Untitled
42 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In a Stop-and-Wait ARQ system, what action does the sender take upon the expiration of its timer after sending a data frame?

  • Aborts the connection assuming the receiver is no longer available.
  • Increments the sequence number and sends the next data frame.
  • Sends a request for the receiver's current window size.
  • Re-transmits the last data frame and restarts the timer. (correct)

A receiver in a Go-Back-N ARQ system detects an error in a frame. What is the immediate action taken by the receiver?

  • Corrects the error using forward error correction (FEC) and sends an ACK to the sender.
  • Sends a selective ACK for the correctly received frames after the error.
  • Discards the frame and all subsequent frames until a correct frame is received, then requests re-transmission starting from the bad frame.
  • Sends a NAK (Negative Acknowledgement) to the sender indicating the frame was received in error. (correct)

What is the primary difference in error recovery between Go-Back-N ARQ and Selective Repeat ARQ?

  • Go-Back-N ARQ uses cumulative acknowledgements, whereas Selective Repeat ARQ uses individual acknowledgements for each frame.
  • Go-Back-N ARQ re-transmits all frames from the point of error, whereas Selective Repeat ARQ only re-transmits the frames that were received in error. (correct)
  • Go-Back-N ARQ discards frames received out of order, whereas Selective Repeat ARQ buffers out-of-order frames.
  • Go-Back-N ARQ re-transmits only the frame in error, whereas Selective Repeat ARQ re-transmits all frames.

In which Automatic Repeat Request (ARQ) protocol does the sender retransmit only the frame that was negatively acknowledged (NAK)?

<p>Selective Repeat ARQ (C)</p> Signup and view all the answers

Which of the following is a disadvantage of using Selective Repeat ARQ compared to Go-Back-N ARQ?

<p>More complex implementation due to buffering and reordering requirements. (B)</p> Signup and view all the answers

In the context of error correction, what is the primary purpose of adding redundant bits (r1, r2, r4, r8, etc.) to the original data?

<p>To detect and correct errors that may occur during transmission. (D)</p> Signup and view all the answers

Using the provided example, which bit positions are designated as check bits (redundant bits) within the transmitted code?

<p>Positions 1, 2, 4, and 8. (D)</p> Signup and view all the answers

If a single-bit error occurs during the transmission of the code 10011100101 and the received code is 10011100001, how would the error correction mechanism use the check bits to identify the location of the error?

<p>By recalculating the parity bits based on the received data and comparing them to the original parity bits. (B)</p> Signup and view all the answers

What is the role of the Medium Access Control (MAC) sublayer in the data link layer?

<p>To manage access to the communication channel. (B)</p> Signup and view all the answers

In the context of the Stop-and-Wait protocol, what does the variable 'a' represent in the utilization formula?

<p>The ratio of propagation time to frame transmission time. (B)</p> Signup and view all the answers

How do the Logical Link Control (LLC) and Medium Access Control (MAC) sublayers work together within the Data Link Layer to facilitate data transmission?

<p>The LLC sublayer provides addressing and control of the data link, while the MAC sublayer manages access to the physical medium. (B)</p> Signup and view all the answers

What is the impact on utilization when the propagation time is significantly greater than the transmission time (a > 1) in Stop-and-Wait protocol?

<p>Utilization decreases, as the sender spends more time waiting for acknowledgements. (B)</p> Signup and view all the answers

In the Stop-and-Wait protocol, what is the primary purpose of Station S2 sending an ACK?

<p>To acknowledge successful receipt of a frame from Station S1. (C)</p> Signup and view all the answers

In the Stop-and-Wait protocol, what is the total time elapsed for one complete cycle of sending a frame and receiving its acknowledgement, assuming transmission time is normalized to 1?

<p>$1 + 2a$ (C)</p> Signup and view all the answers

Which layer of the TCP/IP model is primarily associated with the Stop-and-Wait protocol for flow control?

<p>Data Link Layer (C)</p> Signup and view all the answers

Which layer of the TCP/IP model does the Stop-and-Wait protocol primarily operate within, according to the provided information?

<p>Data Link Layer (C)</p> Signup and view all the answers

In the formula $T = n * T_F$ for the Stop-and-Wait protocol, what does 'n' represent?

<p>The number of frames sent. (C)</p> Signup and view all the answers

What happens to the utilization of the Stop-and-Wait protocol as the frame size decreases relative to the link length, assuming other factors remain constant?

