DCN Unit 3
DCN Unit 3
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
2
1. Single-Bit Error
It is nothing but a special type of transmission error. During transmission of data packets from one networking
device to another, if only one bit from this whole data packet is being changed/corrupted/altered then Single-
bit transmission error occurs. This single bit corruption can be occurred due to induced noise in data
transmission cable or presence of electromagnetic interference.
Block diagram for Single-Bit error
2. Burst Error
Similarly it is one kind of Transmission error and very likely to single bit error. But in Burst error, multiple
data bits of a data packets are being changed/corrupted/ altered during transmission. And these multibit
corruption occurs in a very short period so it is called ‘Burst’. Communication line interference, impulsive
noise are the main factors which lead to burst error. As multiple bit are being corrupted so it can fully corrupt
a data packet and making it fully valueless. Burst errors can be rectified by retransmission but it consumes
additional network resources and burst error can occur in that also.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
3
At the data link layer, it extracts the message from the sender and provides it to the receiver by providing the
sender’s and receiver’s addresses. The advantage of using frames is that data is broken up into recoverable
chunks that can easily be checked for corruption.
The process of dividing the data into frames and reassembling it is transparent to the user and is handled by
the data link layer.
Framing is an important aspect of data link layer protocol design because it allows the transmission of data to
be organized and controlled, ensuring that the data is delivered accurately and efficiently.
Problems in Framing
Detecting start of the frame: When a frame is transmitted, every station must be able to detect it. Station detects
frames by looking out for a special sequence of bits that marks the beginning of the frame i.e. SFD (Starting
Frame Delimiter).
How does the station detect a frame: Every station listens to link for SFD pattern through a sequential circuit.
If SFD is detected, sequential circuit alerts station. Station checks destination address to accept or reject frame.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
4
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
5
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
6
Framing in the Data Link Layer also presents some challenges, which include:
Variable frame length: The length of frames can vary depending on the data being transmitted, which can lead
to inefficiencies in transmission. To address this issue, protocols such as HDLC and PPP use a flag sequence
to mark the start and end of each frame.
Bit stuffing: Bit stuffing is a technique used to prevent data from being interpreted as control characters by
inserting extra bits into the data stream. However, bit stuffing can lead to issues with synchronization and
increase the overhead of the transmission
Synchronization: Synchronization is critical for ensuring that data frames are transmitted and received
correctly. However, synchronization can be challenging, particularly in high-speed networks where frames
are transmitted rapidly.
Error detection: Data Link Layer protocols use various techniques to detect errors in the transmitted data, such
as checksums and CRCs. However, these techniques are not foolproof and can miss some types of errors.
Efficiency: Efficient use of available bandwidth is critical for ensuring that data is transmitted quickly and
reliably. However, the overhead associated with framing and error detection can reduce the overall efficiency
of the transmission.
The sender while creating a frame counts the number of 1s in it. For example, if even parity is used and number
of 1s is even then one bit with value 0 is added. This way number of 1s remains even. If the number of 1s is
odd, to make it even a bit with value 1 is added.
The receiver simply counts the number of 1s in a frame. If the count of 1s is even and even parity is used, the
frame is considered to be not-corrupted and is accepted. If the count of 1s is odd and odd parity is used, the
frame is still not corrupted.
If a single bit flips in transit, the receiver can detect it by counting the number of 1s. But when more than one
bits are erroneous, then it is very hard for the receiver to detect the error.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
7
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
8
Receiver Site:
10101001 subunit 1
00111001 subunit 2
00011101 checksum
11111111 sum
00000000 sum's complement
Result is zero, it means no error.
Example 2 -Suppose that the sender wants to send 4 frames each of 8 bits, where the frames are 11001100,
10101010, 11110000 and 11000011.
The sender adds the bits using 1s complement arithmetic. While adding two numbers using 1s complement
arithmetic, if there is a carry over, it is added to the sum.
After adding all the 4 frames, the sender complements the sum to get the checksum, 11010011, and sends it
along with the data frames.
The receiver performs 1s complement arithmetic sum of all the frames including the checksum. The result is
complemented and found to be 0. Hence, the receiver assumes that no error has occurred.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
9
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
10
Bits: ? ? 1 ? 0 1 1
Step 3: Calculate the Parity Bits
Now, we calculate the parity bits:
P1 (position 1): Checks bits 1, 3, 5, 7 (positions with 1, 3, 5, 7):
Bits 1, 3, 5, 7 = P1, 1, 0, 1
We want an even number of 1s. Currently, there are two 1s, so P1 must be 0 (even number of 1s).
