Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Similar documents
Physical-Layer Services and Systems

Chapter 10 Error Detection and Correction 10.1

Data and Computer Communications

Lecture 6: Reliable Transmission"

Summary of Basic Concepts

Error Protection: Detection and Correction

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Wireless Transmission & Media Access

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Mobile Communications

Error Detection and Correction

DOPPLER SHIFT. Thus, the frequency of the received signal is

Wireless Communications

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction

BSc (Hons) Computer Science with Network Security. Examinations for Semester 1

Layering and Controlling Errors

Digital to Digital Encoding

A Novel Approach for Error Detection Using Additive Redundancy Check

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lecture 3 Data Link Layer - Digital Data Communication Techniques

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Medium Access Control

MULTIPLE CHOICE QUESTIONS

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

DATA COMMUNICATION (CS601) FINAL TERM MEGA FILE

Module 3: Physical Layer

HY448 Sample Problems

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

Chapter 1 Acknowledgment:

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

and coding (a.k.a. communication theory) Signals and functions Elementary operation of communication: send signal on

ROM/UDF CPU I/O I/O I/O RAM

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

Multiplexing Module W.tra.2

OSI Reference Model. Application Layer. Presentation Layer. Session Layer. Chapter 4: Application Protocols. Transport Layer.

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

Mohammad Hossein Manshaei 1393

BSc (Hons) Computer Science with Network Security BEng (Hons) Electronic Engineering

Encoding and Framing

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal

Fundament Fundamen als t of Communications

Lecture 5 Transmission. Physical and Datalink Layers: 3 Lectures

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

Digital Data Communication Techniques

BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering. Cohorts: BCNS/17A/FT & BEE/16B/FT

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Medium Access Methods. Lecture 9

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Department of Electronics & Telecommunication Engg. LAB MANUAL. B.Tech V Semester [ ] (Branch: ETE)

DigiPoints Volume 1. Student Workbook. Module 6 Error Detection and Correction

Wireless Communication in Embedded System. Prof. Prabhat Ranjan

Lecture 5 Transmission

Wireless Intro : Computer Networking. Wireless Challenges. Overview

UNIT-1. Basic signal processing operations in digital communication

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Wireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN)

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction

RECOMMENDATION ITU-R BS

Signal Characteristics

GSM and Similar Architectures Lesson 08 GSM Traffic and Control Data Channels

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Computer Networks - Xarxes de Computadors

PRINCIPLES OF COMMUNICATION SYSTEMS. Lecture 1- Introduction Elements, Modulation, Demodulation, Frequency Spectrum

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Chapter 10 Error Detection and Correction

CSCI-1680 Physical Layer Rodrigo Fonseca

The ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1.

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

Error Correction with Hamming Codes

16.36 Communication Systems Engineering

Signal Encoding Criteria

Revision of Lecture Eleven

Basic Concepts in Data Transmission

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2

Physical Layer: Outline

b. When transmitting a message through a transmission medium, the equipment which receives the message should first find out whether it has received

MODULE IV. End Sem. Exam Marks. Syllabus

Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications

Energy Consumption of an Internal CRC Module in a Microcontroller

Outline / Wireless Networks and Applications Lecture 3: Physical Layer Signals, Modulation, Multiplexing. Cartoon View 1 A Wave of Energy

Chapter-1: Introduction

AHA Application Note. Primer: Reed-Solomon Error Correction Codes (ECC)

Mobile Computing. Chapter 3: Medium Access Control

ITM 1010 Computer and Communication Technologies

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

The quality of the transmission signal The characteristics of the transmission medium. Some type of transmission medium is required for transmission:

Transcription:

Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University

Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation l Multiple devices sharing a single, limited medium: collision handling and multiplexing l Concepts of error detection and correction 2

Amplitude l Amplitude is the height of a wave, which can be voltage, current, or field intensity l In telecommunications, amplitude is usually measured as the average wave height l Amplitude modulation (AM) in radio signals is used, for example, in AM broadcast radio the amplitude of a fixed-frequency carrier wave is modulated (changed) by the signal being sent l Optical signals are usually sent using amplitude modulation

Frequency l Frequency is the number of waves per given time interval l Alternatively, the inverse is used the distance between waves, or wavelength l Frequency modulation (FM) in radio signals is used, for example, in FM broadcast radio The frequency of a fixed-amplitude carrier is modulated by the signal being sent

Signal Degradation l Degradation means a signal s quality is reduced as it moves through a medium l Over distance, the signal strength is reduced, which is called attenuation when a signal is attenuated too much relative to noise, it is no longer reliable: it has degraded l Occlusion (or obstruction) means a physical object is blocking a signal l Interference happens when nearby signals become mixed together, corrupting the signal

Multiplexing l Multiplexing means sending two or more signals through a single channel l Signals are encoded by analog or digital means before being transmitted l At the receiver, the signals must be decoded l One kind of multiplexing sends signals using different frequencies l Another kind breaks a signal into small parts, and sends different parts at different times parts from different signals are interleaved

Collisions l A collision happens when two or more devices attempt to use a single channel at the same time l When a collision happens, both devices are usually unable to transmit l Media Access Control (MAC), in the Data Link Layer, performs the task of handling collisions and allowing multiple devices to share a limited medium

CSMA/CD l Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is one solution for handling collisions, used on Ethernet l When a device attempts to send a frame, it listens for a collision l If there is a collision, the device waits for a pseudo-random time before attempting to resend the frame l After a certain number of failed attempts, the device gives up, and the transmission fails