<p>The utilization decreases because the propagation time becomes more significant compared to the transmission time. (D)</p> Signup and view all the answers

Given $T_F = t_{prop} + t_{frame} + t_{proc} + t_{prop} + t_{ack} + t_{proc}$, and assuming $t_{proc}$ and $t_{ack}$ are negligible, which factor has the most significant impact on $T_F$ if the frame size is substantially increased?

<p>$t_{frame}$ (A)</p> Signup and view all the answers

What is the primary function of the Medium Access Control (MAC) sublayer within the context of the Data Link Layer?

<p>Determining which device has access to the transmission medium at any given time. (A)</p> Signup and view all the answers

In the context of the Stop-and-Wait protocol, what is the primary consequence of a high overhead (i.e., the non-data transmission portion of the total time)?

<p>Reduced channel utilization. (B)</p> Signup and view all the answers

When analyzing the efficiency of the Stop-and-Wait protocol, under what conditions would the propagation time ($t_{prop}$) have a more significant impact on the total time (T) than the frame transmission time ($t_{frame}$)?

<p>When transmitting very small frames over long distances. (C)</p> Signup and view all the answers

If the transmission time of a frame is 20ms and the propagation time is 50ms, what is the utilization of the Stop-and-Wait protocol?

<p>20% (A)</p> Signup and view all the answers

Consider a scenario where the frame transmission time is doubled, while the propagation time remains constant. How does this change affect the utilization of the Stop-and-Wait protocol?

<p>Utilization increases. (D)</p> Signup and view all the answers

Consider a scenario where the frame transmission time ($t_{frame}$) is 5ms and the propagation time ($t_{prop}$) is 20ms. Using the simplified formula $T = n * (2 * t_{prop} + t_{frame})$, what is the total time (T) to send 10 frames?

<p>500 ms (D)</p> Signup and view all the answers

In a modified Stop-and-Wait protocol, if Station S1 begins transmitting frame $F_n$ at time $t_0$ and does not receive an ACK after a timeout period, what action should Station S1 take?

<p>Assume the ACK was lost and retransmit frame $F_n$. (A)</p> Signup and view all the answers

In CRC error detection, if the remainder after XORing the divisor with the relevant bits is non-zero, what does this indicate?

<p>An error is detected in the received dataword. (B)</p> Signup and view all the answers

Which layer(s) of the OSI model most commonly utilize the checksum error detection method, according to the provided information?

<p>Network and Transport layer (A)</p> Signup and view all the answers

What is the primary function of the '1's complement arithmetic' step in the checksum generator?

<p>To ensure that the total sum is 'n' bits long. (D)</p> Signup and view all the answers

In the checksum method, what is the purpose of complementing the total sum before appending it to the original data?

<p>To provide an easy way to detect errors in transmission. (A)</p> Signup and view all the answers

In CRC, what is the combined with the remainder and the dataword to generate the next remainder?

<p>Previous remainder and the next bit from the augmented dataword. (D)</p> Signup and view all the answers

What is the key difference between Checksum and CRC regarding which layer they are applied to?

<p>Checksum is applied to the Network and Transport layer, while CRC is applied to the Data-link layer. (A)</p> Signup and view all the answers

What is the initial step performed by both the checksum generator at the sender side and the checksum checker at the receiver side?

<p>Subdivision of the data unit into equal segments of 'n' bits. (C)</p> Signup and view all the answers

Which of the following is NOT part of the process at the Checksum Generator side?

<p>Comparing the calculated checksumwith the received checksum (B)</p> Signup and view all the answers

What is the primary purpose of error-correcting codes in data transmission?

<p>To automatically identify and fix transmission errors. (C)</p> Signup and view all the answers

Why do error-correcting codes generally require more redundancy bits compared to error-detecting codes?

<p>To provide the necessary information to locate and correct errors, not just detect them. (A)</p> Signup and view all the answers

In the context of single-bit error correction for an ASCII character (7 data bits), what is the minimum number of redundancy bits needed to identify the location of a single-bit error?

<p>3 bits (D)</p> Signup and view all the answers

If a transmittable unit has m data bits and r redundancy bits, which inequality must be satisfied to ensure single-bit error correction?

<p>$2^r \geq m + r + 1$ (B)</p> Signup and view all the answers

For a transmittable unit with 7 data bits, what is the smallest number of redundancy bits required for single-bit error correction, according to the formula $2^r \geq m + r + 1$?