P2 (position 2): Checks bits 2, 3, 6, 7 (positions with 2, 3, 6, 7):
Bits 2, 3, 6, 7 = P2, 1, 1, 1
We want an even number of 1s. Currently, there are three 1s, so P2 must be 1 (odd number of 1s, flip it to
even).
P4 (position 4): Checks bits 4, 5, 6, 7 (positions with 4, 5, 6, 7):
Bits 4, 5, 6, 7 = P4, 0, 1, 1
We want an even number of 1s. Currently, there are two 1s, so P4 must be 0 (even number of 1s).
Step 4: Final Code Word
After calculating the parity bits, the final code word is:
Position: 1 2 3 4 5 6 7
Bit type: P P D P D D D
Bits: 0 1 1 0 0 1 1
So, the encoded message is 0110011.
Step 5: Error Detection and Correction
If a bit error occurs during transmission, the receiver can use the parity bits to check and correct the error.
Each parity bit will check the positions it's responsible for, and if there’s a mismatch in parity, it will indicate
the position of the erroneous bit. With this information, the receiver can correct the error by flipping the
incorrect bit.
Hamming code adds parity bits to the original data to create an error-detecting and error-correcting code. By
calculating the parity bits based on the data, it ensures that single-bit errors can be detected and corrected
during transmission.
Automatic Repeat reQuest (ARQ)
Automatic Repeat ReQuest (ARQ) is a group of error – control protocols for transmission of data over noisy
or unreliable communication network. These protocols reside in the Data Link Layer and in the Transport
Layer of the OSI (Open Systems Interconnection) reference model. They are named so because they provide
for automatic retransmission of frames that are corrupted or lost during transmission. ARQ is also called
Positive Acknowledgement with Retransmission (PAR).
ARQs are used to provide reliable transmissions over unreliable upper layer services. They are often used in
Global System for Mobile (GSM) communication.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
11
Working Principle
In these protocols, the receiver sends an acknowledgement message back to the sender if it receives a frame
correctly. If the sender does not receive the acknowledgement of a transmitted frame before a specified period
of time, i.e. a timeout occurs, the sender understands that the frame has been corrupted or lost during transit.
So, the sender retransmits the frame. This process is repeated until the correct frame is transmitted.
Types of ARQ Protocols
There are three ARQ protocols in the data link layer.
Stop – and – Wait ARQ − Stop – and – wait ARQ provides unidirectional data transmission with flow control
and error control mechanisms, appropriate for noisy channels. The sender keeps a copy of the sent frame. It
then waits for a finite time to receive a positive acknowledgement from receiver. If the timer expires, the frame
is retransmitted. If a positive acknowledgement is received then the next frame is sent.
Go – Back – N ARQ − Go – Back – N ARQ provides for sending multiple frames before receiving the
acknowledgement for the first frame. It uses the concept of sliding window, and so is also called sliding
window protocol. The frames are sequentially numbered and a finite number of frames are sent. If the
acknowledgement of a frame is not received within the time period, all frames starting from that frame are
retransmitted.
Selective Repeat ARQ − This protocol also provides for sending multiple frames before receiving the
acknowledgement for the first frame. However, here only the erroneous or lost frames are retransmitted, while
the good frames are received and buffered.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
12
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
13
The 802.11 architecture provides some basic services for WLANs whose implementation is supported by
MAC layer:
Basic Service Set
The Basic Service Set configuration consists of a group of stations and relies on an Access Point (AP), which
serves as a logical hub. Stations from different BSSs interact through the AP, which functions as a bridge,
linking multiple WLAN cells or channels.
Operating Modes
Depending upon the mode of operation, BSS can be categorized into the following types:
Infrastructure BSS: Communication between stations takes place through access points. The AP and its
associated wireless clients define the coverage area and form the BSS.
Independent BSS - Supports mutual communication between wireless clients. An ad-hoc network is
spontaneously created and does not support access to wired networks.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
14
ESS connects multiple BSSs and consists of several BSS cells, which can be interlinked through wired or
wireless backbones known as a distributed system. Multiple cells use the same channel to boost aggregate
throughput to network. The equipment outside of the ESS, the ESS and all of its mobile stations comprise a
single MAC layer network where all stations are virtually stationary. Thus, all stations within the ESS appear
stationary from an outsider's perspective.
Other components includes:
Distribution System (DS): Links APs within the ESS.
Portal: Serves as a gateway to other networks.
Roaming: In an environment with multiple access points (like a large office building or campus), a device can
move from the range of one AP to another and still maintain its connection. This is possible due to the
underlying architecture of the IEEE 802.11 standard which allows for roaming between APs.
