DCN Notes Unit2
DCN Notes Unit2
ON
Data Communication and Networks
DATAGRAM NETWORKS
Data Link Layer: Error detection and correction Data Link Control:
CYCLIC REDUNDANCY CHECK (CRC):
Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a
codeword is cyclically shifted (rotated), the result is another codeword. For example, if 1011000
is a codeword and we cyclically left-shift, then 0110001 is also a codeword. In this case, if we
call the bits in the first word ao to a6' and the bits in the second word bo to b6.
Figure 10.21 shows one immediate benefit; a 7-bit pattern can be replaced by three terms. The
benefit is even more conspicuous when we have a polynomial such as x23 + X3 + 1. Here the bit
pattern is 24 bits in length (three Is and twenty-one Os) while the polynomial is just three terms.
Figure 10.10 shows a possible structure of an encoder (at the sender) and a decoder
(at the receiver). The encoder uses a generator that takes a copy of a 4-bit dataword (ao, aI' a2'
and a3) and generates a parity bit roo The dataword bits and the parity bit create the 5-bit
codeword. The parity bit that is added makes the number of Is in the codeword even.
If the number of 1s is even, the result is 0; if the number of 1s is odd, the result is 1. In
both cases, the total number of 1s in the codeword is even. The sender sends the codeword
which may be corrupted during transmission. The receiver receives a 5-bit word. The
checker at the receiver does the same thing as the generator in the sender with one
exception: The addition is done over all 5 bits. The result, which is called the syndrome, is
just 1 bit. The syndrome is 0 when the number of Is in the received codeword is even;
otherwise, it is 1.
The syndrome is passed to the decision logic analyzer. If the syndrome is 0, there is no
error in the received codeword; the data portion of the received codeword is accepted as
the dataword; if the syndrome is 1, the data portion of the received codeword is discarded.
The dataword is not created.
HDLC
High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over
point- to-point and multipoint links.
Point-to-point protocol
A point-to-point connection provides a dedicated link between two devices. The entire
capacity of the link is reserved for transmission between those two devices. Most point-to-
point connections use an actual length of wire or cable to connect the two ends, but other
The relation between the offered traffic and the throughput is shown in Fig. 4-3. The maximum
throughput occurs at G = 0.5, with S = 1/2e, which is about 0.184. In other words, the best we
can hope for is a channel utilization of 18 per cent. This result is not very encouraging, but with
everyone transmitting at will, we could hardly have expected a 100 per cent success rate.
Slotted ALOHA:
In 1972, Roberts published a method for doubling the capacity of an ALOHA system (Robert,
1972). His proposal was to divide time into discrete intervals, each interval corresponding to one
frame. This approach requires the users to agree on slot boundaries. One way to achieve
synchronization would be to have one special station emit a pip at the start of each interval, like a
clock.
In Roberts' method, which has come to be known as slotted ALOHA, in contrast to Abramson's
pure ALOHA, a computer is not permitted to send whenever a carriage return is typed. Instead, it
is required to wait for the beginning of the next slot. Thus, the continuous pure ALOHA is turned
into a discrete one. Since the vulnerable period is now halved, the probability of no other traffic
during the same slot as our test frame is e-G which leads to
As you can see from Fig.3, slotted ALOHA peaks at G = 1, with a throughput of S=1/e or about
0.368, twice that of pure ALOHA. If the system is operating at G = 1, the probability of an
empty slot is 0.368. The best we can hope for using slotted ALOHA is 37 percent of the slots
empty, 37 percent successes, and 26 percent collisions. Operating at higher values of G reduces
the number of empties but increases the number of collisions exponentially.
To see how this rapid growth of collisions with G comes about, consider the transmission of a
test frame. The probability that it will avoid a collision is e-G, the probability that all the other
CDMA
Code-division multiple access (CDMA) was conceived several decades ago. Recent
advances in electronic technology have finally made its implementation possible. CDMA differs
from FDMA in that only one channel occupies the entire bandwidth of the link. It differs from
TDMA in that all stations can send data simultaneously; there is no timesharing.
