Data Comm.
Layers of TCP/IP
- Application
- Transport
- Network
- Data link
- Physical
Layer 7: The application layer - The application layer is responsible for providing services to the user.
This is the layer at which communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. (This layer is not the application itself, although some applications may perform application layer functions.)
Layer 6: The presentation layer-This is a layer, usually part of an operating system, that converts incoming and outgoing data from one presentation format to another (for example, from a text stream into a popup window with the newly arrived text). Sometimes called the syntax layer.
Layer 5: The session layer-This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination.
Layer 4: The transport layer-
The transport layer is responsible for delivery of a message from one process to another.
This layer manages the end-to-end control (for example, determining whether all packets have arrived) and error-checking. It ensures complete data transfer.
Layer 3: The network layer-
The network layer is responsible for the delivery of packets from the original source to the
final destination. This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and forwarding.
Layer 2: The data-link layer-
The data link layer is responsible for transmitting frames from
one node to the next. This layer provides synchronization for the physical level and does bit-stuffing for strings of 1's in excess of 5. It furnishes transmission protocol knowledge and management.
Layer 1: The physical layer- The physical layer is responsible for transmitting individual bits from one node to the next. This layer conveys the bit stream through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier.
Signals can be analog or digital. Analog signals can have an infinite number of values in a range; digital signals can have only a limited number of values.
Time and frequency domains
The bandwidth is a property of a medium: It is the difference between the highest and the lowest frequencies that the medium can satisfactorily pass.
Bit rate and bit interval
Error Detection and Correction
Detection
- A simple method of error detection is required to maintain data integrity
- The challenge in error detection is recognizing the different types of errors that occur in a simple and objective manner
Redundancy
Redundancy means adding extra bits for detecting errors at the destination.
There are 4 types of redundancy checks:
- vertical redundancy check (VRC)
- VRC can detect all single-bit errors.
- VRC can detect multiple-bit and burst errors only if the total number of errors is odd.
- Longitudinal redundancy check (LRC).
- Can detect multiple-bit and burst-errors.
- Cannot detect errors where an even number of bits are inverted.
- Cyclic redundancy check (CRC).
- Requires the addition of a frame check sequence (FCS) or error-detecting code to each synchronous frame.
- Performs a complex mathematical operation on the data (based on binary division).
- Message is treated as one long binary number.
- Divides entire numeric binary value of the block of data by a constant called a generator polynomial(n+1 bits).
- Quotient is discarded, and the remainder (the CRC) is appended to the block and transmitted along with the data.
- The receiver divides the data unit by the same number. If there is no remainder, message is intact.
- checksum
- The error detection method used by the higher layer protocols of the OSI model is called checksum .
- Computing a sum based upon the ASCII character
Error Correction
VRC, LRC, checksum, and CRC are effective in detecting errors, but cannot automatically correct the data.
- Error correcting codes are more sophisticated than error-detection codes and require more redundancy bits.
- The number of bits required correcting a multiple-bit or burst error is so high that it becomes too inefficient to correct.
Single-Bit Error Correction
- The object of error correction is to locate the invalid bit or bits.
- A redundancy code should adequately reflect all possible error locations.
Hamming Code
- The Hamming code is a method of error detection and error correction.
- These redundancy bits are a function of the length of the data bits.
- For a data unit of m bits, the formula 2 r > m + r + 1 to determine r , the number of redundant bits needed.
- Each r bit is the VRC bit for one combination of data bits; r 2 is the VRC bit for another combination of data bits, etc. (e.g. a 7-bit ASCII string would require 4 redundancy bits)
- The receiver recalculates the VRC using the same sets of bits used by the sender plus the relevant parity ( r ) bit for each set.
- It then assembles the new parity values into a binary number in order of r position.
- Once a bit error is detected, the receiver can reverse its value and correct the error.
Single-bit error
Error
Detection
Multiple-Bit Error Correction
- Redundancy bits calculated on overlapping sets of data bits can also be used to correct multiple-bit errors.
- Requires more sophisticated schemes.
5 component of data communication:
- Sender
- Receiver
- Medium
- Massage
- Protocol
Type of Data Flow:
- Simplex : mainframe to monitor only
- Half duplex: between 2 workstation one direction way at one time.
- Full duplex: both directions at one time.
2 type of connection:
- Point to point
- Multipoint
4 type of topology:
- Mesh
- Star
- Bus
- Ring
______________________________________________________
Chaper 2
hyEp..
ReplyDeletelike editing pic??
lets comment my editing pic..
=)
thanx~