50
Network Operations & administration CS 4592 Lecture 13 Instructor: Ibrahim Tariq

Network Operations & administration CS 4592 Lecture 13

  • Upload
    adonis

  • View
    48

  • Download
    0

Embed Size (px)

DESCRIPTION

Network Operations & administration CS 4592 Lecture 13. Instructor: Ibrahim Tariq. Data Link Layer. Error Correction. By retransmission flow and error control protocols Forward Error Correction (FEC) require more redundancy bits should locate the invalid bit or bits - PowerPoint PPT Presentation

Citation preview

Page 1: Network Operations & administration  CS 4592 Lecture  13

Network Operations & administration CS 4592

Lecture 13

Instructor: Ibrahim Tariq

Page 2: Network Operations & administration  CS 4592 Lecture  13

Data Link Layer

Page 3: Network Operations & administration  CS 4592 Lecture  13

Error Correction

1. By retransmission– flow and error control protocols

2. Forward Error Correction (FEC)– require more redundancy bits– should locate the invalid bit or bits– n-bit code word contains m data bits + r

redundancy bitsn=m+r

– m+r+1 bits discoverable by r bits– 2r>=m+r+1

Page 4: Network Operations & administration  CS 4592 Lecture  13

Data and redundancy bits

Number ofdata bits

m

Number of redundancy bits

r

Total bits

m + r

1 2 3

2 3 5

3 3 6

4 3 7

5 4 9

6 4 10

7 4 11

Page 5: Network Operations & administration  CS 4592 Lecture  13

Hamming Code

• Hamming codes provide for FEC using a “Block Parity”– i.e, instead of one parity bit send a block of parity

bits• Allows correction of single bit errors• This is accomplished by using more than one

parity bit• Each computed on different combination of

bits in the data

Page 6: Network Operations & administration  CS 4592 Lecture  13

Positions of Redundancy Bits

Page 7: Network Operations & administration  CS 4592 Lecture  13

Redundancy Bits Calculation

Page 8: Network Operations & administration  CS 4592 Lecture  13

Example

Page 9: Network Operations & administration  CS 4592 Lecture  13

Error Correction using Hamming Code

Page 10: Network Operations & administration  CS 4592 Lecture  13

Revision

Page 11: Network Operations & administration  CS 4592 Lecture  13

1.11

Categories of topology

Page 12: Network Operations & administration  CS 4592 Lecture  13

1.12

A fully connected mesh topology (five devices)

Page 13: Network Operations & administration  CS 4592 Lecture  13

1.13

A star topology connecting four stations

Page 14: Network Operations & administration  CS 4592 Lecture  13

1.14

A bus topology connecting three stations

Page 15: Network Operations & administration  CS 4592 Lecture  13

1.15

A ring topology connecting six stations

Page 16: Network Operations & administration  CS 4592 Lecture  13

1.16

A hybrid topology: a star backbone with three bus networks

Page 17: Network Operations & administration  CS 4592 Lecture  13

2.17

Figure 2.2 Seven layers of the OSI model

Page 18: Network Operations & administration  CS 4592 Lecture  13

2.18

Figure 2.3 The interaction between layers in the OSI model

Page 19: Network Operations & administration  CS 4592 Lecture  13

19

Four Level of Addresses

Page 20: Network Operations & administration  CS 4592 Lecture  13

20

Relationship of Layers & Addresses in TCP/IP

Page 21: Network Operations & administration  CS 4592 Lecture  13

21

Communication NetworkCommunication networks

Broadcast networksEnd nodes share a common channel (TV,

radio…)

Switched networks End nodes send to one (or more) end nodes

Packet switchingData sent in discrete portions

(the Internet)

Circuit switchingDedicated circuit per call

(telephone, ISDN)(physical)

Page 22: Network Operations & administration  CS 4592 Lecture  13

6.22

Figure 6.2 Categories of multiplexing

Page 23: Network Operations & administration  CS 4592 Lecture  13

6.23

Figure 6.13 Synchronous time-division multiplexing

Page 24: Network Operations & administration  CS 4592 Lecture  13

6.24

Figure 6.26 TDM slot comparison

Page 25: Network Operations & administration  CS 4592 Lecture  13

25

Transmission Impairments

Page 26: Network Operations & administration  CS 4592 Lecture  13

26

Bit Rate & Bit Interval (contd.)