<p>4 (B)</p> Signup and view all the answers

Which of the following is a characteristic of the Hamming code?

<p>It relies on the relationship between data and redundancy bits. (C)</p> Signup and view all the answers

How does increasing the number of redundancy bits affect error correction capabilities and bandwidth usage?

<p>Enhances error correction but also reduces the effective bandwidth. (B)</p> Signup and view all the answers

What scenario necessitates additional redundancy bits beyond those required for correcting errors in the data bits themselves?

<p>When errors occur in the redundancy bits themselves. (C)</p> Signup and view all the answers

Flashcards

Stop-and-Wait Protocol

A data link layer protocol where the sender sends one frame and waits for an acknowledgment (ACK) before sending the next.

Fn

A specific frame number sent by Station S1.

ACK

A signal sent by Station S2 to confirm that the frame 'Fn' was received correctly.

Logical Link Control (LLC)

The upper sublayer of the data link layer, responsible for addressing and multiplexing.

Signup and view all the flashcards

Flow Control

A network protocol that controls the transmission rate between two nodes to prevent overwhelming the receiver.

Signup and view all the flashcards

Medium Access Control (MAC)

The sublayer of the data link layer that controls access to the physical medium.

Signup and view all the flashcards

t_prop

The time it takes for a signal to travel from the sender to the receiver.

Signup and view all the flashcards

t_frame

The time it takes for the transmitter to send out all the bits of the frame.

Signup and view all the flashcards

Utilization

Ratio of time sending data to total time for one cycle (send, propagate, acknowledge).

Signup and view all the flashcards

Transmission Time (t_frame)

Time for the sender to transmit the entire frame, assuming a transmission rate R and frame size L.

Signup and view all the flashcards

Propagation Time (t_prop)

Time for a signal to travel from sender to receiver, dependent on distance (d) and propagation speed (V).

Signup and view all the flashcards

'a' in Utilization Formula

Ratio of propagation time to transmission time; crucial for understanding channel efficiency.

Signup and view all the flashcards

Error Control

Mechanisms to detect and correct errors that occur during data transmission.

Signup and view all the flashcards

Stop-and-Wait ARQ

A simple ARQ protocol where the sender sends one frame and waits for an acknowledgment (ACK) or negative acknowledgment (NAK) before sending the next.

Signup and view all the flashcards

Sliding Window ARQ

ARQ protocols that allow the sender to transmit multiple frames before receiving acknowledgments, using a 'window' to manage outstanding frames.

Signup and view all the flashcards

Go-Back-N

A sliding window ARQ protocol where the sender retransmits all frames starting from the damaged or lost frame upon receiving a NAK or timeout.

Signup and view all the flashcards

Selective Repeat

A sliding window ARQ protocol where only the damaged or lost frames are retransmitted, improving efficiency.

Signup and view all the flashcards

Checksum

An error-detecting technique applicable to messages of any length, commonly used in Network and Transport layers.

Signup and view all the flashcards

Checksum Generation

Divides data into equal 'n' bit segments, sums them using 1's complement arithmetic, and complements the total to create a checksum.

Signup and view all the flashcards

Checksum Field

The extra bits added to original data which are calculated and appended by the checksum generator

Signup and view all the flashcards

Checksum Checker

Divides the received data unit into equal segments of ‘n’ bits, similar to the sender's process.

Signup and view all the flashcards

CRC Process

The remainder and the next bit from the augmented dataword are XORed with the divisor to create the next remainder.

Signup and view all the flashcards

Error Detection Methods

Techniques, such as VRC, LRC, Checksum, and CRC, used to identify errors in transmitted data.

Signup and view all the flashcards

Segment Addition

A method where the data unit is divided into segments, and these segments are added together.

Signup and view all the flashcards

One's Complement Arithmetic

A number representation system similar to two's complement, but without considering overflow.

Signup and view all the flashcards

Single-Bit Error Correction

Technique used in the Data Link Layer to identify and correct a single bit error that may occur during data transmission.

Signup and view all the flashcards

Original Data (m)

Original data before error correction encoding is applied.

Signup and view all the flashcards

Redundancy bits (r)

Extra bits added to the original data for error detection and correction.

Signup and view all the flashcards

Error-Correcting Code

A code that automatically corrects certain errors upon receipt, using redundancy bits.

