Lecture 5
Lecture 5
1. Introduction & Physical Layer - Introduction to the Internet - Services and Protocols, Edge -
Protocol Layers and Service Models OSI and TCP/IP models.
2. Data link Layer - Link Layer – Services - Error Detection and Correction; Multiple Access
protocols- channel partitioning - Random access - Taking-Turns protocols - Switched LANs ARP - Ethernet
- Link layer switching – VLANs – MPLS.
3. Network Layer - Data plane forwarding vs. Control plane routing - Software Defined Networking
(SDN) approach - Network Services - Router architecture - Switching fabrics - Input and output queueing-
Core, Packet Switching vs. Circuit Switching - Performance Metrics Delay - Loss – Throughput - IPv4 and
IPv6 addressing DHCP -NAT - IPv4 and IPv6 fragmentation – SDN-based generalized forwarding -
Routing and Supporting Algorithms - Link State vs. Distance Vector - RIP - OSPF – BGP – ICMP - SNMP
- SDN Control Plane.
4.Transport Layer - Unreliable Connectionless vs. Reliable Connection-Oriented Services -
Multiplexing; Stop-and-Wait - Go-Back-N and Selective-Repeat - UDP vs. TCP - Flow and Congestion
Control.
5. Application Layer - Client-Server and Peer-to-Peer architectures - Application Layer protocols
6. Introduction to Wireless and Mobile Networks - Link characteristics - CDMA - 802.11 WiFi -
Bluetooth and Zigbee - Cellular Networks - GSM – UMTS – LTE - Mobility management and handoff -
Mobile IP.
Part-2 (Lecture Flow & Book Details)
Data link Layer - Link Layer – Services - Error Detection and Correction: Behrouz Forouzan, “Data
Communication and Networking”, Tata McGraw Hill 3rd edition. Chapter-10, Page Nos: 243-259.
Multiple Access protocols Channel partitioning - Random access - Taking-Turns protocols: Behrouz
Forouzan, “Data Communication and Networking”, Tata McGraw Hill 3rd edition. Chapter-13, Page
Nos: 311-325.
Switched LANs ARP: James Kurose and Keith Ross, “Computer Networking: A Top-down Approach”
5th edition, Addison Wesley 2010. Chapter-5- Only 5.4.1. Page Nos: 462 to 469.
Ethernet: James Kurose and Keith Ross, “Computer Networking: A Top-down Approach” 5th edition,
Addison Wesley 2010. Chapter-5- Only 5.4.2. Page Nos: 469 to 476.
Link layer switching: Behrouz Forouzan, “Data Communication and Networking”, Tata McGraw Hill
4th edition. Chapter-15— only page no.-447(Bridges).
The Link Layer and Local Area Networks
0 1 1 0 0 0 1 0
0 0 0 0 0 0 0 1
1
0
Sender 1 Receiver
1
0
1
Error detection:
• Redundancy
• Parity Check
• Cyclic Redundancy Check (CRC)
• Checksum
Ist method:
• Error detection is done by sending every data twice
• Receiver does bit by bit comparison between the two sets of the data
• Any discrepancy results in error and correction has to be done
Advantage:
Accuracy
Disadvantage:
Slow
Transmission time is doubled and takes more time for bit by bit comparison
Redundancy:
• Adding extra bits for detecting errors at the destination.
• Sender appends shorter group of bits and transmits
• Receiver checks the data and redundant bits are discarded
Error Detection Methods:
Simple Parity Check:
• Even or Odd parity check: Parity bit is added to every data unit so that the total number of 1s
is even (or odd for odd-parity)
Numerical:
Ex:1
Suppose the sender wants to send the word world. In ASCII the five characters are coded as
1110111 1101111 1110010 1101100 1100100
The following shows the actual bits sent
11101110 11011110 11100100 11011000 11001001
Ex:2
Now suppose the word world in Ex:1 is received by the receiver without being corrupted in
transmission.
11101110 11011110 11100100 11011000 11001001
The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4).
The data are accepted.
Numerical:
Ex3:
Now suppose the word world in Ex:1 is corrupted during transmission.
11111110 11011110 11101100 11011000 11001001
The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5,
4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
Note:
• It can detect burst errors only if the total number of errors in each data unit is odd.
CRC ( CYCLIC REDUNDANCY CHECK):
• Most powerful technique
• Performs binary division
• Sequence of redundant bits called the CRC remainder is appended to the end of data unit
• Resulting data unit is exactly divisible by predetermined binary number
• At the destination, incoming data unit is divisible by the same binary number
• No remainder – data is proper and accepted
• There is remainder – data is damaged and rejected
• Redundancy bits are derived by dividing the data unit by a predetermined divisor and
remainder is the CRC
Two qualities:
• CRC must have exactly one bit less than the divisor
• After appending CRC at the end of the data, resulting sequence exactly divisible by the
divisor
CRC ( CYCLIC REDUNDANCY CHECK):
Note:
• CRC can be all zeros
CRC:
CRC Polynomial:
• Divisor is represented as a algebraic
polynomial but not as a string of o’s and 1’s
Reason for using polynomial:
• Short
• Used to prove the concept mathematically
CRC Generator:
• Uses mod 2 division
• Size of divisor is n+1
• n= Number of appended
zeros
• Divisor always begins
with 1
• Dividend – divisor and
leftmost bit of dividend
should be 1
• First bit of remainder is
zero then use 0000
• If second bit is also
zero then it is
retained
CRC Checker:
• Uses mod 2 division
• Data is received as data
followed by CRC
• Remainder=0, CRC is
dropped and data is
accepted
• Else data is discarded and
resent
Checksum
Now, suppose receiver receives the pattern and
there is no error
Error Correction Methods:
• Retransmission
1 2 3
2 3 5
3 3 6
4 3 7
5 4 9
6 4 10
7 4 11
r8 r4 r2 r1 No. of
bits
0 0 0 1 1 r1 : 1 , 3, 5, 7, 9, 11, 13……..
0 0 1 0 2
0 0 1 1 3 r2 : 2, 3, 6, 7, 10, 11………….
0 1 0 0 4
0 1 0 1 5
r4 : 4, 5, 6,7, 12, 13, 14, 15,………..
0 1 1 0 6
0 1 1 1 7
r8 : 8, 9, 10, 11, 12, 13, 14, 15,………
1 0 0 0 8
1 0 0 1 9
1 0 1 0 10
1 0 1 1 11
1 1 0 0 12
1 1 0 1 13
1 1 1 0 14
1 1 1 1 15
Hamming code:
Finding r values: assume even parity
Hamming code:
Hamming code:
• Easily implemented using hardware
• Code is corrected before the receiver knows about it