CSMA/CD l Very abbreviated flowchart for CSMA/CD Start Backoff routine: Wait a pseudorandom period of microseconds true Transmit if idle Collision detected true Attempts <16 false false The method used to detect depends on the physical and data-link layer implementation Transmission success Too many collisions

CSMA/CA l Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) can be used to solve the collision problem l Before transmitting, a device listens and waits if the medium is busy l The sender may request a period of time to send, with a Request to Send (RTS) packet l A central controller device acknowledges the request with a Clear to Send (CTS) packet, giving the sender permission to transmit

CSMA/CA with RTS/CTS l Very abbreviated flowchart for IEEE 802.11 Start Backoff routine: Wait a pseudorandom period of microseconds false Transmit RTS if idle CTS received? Both CSMA/CD and CSMA/CA enter a backoff or wait routine if another device is already transmitting true Transmit frame Transmission success

Error Detection and Correction l Because digital data is discrete, it can be checked and even corrected l The correct value is determined by the transmitting party l The simplest form of correction is simple redundancy but that is not very efficient l Error detection and correction is handled in the Data Link layer at the bit level, and at the Transport layer for whole packets

Parity Bits l One simple way of checking data in a signal is to count the number of bits l The sender must have some way of telling the correct number of 1 bits and 0 bits l One parity bit per byte (or word) can check for errors, but not correct them l Multiple parity bits can be used redundantly to allow error correction

Block Parity Example (Message, Part 1) 1 1 0 0 1 1 0 1 1 0 1 0 1 1 0 0 0 0 0 1 1 0 0 0 0 1 1 0 1 1 1 0 0 0 0 1 0 1 1 1 0 0 0 0 1 0 1 1 1 1 0 0 1 1 0 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0 0

Block Parity Example (Message, Part 2) 1 0 0 0 0 1 0 0 0 0 1 1 0 1 0 0 1 0 0 1 1 1 0 0 1 0 0 0 1 1 1 0 1 0 0 0 0 1 1 0 1 0 0 0 1 0 1 1 0 1 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 1 1 1 0 0 1 1

Checksums l A checksum performs arithmetic on the values of digits or bits transmitted and adds the result to the data sent l Examples of checksums are all around you l UPC checksums are based on multiplying every other digit by 3 and adding the result (UPC bar codes also have parity) l ISBN 10 codes have checksum values of 0 to 10 (where 10 is represented by the digit X) Note: ISBN 13 has a different checksum formula

ISBN 10 example l ISBN 4-563-01399-4 l 4*1 + 5*2 + 6*3 + 3*4 + 0*5 + 1*6 + 3*7 + 9*8 + 9*9 = l 4 + 10 + 18 + 12 + 0 + 6 + 21 + 72 + 81 = l 224 l 224 % 11 = 4

Transport Layer Checksums l Internet Checksum simply uses addition on each set of 16 bits (as an unsigned integer) and the final checksum is the one s complement l Cyclic Redundancy Check (CRC) is one type of checksum used in the Transport Layer l CRC uses simple XOR, multiplication, and division operations on each set of bits to encode and decode the data while checking for errors l A parity bit is an example of a single-bit CRC l CRC encoding does not make the data encrypted or secret; it is only for detecting errors

Cyclic Redundancy Check l Transmitter performs polynomial division to calculate an N-bit remainder (the CRC), which is appended to the data l When the same division is performed by the receiver (with CRC attached) the remainder will be zero if the data contains no errors l Division performed by exclusive-or between input and N+1-bit divisor, with MSbit set l Divisor shifted right so dividend and divisor MSbits are aligned l When dividend is zero, remainder is CRC

Cyclic Redundancy Check transmit 1 0 0 1 1 C R C divisor 1 1 0 1 1 0 0 1 divisor 1 1 0 1 1 0 0 divisor 1 1 0 1 1 0 1 0 divisor 1 1 0 1 1 1 1 divisor 1 1 0 1 remainder 0 1 1 receive 1 0 0 1 1 0 1 1 divisor 1 1 0 1 1 0 0 1 0 1 1 divisor 1 1 0 1 0 1 1 1 0 0 0 1 1 divisor 1 1 0 1 1 1 1 0 1 1 1 divisor 1 1 0 1 1 1 1 0 1 divisor 1 1 0 1 remainder OK 0 0 0

Hamming Distance l Hamming Distance is a form of error correction using special encoding to send values that are very different from each other l If one byte or word is wrong, the distance to the nearest correct byte or word in the set is the most probable value l The difference between data sent and expected data is known as the Hamming distance

Hamming Code l Is a way to mix parity and data bits to correct single-bit errors l Bits are numbered from 1 and each powerof-2 bit position becomes a parity bit for all bits whose binary number has that bit set l The sum of the bit numbers of any incorrect parity bit(s) identifies an incorrect bit Bit number 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Coded data p1 p2 d1 p4 d2 d3 d4 p8 d5 d6 d7 d8 d9 d10 d11 p16 d12 d13 d14 d15 bits p1 x x x x x x x x x x Parity Bit coverage p2 x x x x x x x x x x p3 x x x x x x x x x p4 x x x x x x x x p5 x x x x x

Conclusions l Signals are sent using basic principles of electromagnetic waves: amplitude and frequency l Media Access Control (MAC) allows several devices to share a medium that is limited to one signal at a time l Multiplexing allows many signals to be sent over a limited number of lines or channels l Errors must be detected and corrected using parity, checksums, or encoding methods such as Hamming Distance