Signup and view all the flashcards

VRC (Vertical Redundancy Check)

Detects but does not correct single-bit errors in a received frame.

Signup and view all the flashcards

Single-Bit Error Correction: Redundancy Requirement

Requires enough redundancy bits to represent all possible error locations (including no error).

Signup and view all the flashcards

Error Correction: Bit State Equation

The number of redundancy bits ('r') must be able to indicate at least (m + r + 1) different states, where 'm' is the number of data bits.

Signup and view all the flashcards

Error Correction: Example Equation

If 'm' is 7, the smallest 'r' value that satisfies 2^r >= m + r + 1 is 4.

Signup and view all the flashcards

Hamming Code

An error-correction code used for data units of any length, based on relationships between data and redundancy bits.

Signup and view all the flashcards

Hamming Code: Redundancy Condition

States that 2^r must be greater than or equal to m + r + 1, where 'm' is the number of data bits and 'r' is the number of redundancy bits.

Signup and view all the flashcards

Study Notes

Computer Networks (CSC305)

Course Outline

  • Overview of Data Communication and Networking
  • Physical Layer
  • Data Link Layer
    • Logical Link Control (LLC)
    • Medium Access Control (MAC)
  • Network Layer
  • Transport Layer
  • Application Layer

OSI Reference Model

  • The Open Systems Interconnection (OSI) model describes how data moves between network applications through a series of layers.
  • Media layers consist of Physical, Data Link and Network.
  • Host layers consist of Transport, Session, Presentation and Application.

OSI Layers and Functions

  • Application Layer:
    • Enables network processes to access applications.
    • Supports user-end APIs, resource sharing, and remote file access.
    • Data type: Data.
  • Presentation Layer:
    • Translates data, handles character encoding, encryption/decryption, and data compression.
    • Data type: Data.
  • Session Layer:
    • Establishes, maintains, and gracefully shuts down sessions.
    • Data type: Data.
  • Transport Layer:
    • Provides reliable end-to-end communication.
    • Handles segmentation, flow control, acknowledgement, and multiplexing.
    • Data type: Segment.
  • Network Layer:
    • Determines path, provides logical addressing, routing, and traffic control.
    • Data type: Packet.
  • Data Link Layer:
    • Ensures reliable node-to-node transmission of frames.
    • Uses MAC and LLC sublayers
    • Provides physical addressing.
    • Data type: Frames.
  • Physical Layer:
    • Transmits/receives binary bit streams over a physical medium.
    • Handles encoding/decoding at bit level.
    • Data type: Bits.
  • The data link layer is responsible for node-to-node communication.
  • Source hosts' data-link layer only encapsulates data.
  • Destination hosts' data-link layer only de-capsulates data.
  • Intermediate nodes must both encapsulate and de-capsulate data.
  • Packet encapsulation comprises adding a header (H2) before the data packet.
  • Packet de-capsulation comprises removal of the encapsulation/header (H2) after the data extraction.
  • Logical Link Control (LLC) and Media Access Control (MAC) are sub-layers
  • Deals with procedures for communication between two adjacent nodes, regardless of whether the link is dedicated or broadcast.

Framing

  • Separates messages from source to destination with sender and receiver addresses.

LLC Framing Considerations

  • Framing is used by the data-link layer to pack bits into frames, ensuring each frame is distinguishable from another.
  • The physical layer provides bit synchronization to ensure the sender and receiver use the same bit durations and timing.
  • Framing separates a message from source to destination by adding a sender address and a destination address.
  • Framing too large would make flow and error control inefficient with single-bit errors requiring retransmission of whole frame.
  • Frames can be of fixed or variable size.
    • Fixed-size framing eliminates the need to define frame boundaries.
    • Variable-size framing requires a way to define the end of one frame and the beginning of the next.
  • A frame is composed of four fields:
  • Kind indicates whether the frame contains data or control information.
  • Seq indicates the sequence number of the frame.
  • Ack indicates the acknowledgement of a frame.
  • Info is used only in case of data frame and contains a single packet.
  • The packet from the network layer is passed to the data link layer for the inclusion in to 'info' field of an outgoing frame.
  • When the frame arrives at the destination, the data link layer extracts the packet from the frame and passes the packet to the network layer.

Framing Byte Count

  • Involves using a field in the header to specify the number of characters in the frame.
  • The receiving data link layer determines how many characters to expect following the header based on the count.
  • Character count can be corrupted by a transmission error, so this method is rarely used.