Authentication and Association: Before a station can send or receive data frames on a WLAN, it needs to
establish its identity with an AP. This process is called authentication. After authentication, the station then
establishes a data link-layer connection with the AP through a process called association.
IEEE 802.11 standards are a set of wireless LAN protocols that differ in frequency, data rate, and interference
control.
IEEE 802.11 versions
IEEE 802.11 was the original version released in 1997. It provided 1 Mbps or 2 Mbps data rate in the 2.4 GHz
band and used either frequency-hopping spread spectrum (FHSS) or direct-sequence spread spectrum (DSSS).
It is obsolete now.
IEEE 802.11a
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
15
802.11a was published in 1999 as a modification to 802.11, with orthogonal frequency division multiplexing
(OFDM) based air interface in physical layer instead of FHSS or DSSS of 802.11. It provides a maximum
data rate of 54 Mbps operating in the 5 GHz band. Besides it provides error correcting code. As 2.4 GHz band
is crowded, relatively sparsely used 5 GHz imparts additional advantage to 802.11a.
Further amendments to 802.11a are 802.11ac, 802.11ad, 802.11af, 802.11ah, 802.11ai, 802.11aj etc.
IEEE 802.11b
802.11b is a direct extension of the original 802.11 standard that appeared in early 2000. It uses the same
modulation technique as 802.11, i.e. DSSS and operates in the 2.4 GHz band. It has a higher data rate of 11
Mbps as compared to 2 Mbps of 802.11, due to which it was rapidly adopted in wireless LANs. However,
since 2.4 GHz band is pretty crowded, 802.11b devices faces interference from other devices.
Further amendments to 802.11b are 802.11ba, 802.11bb, 802.11bc, 802.11bd and 802.11be.
IEEE 802.11g
802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and provides a average
throughput of 22 Mbps. It uses OFDM technique (as in 802.11a). It is fully backward compatible with 802.11b.
802.11g devices also faces interference from other devices operating in 2.4 GHz band.
IEEE 802.11n
802.11n was approved and published in 2009 that operates on both the 2.4 GHz and the 5 GHz bands. It has
variable data rate ranging from 54 Mbps to 600 Mbps. It provides a marked improvement over previous
standards 802.11 by incorporating multiple-input multiple-output antennas (MIMO antennas).
IEEE 802.11p
802.11 is an amendment for including wireless access in vehicular environments (WAVE) to support
Intelligent Transportation Systems (ITS). They include network communications between vehicles moving at
high speed and the environment. They have a data rate of 27 Mbps and operate in 5.9 GHz band.
3.6 Bluetooth Architecture: Piconet, Scatternet
Bluetooth Architecture
Bluetooth is a network technology that connects mobile devices wirelessly over a short range to form a
personal area network (PAN). They use short-wavelength, ultra-high frequency (UHF) radio waves within the
range 2.400 to 2.485 GHz, instead of RS-232 data cables of wired PANs.
There are two types of Bluetooth networks −
• Piconets
• Scatternets
Piconets
Piconets are small Bluetooth networks, formed by at most 8 stations, one of which is the master node and the
rest slave nodes (maximum of 7 slaves). Master node is the primary station that manages the small network.
The slave stations are secondary stations that are synchronized with the primary station.
Communication can take place between a master node and a slave node in either one-to-one or one-to-many
manner. However, no direct communication takes place between slaves. Each station, whether master or slave,
is associated with a 48-bit fixed device address.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
16
Besides the seven active slaves, there can be up to 255 numbers of parked nodes. These are in a low power
state for energy conservation. The only work that they can do is respond to a beacon frame for activation from
the master node.
Scatter nodes
A scatternet is an interconnected collection of two or more piconets. They are formed when a node in a piconet,
whether a master or a slave, acts as a slave in another piconet. This node is called the bridge between the two
piconets, which connects the individual piconets to form the scatternet.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
17
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane
18
4G (4th Generation) :
IP-based protocols.
LTE (Long term evaluation) was mainly for the internet.
Vo-LTE (Voice over LTE) is for both voice and the internet.
Freedom and flexibility to select any desired service with reasonable QoS.
High usability.
Supports multimedia service at a low transmission cost.
HD Quality Streaming.
Speed:-100mbps.
5G (5th Generation): It is yet to come in many countries but here are some notable points about 5G.
Higher data rates.
Connectivity will be more fast and more secure,
Data Latency will be reduced to a great level.
Massive network capacity.
It is 30 times faster than 4G.
There would be more flexibility in the network.
Data Communication & Computer networking Mrs. Archana Kalia VPM’s Polytechnic,Thane