Page 27: Network Operations & administration  CS 4592 Lecture  13

27

Noiseless Channel: Nyquist Bit Rate

• Defines theoretical maximum bit rate for Noiseless Channel:

• Bit Rate=2 X Bandwidth X log2L

Page 28: Network Operations & administration  CS 4592 Lecture  13

28

ExampleWe have a channel with a 1 MHz bandwidth. The SNR for this channel is 63; what is the appropriate bit rate and signal level?

Solution

C = B log2 (1 + SNR) = 106 log2 (1 + 63) = 106 log2 (64) = 6 Mbps

Then we use the Nyquist formula to find the number of signal levels.

6 Mbps = 2 1 MHz log2 L L = 8

First, we use the Shannon formula to find our upper limit.

Page 29: Network Operations & administration  CS 4592 Lecture  13

29

Noisy Channel: Shannon Capacity

• Defines theoretical maximum bit rate for Noisy Channel:

• Capacity=Bandwidth X log2(1+SNR)

Page 30: Network Operations & administration  CS 4592 Lecture  13

Data Communication & Networks, Summer 2009

30

Line Coding Schemes

Page 31: Network Operations & administration  CS 4592 Lecture  13

Data Communication & Networks, Summer 2009

31

Unipolar Encoding

Page 32: Network Operations & administration  CS 4592 Lecture  13

Data Communication & Networks, Summer 2009

32

Polar: NRZ-L and NRZ-I Encoding

Page 33: Network Operations & administration  CS 4592 Lecture  13

Data Communication & Networks, Summer 2009

33

Polar: RZ Encoding

Page 34: Network Operations & administration  CS 4592 Lecture  13

Data Communication & Networks, Summer 2009

34

Polar: Manchester Encoding

Page 35: Network Operations & administration  CS 4592 Lecture  13

Data Communication & Networks, Summer 2009

35

Polar: Differential Manchester Encoding

Page 36: Network Operations & administration  CS 4592 Lecture  13

4.36

Figure 4.6 Polar NRZ-L and NRZ-I schemes

Page 37: Network Operations & administration  CS 4592 Lecture  13

4.37

Figure 4.9 Bipolar schemes: AMI and pseudoternary

Page 38: Network Operations & administration  CS 4592 Lecture  13

Data Communication & Networks, Summer 2009

38

Page 39: Network Operations & administration  CS 4592 Lecture  13

4.39

ANALOG-TO-DIGITAL CONVERSION

Digital signal is superior to an analog signal. The tendency today is to change an analog signal to digital data. pulse code modulation

Page 40: Network Operations & administration  CS 4592 Lecture  13

4.40

Components of PCM encoder

Page 41: Network Operations & administration  CS 4592 Lecture  13

5.41

Types of digital-to-analog conversion

Page 42: Network Operations & administration  CS 4592 Lecture  13

5.42

Concept of a constellation diagram

Page 43: Network Operations & administration  CS 4592 Lecture  13

5.43

Figure 5.13 Three constellation diagrams

Page 44: Network Operations & administration  CS 4592 Lecture  13

5.44

Types of analog-to-analog modulation

Page 45: Network Operations & administration  CS 4592 Lecture  13

Circuit Switching

• There are three phases in circuit switching:– Establish– Transfer– Disconnect

• The telephone message is sent in one go, it is not broken up. The message arrives in the same order that it was originally sent.

Page 46: Network Operations & administration  CS 4592 Lecture  13

Packet Switching

• In packet-based networks, the message gets broken into small data packets.

• These packets seek out the most efficient route to travel as circuits become available.

• Each packet may go a different route from the others.

Page 47: Network Operations & administration  CS 4592 Lecture  13

9.47

Figure 9.11 Bandwidth division in ADSL

Page 48: Network Operations & administration  CS 4592 Lecture  13

9.48

ADSL modem

Page 49: Network Operations & administration  CS 4592 Lecture  13

9.49

DSLAM

Page 50: Network Operations & administration  CS 4592 Lecture  13

9.50

Summary of DSL technologies