Framing Character or Byte Stuffing

  • Gets around resynchronization problems through the start and the end of each frame with special bytes.
  • To separate one frame from the next, an 8-bit (1-byte) FLAG is added to the beginning and the end of a frame.
  • If the receiver ever loses synchronization, it can just search for the FLAG byte to find the end of the current frame.
  • Two consecutive FLAG bytes indicate the end of one frame and start of the next one.
  • If the FLAG bytes bit pattern may occur in the text, a special byte (ESC) might be stuffed into the data (byte-stuffing).
  • A character or byte-stuffing strategy was added to character-oriented framing A
  • To prevent the FLAG byte pattern from being misinterpreted when it occurs within the data, an escape byte (ESC) is inserted before it.
  • When the receiver encounters the ESC character, it removes it from the data section and treats the next character as data, not as a delimiting flag.

Framing Bit Stuffing

  • The byte-stuffing framing is closely tied to the use of 8-bit characters (only ASCII).
  • Each frame begins and ends with a special bit pattern called a flag (01111110).
  • Whenever the sender's data link layer encounters five consecutive 1s in the data, it automatically stuffs a 0 bit into the outgoing bit stream, this is called BIT STUFFING.
  • When the receiver sees five consecutive incoming 1 bits, followed by a 0 bit, it automatically de-stuffs the 0 bit.

Framing Physical Layer Coding Violations

  • Applicable to networks in which the encoding on the physical medium contains some redundancy.
  • Some LANs encode 1 bit of data by using 2 physical bits.
  • A 1 bit is represented as a high-low pair
  • A 0 bit is represented as a low-high pair.
  • Combinations high-high and low-low are unused data combinations.

Flow Control

  • Flow Control involves a set of procedures to tell the sender how much data it can transmit before it must wait for an acknowledgement from the receiver.
  • Receiving device needs to inform the sending device before limits are to request sending device send fewer frames or stop temportarily.
  • Receiving devices have limited speeds of processing data.

Stop-and-Wait protocol

  • Sender waits for acknowledgements after every frame it sends.
  • Next frame is sent when an acknowledgement is received for the previously sent frame.
  • Each frame is checked and acknowledged, and the protocol is simple: this protocol is slow/inefficient
  • Maximum utilization of the Stop-and-Wait protocol is defined by the following formula: U = n * tframe / n* (2 * tprop+tframe)
  • U = 1 / 1+2a
  • where a= (Rd) / (VL)
  • "R" is referring to data rate or bits per second
  • "d" is referring to distance of link such as KMs or meters
  • "V" is referring to Velocity of Propagation which "V" is 3 multiplied 10 to the power of 8 meters per second in air or space which is 0.67 times speed of light in cable
  • "L" is referring to Length of the frame in the network
  • U = 1/ 1+ 2a , Frame Size > Link Length Propagation Time < Transmission Time
  • U = 1/ 1+ 2a , Frame Size < Link Length ,Propagation Time > Transmission Time

Sliding Window Protocol

  • Supports transmitting data in both directions (Full Duplex).
  • Two separate communication channels can be used, but the bandwidth of the reverse channel would almost be entirely wasted.
  • The user will pay for two circuits but will use only the capacity of one.
  • Uses the same circuit for data in both directions.
    • Data frames from A to B will inter-mixed with the ACK frames from A to B, where 'kind' field of the header will tell receiver about the type of frame arrived.
  • The ACK gets a free ride on the next outgoing data frame, this is called PIGGYBACKING: this is a better use of the available channel bandwidth.
  • Introduces an identification scheme based on window size to keep track of which frames are transmitted and received.
  • The frames are numbered modulo-n, so that the frames numbered from 0 to n-1.
  • When the receiver sends an ACK, it includes the number of the next frame it expects to receive.
  • The sender can transmit several frames before needing an ACK by using a single ACK to confirm the receipt of multiple data frames.
  • Frames may be acknowledged at any point without waiting for the window but transmitted as long as window not full.
  • One Bit Sliding Window protocol is protocol stop and wait with maximum window size of 1, and the sender since the sender transmits a frame and waits for its acknowledgement before sending the next one.

