Professional Documents
Culture Documents
Dr. Pradeep K V
Assistant Professor (Sr)
VIT Chennai
Dr. Pradeep K V
Assistant Professor (Sr)
VIT Chennai
In the OSI model,DLL is a 6th layer from the top and 2nd layer from
the bottom.
The communication channel that connects the adjacent nodes is
known as links, and in order to move the datagram from source to
the destination, the datagram must be moved across an individual
link.
The main responsibility of the DLL is to transfer the datagram
across an individual link.
The DLL protocol defines the format of the packet exchanged across
the nodes as well as the actions such as Error Correction and
Detection, Retransmission, Flow control, and Random access.
The DLL protocols are Ethernet, Token ring, FDDI and PPP.
An important characteristic of a DLL is that datagram can be
handled by different link layer protocols on different links in a path.
For example, the datagram is handled by Ethernet on the first link,
PPP on the second link.
Dr. Pradeep K V
Assistant Professor (Sr)
VIT Chennai
1 Stop and Wait : The sender sends a frame and waits for
acknowledgment. Once received the next frame is sent.
(i.e One frame at a time).
2 Sliding Window : Both Sender and Receiver agrees upon the number
of frames to be sent based upon the buffer size (Window).
(i.e Several frames at a time)
Operations :
1 Sender: Transmits a single frame at a time.
2 Sender waits to receive ACK within time out.
3 Receiver: Transmits acknowledgement (ACK) as it receives a frame.
4 Go to step 1 when ACK is received, or time out is hit.
Since, multiple frames are sent one after the another due to which
capacity of the communication channel can be utilized efficiently.
The window can hold the frames at either end, and it provides the
upper limit on the number of frames that can be transmitted before
the acknowledgement.
When the receiver sends the ACK, it includes the number of the
next frame that it wants to receive. For example, to acknowledge
the string of frames ending with frame number 4, the receiver will
send the ACK containing the number 5. When the sender sees the
ACK with the number 5, it got to know that the frames from 0
through 4 have been received.
Dr. Pradeep K V
Assistant Professor (Sr)
VIT Chennai
Both the data frames and the ACK frames are numbered alternately
0 and 1 so that they can be identified individually. Suppose data 1
frame acknowledges the data 0 frame means that the data 0 frame
has been arrived correctly and expects to receive data 1 frame.
Dr. Pradeep K V
Assistant Professor (Sr)
VIT Chennai
Redundancy :
The central concept in detecting or correcting errors is redundancy.
To detect or correct errors, we need to send some extra bits (called as
Redundant bits) with our data.
These redundant bits are added by the sender and removed by the
receiver.
Their presence allows the receiver to detect or correct corrupted bits.
Coding :
It is the process of adding redundant bit.
The sender adds redundant bits through a process that creates a
relationship between the redundant bits and the actual data bits.
The receiver checks the relationships between the two sets of bits to
detect errors.
The ratio of redundant bits to data bits and the robustness of the process
are important factors in any coding scheme.
Block Coding :
Entire Message is divided into blocks, each of ’k’ bits, called datawords.
We add ’r’ redundant bits to each block to make the length ’n = k + r’.
The resulting ’n’-bit blocks are called codewords.
With ’k’ bits, can create a combination of 2k datawords;
With ’n’ bits, can create a combination of 2n codewords. (∀ n > k)
It is one-to-one; the same data-word is always encoded as the same
codeword. Therefore, we have 2n - 2k codewords (Invalid/Illegal) that are
not used.
Error Detection
An error-detecting code can detect only the types of errors for which it is
designed; other types of errors may remain undetected.
Checker (Receiver) :
It does the same thing as the generator, but with one exception.
i.e it adds all 5 bits (b3 ,b2 ,b1 ,b0 ,q0 ).
The result s0 = b3 + b2 + b1 + b0 + q0 (modulo-2) is called syndrome.
if s0 = 0, then No Error. Otherwise Error and Message is discarded.
Checker (Receiver) :
It does the same thing as the generator, but with one exception.
i.e it adds all 5 bits (b3 ,b2 ,b1 ,b0 ,q0 ).
The result s0 = b3 + b2 + b1 + b0 + q0 (modulo-2) is called syndrome.
if s0 = 0, then No Error. Otherwise Error and is discarded.
Source want to transmit the binary data unit 1100001, adding the
number of 1’s gives us 3, an odd number. Before transmitting, a parity
generator counts the 1’s and appends the parity bit (a 1 in this case) to
the end. The total number of 1 becomes 4 now (even number). The
system now transmits the entire appended unit across the network link.
They are special linear block codes with one extra property.
In a Cyclic Code, if a codeword is cyclically shifted (rotated), the result is
another codeword.
For example, if 1011000 is a codeword and we cyclically left-shift, then
0110001 is also a codeword.
In this case, if we call the bits in the first word a0 to a6 , and the bits in
the second word b0 to b6 , we can shift the bits by using the following: b0
= a1 , b1 = a2 , b2 = a3 , b3 = a4 , b4 = a5 , b5 = a6 and b6 = a0 .
The last bit of the first word is wrapped around and becomes the first bit
of the second word.
A better way to understand cyclic codes and how they can be analyzed is to
represent them as polynomials
The codes which are used for both error detecting and error
correction are called as “Error Correction Codes”.
The error correction techniques are of two types.
Single bit error correction : correcting single bit errors
Burst error correction : correcting burst errors
−→
Step - 1 : Find Number of Parity(Redundant) Bits (i.e r = 3)
Step - 2 : Redundant Bits Positions ( r1 , r2 , and r4 )
Step - 3 : Find r1 , r2 , and r4 Values
One can observe from the above figure that the binary
representation of r4 is 1011. Now, we perform the even-parity check,
the total number of 1’s appearing in the r4 bit is an odd number.
Therefore, the value of r4 is 1.
Dr. Pradeep K V
Assistant Professor (Sr)
VIT Chennai
It was designed for a radio (wireless) LAN, but it can be used on any
shared medium.
Time
Pure ALOHA Vulnerable time 2 * Tfr
Pure ALOHA
The throughput for pure ALOHA is S = G * e −2G
The maximum throughput Smax = 1/(2e) = 0.184 when G = (1/2).
Slotted ALOHA
The throughput for Slotted ALOHA is S = G * e −G
The maximum throughput Smax = 0.368 when G = 1.