Let us first give an analogy. CDMA simply means communication with different codes.
For example, in a large room with many people, two people can talk privately in English if
nobody else understands English. Another two people can talk in Chinese if they are the only
ones who understand Chinese, and so on. In other words, the common channel, the space of the
room in this case, can easily allow communication between several couples, but in different
languages (codes).
Project 802 does not seek to replace any part of the OSI or the Internet model. Instead, it is a way
of specifying functions of the physical layer and the data link layer of major LAN protocols.
The standard was adopted by the American National Standards Institute (ANSI). In 1987, the
International Organization for Standardization (ISO) also approved it as an international standard
under the designation ISO 8802. The relationship of the 802 Standard to the traditional OSI
model is shown in Figure 1.
The IEEE has subdivided the data link layer into two sublayers:
logical link control (LLC) and media access control (MAC).
IEEE has also created several physical layer standards for different LAN protocols.
STANDARD ETHERNET
MAC Sublayer
In Standard Ethernet, the MAC sublayer governs the operation of the access method. It also
frames data received from the upper layer and passes them to the physical layer.
Frame Format
The Ethernet frame contains seven fields: preamble, SFD, DA, SA, length or type of protocol
data unit (PDU), upper-layer data, and the CRe. Ethernet does not provide any mechanism for
acknowledging received frames, making it what is known as an unreliable medium.
Acknowledgments must be implemented at the higher layers. The format ofthe MAC frame is
shown in Figure 4.
The minimum length restriction is required for the correct operation of CSMAlCD. An Ethernet
frame needs to have a minimum length of 512 bits or 64 bytes. Part of this length is the header
and the trailer. If we count 18 bytes of header and trailer (6 bytes of source address, 6 bytes of
destination address, 2 bytes of length or type, and 4 bytes of CRC), then the minimum length of
data from the upper layer is 64 - 18 = 46 bytes. If the upper-layer packet is less than 46 bytes,
padding is added to make up the difference.
The standard defines the maximum length of a frame (without preamble and SFD field) as 1518
bytes. If we subtract the 18 bytes of header and trailer, the maximum length of the payload is
1500 bytes. The maximum length restriction has two historical reasons. First, memory was very
expensive when Ethernet was designed: a maximum length restriction helped to reduce the size
of the buffer. Second, the maximum length restriction prevents one station from monopolizing
the shared medium, blocking other stations that have data to send.
Frame length:
Minimum: 64 bytes (512 bits) Maximum: 1518 bytes (12,144 bits)
Addressing
Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network
interface card (NIC). The NIC fits inside the station and provides the station with a 6-byte
physical address. As shown in Figure 6, the Ethernet address is 6 bytes (48 bits), nonnally
written in hexadecimal notation, with a colon between the bytes.
06:01 :02:01:2C:4B
A unicast destination address defines only one recipient; the relationship between the sender and
the receiver is one-to-one. A multicast destination address defines a group of addresses; the
relationship between the sender and the receivers is one-to-many. The broadcast address is a
special case of the multicast address; the recipients are all the stations on the LAN. A broadcast
destination address is forty-eight.
6.2.2 Physical Layer
The Standard Ethernet defines several physical layer implementations; four of the most common,
are shown in Figure 8.
Encoding and Decoding
All standard implementations use digital signaling (baseband) at 10 Mbps. At the sender, data are
converted to a digital signal using the Manchester scheme; at the receiver, the received signal is
interpreted as Manchester and decoded into data. Manchester encoding is self-synchronous,
providing a transition at each bit interval. Figure 9 shows the encoding scheme for Standard
Ethernet.
Gigabit Ethernet
The technology is based on fiber optic cable. Multi-mode fiber is able to transmit a gigabit rate to
at least 580 meters and with single-mode runs exceeding 3km.
Wireless LAN IEEE 802.11
Architecture
The standard defines two kinds of services: the basic service set (BSS) and the extended service
set (ESS).
Basic Service Set