Error Control

  • Technology at the physical layer is not always reliable, therefore need to prevent delivering corrupted packets to the network layer.
  • Error control refers primarily to methods of Error Detection and Retransmission.
  • Reliable delivery of frames needs feedback from the receiver.
  • Receivers send special control frames bearing acknowledgements.
    • Acknowledgements can be positive (ACK) or negative (NAK).
  • Senders start a timer when transmitting a frame, set to go off after a duration in which to reach the receiver/ be processed/ have the ACK propagate.
  • Anytime an error is detected in an exchange, a negative acknowledgement (NAK) is returned and the specified frames are re-transmitted, the process is called AUTOMATIC REPEAT REQUEST (ARQ).

Stop-and-Wait ARQ

  • Extends stop-and-wait flow control to included re-transmission of data in case of lost or damaged frames.
  • Sending devices keep a copy of the last frame transmitted while waiting for an ACK.
  • Data frames and ACK frames are numbered alternately 0 or 1 for identification.
  • NAK frames are returned upon receipt of a corrupted frame at the receiver end, they are unnumbered.
  • Sending devices are equipped with a timer.
    • If an expected ACK is not received within an allotted time period, the sender assumes that the last data frame was lost in transit and sends it again.

Sliding Window ARQ

  • Three features are added to the basic Sliding Window flow control mechanism:
    • The sending device keeps copies of all transmitted frames until they have been acknowledged.
    • Both ACK and NAK frames must be numbered for identification.
  • Data frames received error-free do not need to be acknowledged individually, however, every damaged frame must be acknowledged immediately.
    • The sending device is also equipped with a timer to handle lost acknowledgements (ACK/NAK).
  • In the cases of a time overrun with no ACK received
    • the sender assumes that the frames were not received and therefore retransmits one or all of the frames depending on the protocol.

Go-Back-N ARQ

  • If one frame is lost or damaged, all frames sent since the last frame acknowledged are retransmitted.
  • Receiving device stops accepting subsequent frames until damaged frame is resolved.
  • NAK# means frame # was damaged or missing and on receiving, sender re-transmits all starting at #.

Selective-Repeat ARQ

  • If a frame is corrupted in transit, a NAK is returned and the frame is resent out of sequence.
  • One lost, only the specific /lost frame can be retransmitted.
  • Receiving device is able to sort frames and insert the retransmitted frame into its proper sequence.
  • Sending devices have searching mechanisms to select only frame for retransmission.
  • Must keep all previously received frames with the aid of receiver buffer.
  • the ACK number will be the FRAME RECEIVED, instead of the next frame expected.
  • Sliding window size should be half sender window size.

Error Detection and Correction

  • Reliable systems must have a mechanism for DETECTING and CORRECTING ERRORS.
  • Electromagnetic signals are subject to unpredictable inference which can change change in the shape of timining of the signal
  • Error detection and correction can be implemented at either the data link or transport layer.
  • Data can be corrupted during transmission.
  • **

Types of Errors

  • Single-Bit Error: Only one bit of the unit was corrupted. It happens mostly in parallel transmission due to one noisy wire..
  • Burst Error: Two/more bits are corrupted in a frame More likely to happen in serial transmission because a noise will affect a set of bits.

Error Detection

  • The central concept to detect errors is REDUNDANCY or extra bits
  • Transmit data unit twice: - If there is discrepancy between data when compared, there is an error in transfer - Accurate but very slow. Extra bits are redundant and discarded when transmission is determined to be successful
  • Detection Method is Block Coding

Redundancy Checks

  • VRC (Vertical Redundancy Check)
    • Mechanism Appends one bit to the smallest unit possible
      • Add 1 bit such that total number of 1s add to even.
  • Other name, that the Redundant bit (parity bit) that is added to check even parity or to VRC
  • Can detect all single-bit errors.
  • Can detect when there is an even number or bits changed
    
  • LRC (Longitudinal Redundancy Check) - Organize bits in table format - Create a new row of the same size to compare the parity bits for each column. - Attach the parity bits block (redundant) to the original data and send them to the receiver. - LRC increases the likelihood detecting burst errors.
    • If two bits in a data unit are damaged and two bits in the exact same positions in another are also damaged, the checker will not detect an error

VRC and LRC

  • Two dimensional bits in the form of a two-dimensional Parity Code
  • Hamming Distance Hamming distance is number of difference between two words.
  • To guarantee the detection of up to "s" errors the Minimum Hamming Distance in a Block Code must be "s+1"

CRC (Cyclic Redundancy Check)

  • More powerful than LRC/VRC, but based on division instead addition
  • A sequence or "redundant bits" is added to the end of a data unit - Divisible by second, predetermined number
  • *if there's no remainder after the binary division process indicates that data is sent in contact and accepted by the receiver. A remainder indicates that the data has been damaged in transit and rejected To better guarantee a working CRC system, a Polynomial should have some of the following properties:
  • Should not be divisible at all. Guarantees that a bus system of the link with degree of polynomial can be collected.
  • Should have a divisible at 1 or 2.
  • Guarantees that all the bust system errors and odd bits
  • The data is is sent using modulo system with specific amount degree of the message

Checksum

  • Error detecting technique can be applied to a data message.

