Professional Documents
Culture Documents
Basic concepts
• Networks must be able to transfer data from one device to another
with complete accuracy.
• Data can be corrupted during transmission.
• For reliable communication, errors must be detected and corrected.
• Error detection and correction are implemented either at the data
link layer or the transport layer of the OSI model.
Types of Errors
1) Single-bit error
• Single bit errors are the least likely type of errors in serial data
transmission because the noise must have a very short duration
which is very rare.
• However this kind of errors can happen in parallel transmission.
Example:
• If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1
μs.
• For a single-bit error to occur, the noise must have a duration of
only 1 μs, which is very rare.
2) Multiple-bit error
If there is change in two or more bits of data sequence of
transmitter to receiver, it is called “Multiple bit error”.
This type of error occurs in both serial type and parallel
type data communication networks.
3)Burst error
• The term burst error means that two or more bits in the data unit
have changed from 1 to 0 or from 0 to 1.
• Burst errors does not necessarily mean that the errors occur in
consecutive bits, the length of the burst is measured from the first
corrupted bit to the last corrupted bit. Some bits in between may
not have been corrupted.
• Burst error is most likely to happen in serial transmission since
the duration of noise is normally longer than the duration of a bit.
• The number of bits affected depends on the data rate and duration
of noise.
Example:
• If data is sent at rate = 1Kbps then a noise of 1/100 sec can affect 10 bits.
(1/100*1000)
• If same data is sent at rate = 1Mbps then a noise of 1/100 sec can affect 10,000
bits.(1/100*106)
3.2 Error Detection: Longitudinal Redundancy Check(LRC),
Vertical Redundancy Check(VRC),Cyclic Redundancy
Check(CRC)Forward
Error Detection:
Error detection means to decide whether the received data is correct
or not without having a copy of the original message.
Error Correction
It can be handled in two ways:
• Receiver can have the sender retransmit the
entire data unit.
• The receiver can use an error-correcting code,
which automatically corrects certain errors.
Forward error correction
• Forward error correction An error-correcting code
(ECC) or forward error correction (FEC) code is
redundant data that is added to the message on the
sender side.
• If the number of errors is within the capability of the
code being used, the receiver can use the extra
information to discover the locations of the errors
and correct them.
• Since the receiver does not have to ask the sender for
retransmission of the data, a back-channel is not
necessary in forward error correction, so it is suitable
for simplex communication such as broadcasting.
• Error correcting codes are used in computer data
storage, for example CDs, DVDs and in dynamic RAM.
• It is also used in digital transmission, especially wireless
communication, since wireless communication without
FEC often would suffer from packet-error rates close to
100%, and conventional automatic repeat request error
control would yield a very low goodput.
Single-bit error correction
• To correct an error, the receiver reverses the value
of the altered bit.
• To do so, it must know which bit is in error.
• Number of redundancy bits needed
• Let data bits = m
• Redundancy bits = r
Total message sent = m+r
• The value of r must satisfy the following relation:
• 2r ≥ m+r+1
3.4IEEE standards: 802 1, 802 2, 802 3, 802 4, 802 5
There are several Standards, but most common ones are:
• ISO (International organization of Standardization)
• IEEE (Institute of Electrical and Electronic Engineers)
IEEE:
• The institute of electrical and electronic Engineers (IEEE)
publishes several widely accepted LANrecommended
standards.
• These standards, collectively known as IEEE.Various IEEE
802 standards are:
• IEEE 802.1 High Level Interface
• IEEE 802.2 Logical Link Control(LLC)
• IEEE 802.3 Ethernet
• IEEE 802.4 Token Bus
• IEEE 802.5 Token Ring
• IEEE 802.6 Metropolitan Area Networks
• IEEE 802.7 Broadband LANs
• IEEE 802.8 Fiber Optic LANS
• IEEE 802.9 Integrated Data and Voice Network
• IEEE 802.10 Security
• IEEE 802.11 Wireless Network
802.1 (Bridging)
802.1 (Bridging):
• Overall picture of LAN and connectivity
• addressing network management
• Standards for Bridges.
802.2 (LLC)
• Logical Link Control
• Communication of packets from one device to another
device.
• It deals with communication.
802.3(Ethernet)
Ethernet Mainly
• CSMA/CD- (Carrier sense multiple
access/collision detection.)
• Speed of 10MB/s
IEEE 802.4 Token Bus
Token Bus (IEEE 802.4) is a standard for implementing
token ring over the virtual ring in LANs.
The physical media has a bus or a tree topology and uses
coaxial cables.
A virtual ring is created with the nodes/stations and the
token is passed from one node to the next in a sequence
along this virtual ring.
Each node knows the address of its preceding station and
its succeeding station.
A station can only transmit data when it has the
token.
The working principle of the token bus is similar
to Token Ring.
IEEE 802.5 Token Ring
• Token Ring
• Speed of 4Mbps or 16Mbps.
3.5 Wireless LANs: 802 11 Architecture, MAC Sub
layer, Addressing Mechanism
IEEE has defined the specifications for a wireless LAN,
called IEEE 802.11, which covers the physical and data link
layers.
Architecture:
The standard defines two kinds of services:
1. The basic service set (BSS)
2. The extended service set (ESS)
• IEEE 802.11 defines the basic service set (BSS) as the
building block of a wireless LAN.
1) The basic service set (BSS)
• A basic service set is made of stationary or mobile wireless
stations and an optional central base station, known as the
access point (AP).
• The BSS without an AP is a stand-alone network and
cannot send data to other BSSs. It is called an ad hoc
architecture.
• In this architecture, stations can form a network without
the need of an AP; they can locate one another and agree
to be part of a BSS.
• A BSS with an AP is sometimes referred to as an
infrastructure network.