless Followed
More informationICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa
ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access
More informationEncoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal
Questions Encoding and Framing Why are some links faster than others? What limits the amount of information we can send on a link? How can we increase the capacity of a link? EECS 489 Computer Networks
More informationUNIT-1. Basic signal processing operations in digital communication
UNIT-1 Lecture-1 Basic signal processing operations in digital communication The three basic elements of every communication systems are Transmitter, Receiver and Channel. The Overall purpose of this system
More informationCSCI-1680 Physical Layer Rodrigo Fonseca
CSCI-1680 Physical Layer Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Signup for Snowcast milestone Make sure you signed up Make sure you are on
More informationMedium Access Schemes
Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource
More informationChapter-1: Introduction
Chapter-1: Introduction The purpose of a Communication System is to transport an information bearing signal from a source to a user destination via a communication channel. MODEL OF A COMMUNICATION SYSTEM
More informationBSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering
BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering Cohort: BCNS/16B/FT Examinations for 2016-2017 / Semester 1 Resit Examinations for BEE/12/FT MODULE: DATA COMMUNICATIONS
More informationChapter 4 Digital Transmission 4.1
Chapter 4 Digital Transmission 4.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4-1 DIGITAL-TO-DIGITAL CONVERSION In this section, we see how we can represent
More informationLast Time. Transferring Information. Today (& Tomorrow (& Tmrw)) Application Layer Example Protocols ftp http Performance.
15-441 Lecture 5 Last Time Physical Layer & Link Layer Basics Copyright Seth Goldstein, 2008 Application Layer Example Protocols ftp http Performance Application Presentation Session Transport Network
More informationOutline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC
Outline, Lecture 6 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Error Control Overview : n ARQ vs. FEC n Link vs. End-to-End : n Objectives n How Codes Work Code Examples: n Parity
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationCS601 Data Communication Solved Objective For Midterm Exam Preparation
CS601 Data Communication Solved Objective For Midterm Exam Preparation Question No: 1 Effective network mean that the network has fast delivery, timeliness and high bandwidth duplex transmission accurate
More information6.1 Multiple Access Communications
Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding
More informationChapter 3 Digital Transmission Fundamentals
Chapter 3 Digital Transmission Fundamentals Digital Representation of Information Why Digital Communications? Digital Representation of Analog Signals Characterization of Communication Channels Fundamental
More informationLecture 2: Links and Signaling"
Lecture 2: Links and Signaling" CSE 123: Computer Networks Alex C. Snoeren HW 1 out tomorrow, due next 10/9! Lecture 2 Overview" Signaling Types of physical media Shannon s Law and Nyquist Limit Encoding
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More informationOptical Fiber Communications p. 1 Introduction p. 1 History of Optical Fibers p. 1 Optical Fibers Versus Metallic Cable Facilities p.
Optical Fiber Communications p. 1 Introduction p. 1 History of Optical Fibers p. 1 Optical Fibers Versus Metallic Cable Facilities p. 2 Advantages of Optical Fiber Systems p. 3 Disadvantages of Optical
More informationClass 4 ((Communication and Computer Networks))
Class 4 ((Communication and Computer Networks)) Lesson 3... Transmission Media, Part 1 Abstract The successful transmission of data depends principally on two factors: the quality of the signal being transmitted
More informationThe Physical Layer Outline
The Physical Layer Outline Theoretical Basis for Data Communications Digital Modulation and Multiplexing Guided Transmission Media (copper and fiber) Public Switched Telephone Network and DSLbased Broadband
More informationDigiPoints Volume 1. Leader Guide. Module 6 Error Detection and Correction
Error Detection and Correction Page 6.i DigiPoints Volume 1 Module 6 Error Detection and Correction Summary This module describes typical errors that can exist in digital communications systems and describes
More informationCS601-Data Communication Latest Solved Mcqs from Midterm Papers
CS601-Data Communication Latest Solved Mcqs from Midterm Papers May 07,2011 Lectures 1-22 Moaaz Siddiq Latest Mcqs MIDTERM EXAMINATION Spring 2010 Question No: 1 ( Marks: 1 ) - Please choose one Effective
More informationCOSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B
MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of
More informationCSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued
CSCD 433 Network Programming Fall 2016 Lecture 5 Physical Layer Continued 1 Topics Definitions Analog Transmission of Digital Data Digital Transmission of Analog Data Multiplexing 2 Different Types of
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationCommunication Networks
Communication Networks Chapter 4 Transmission Technique Communication Networks: 4. Transmission Technique 133 Overview 1. Basic Model of a Transmission System 2. Signal Classes 3. Physical Medium 4. Coding
More informationSimple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.
18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/
More information16.36 Communication Systems Engineering
MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication
More informationChapter 2 Overview - 1 -
Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next
More informationBasic Communications Theory Chapter 2
TEMPEST Engineering and Hardware Design Dr. Bruce C. Gabrielson, NCE 1998 Basic Communications Theory Chapter 2 Communicating Information Communications occurs when information is transmitted or sent between
More informationComputer Networks - Xarxes de Computadors
Computer Networks - Xarxes de Computadors Outline Course Syllabus Unit 1: Introduction Unit 2. IP Networks Unit 3. Point to Point Protocols -TCP Unit 4. Local Area Networks, LANs 1 Outline Introduction
More informationKing Fahd University of Petroleum & Minerals Computer Engineering Dept
King Fahd University of Petroleum & Minerals Computer Engineering Dept COE 342 Data and Computer Communications Term 021 Dr. Ashraf S. Hasan Mahmoud Rm 22-144 Ext. 1724 Email: ashraf@ccse.kfupm.edu.sa
More informationNetwork Management System for Telecommunication and Internet Application
Network Management System for Telecommunication and Internet Application Gerd Bumiller GmbH Unterschlauersbacher-Hauptstr. 10, D-906 13 Groahabersdorf, Germany Phone: +49 9105 9960-51, Fax: +49 9105 9960-19,
More informationBSc (Hons) Computer Science with Network Security. Examinations for Semester 1
BSc (Hons) Computer Science with Network Security Cohort: BCNS/15B/FT Examinations for 2015-2016 Semester 1 MODULE: DATA COMMUNICATIONS MODULE CODE: CAN1101C Duration: 2 Hours Instructions to Candidates:
More information