Implementing Checksum

  • Sub-divides the data unit into equal "n" bit long segments.
  • Total Sum then complemented, and then appended to checksum field that gets extended for the data.
  • New checksum field ZERO determines there is no Error on send/receive end.
  • Uses two accumulators (R+L) with the first one simply adding a data and the second adds a weight for the measurement.
  • Fletcher Checksum/Adler Checksum.

Error Correction

  • Can be handled in two ways:
    • Receiving end request's sender to retransmit an entire unit of data when and error is discovered. -Receiver can use an error-correcting system that could help automatically correct data's, therefore some errors, are sophisticated.
  • Most errors limited to one, two or three-bit errors
  • VRC can detect a single bit in the received frame, and will try to isolate the invalid bit.
  • For code to work, and to correct single -bit in a message, ECC has to determine which is 7-bit that needs to change.
  • Use additional (enough) bits for all eight stage: all positions, from 1 to 7
  • To code with redundancy, must use a 3 bit redundancy code. If an error occurs with too many redundancy bits, it might me necessary for Additional bits, for complete data.

Hamming Code

  • Can be used in data, while coding
  • Requires 4 or more bits, to the to send a message unit or message
  • Redundant bits are located in position 1 to 8

Protocol

  • High-Level Data Link Control (HDLC)
  • Point-to-Point Protocol (PPP)
  • HDLC is a bit-oriented data link protocol, supporting half/full duplex communication over point-to-point/multipoint links
  • Primary station controls the links: sends commands to secondary, and receives
  • Secondary station responds to primary station:
  • Combined station both send and receive commands
  • Unbalanced configuration: one device primary, others secondary.
  • Balanced configuration: both are combined type.
  • Symmetrical: physical station has two of devices and the link controls can the set across the same
  • Modes of Communication - (NRM) Normal Response, primary/secondary setup where secondary can the send information once a primary allows: must have permission for the primary - All stations are equal only combined point-to-point connections - Asynchronous balanced mode (ABM) - only combined stations. - asynchronous response mode (ARM) - transmit w/o permission from primary, when channel is idle

HDLC Frame Structure:

  1. FLAGS: both start/end and pattern
  2. ADDRESS: points at one terminal.
  3. CONTROL: sends back all numbers, for frame-sequence; etc.
  4. DATA: info unit
  5. FCS: Error check

ADDRESS:

  • Address of message will be send to a specific secondary receiver terminal If any receiver will have the correct address
    • the last bit is always 1
      • so the receiver can determine how many bytes
  • MAC Ethernet: the last 6 bytes of each address will occur in MAC

CONTROL: (3 types)

  1. I-frames: transfer data using 4 bits
  2. S-Frames: with only control infor
  3. U-Frames: for Management

SUPERVISORY frames

  • Is the result of a single bit:
    • either is POLL
    • or is final

Types of Supervisory frames

  • Used to recognize other frames and all to stop or start sending
    • 0: Acknowledgement frame, used to the next Frame
    • 1: The negative Acknowledgement or REJECT which indicates at ransmission -3 : negative Ac -reject, its code is "11": used for retran
    • 2: used with "Receiving/Not ready" mode which used for other sendings codes.
  • BUSY CONDITION sharing what send with Frame/sequence

Timeout and Recovery

If an 'it' is still on that transmission and is lost after sometime, reinitiates this time, if it's already expired

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Untitled Quiz
6 questions

Untitled Quiz

AdoredHealing avatar
AdoredHealing
Untitled
44 questions

Untitled

ExaltingAndradite avatar
ExaltingAndradite
Untitled
6 questions

Untitled

StrikingParadise avatar
StrikingParadise
Untitled Quiz
18 questions

Untitled Quiz

RighteousIguana avatar
RighteousIguana
Use Quizgecko on...
Browser
Browser