DCC Chapter 3 Notes - Ur Engineering Friend
DCC Chapter 3 Notes - Ur Engineering Friend
DCC Chapter 3 Notes - Ur Engineering Friend
Computer Network
UR Engineering Friend
Types of Error
There are generally two types of errors that can occur in error detection and correction:
1. Single-bit errors: These errors occur when only one bit in a data block is
flipped from 0 to 1 or from 1 to 0. Single-bit errors can be easily detected and
corrected using techniques such as parity checking or cyclic redundancy check
(CRC).
2. Burst errors: These errors occur when two or more bits in a data block are
flipped consecutively. Burst errors can be more difficult to detect and correct than
single-bit errors. Techniques such as Reed-Solomon codes or convolutional codes are
commonly used to detect and correct burst errors. These techniques involve adding
redundant data to the original data to allow for error detection and correction.
Diagram of Single and Burst Error
In addition to these two types of errors, there are also other factors that can affect error
detection and correction, such as the quality of the transmission medium or the distance
between the sender and receiver. As a result, different error detection and correction
techniques may be more suitable for different types of communication channels and
scenarios.
Redundancy
There are various types of redundancy that can be used in different contexts:
1. Hardware redundancy: This involves using additional hardware components in a
system to provide backup in case of component failure. Examples include redundant
power supplies, redundant disk arrays, and redundant network connections.
2. Software redundancy: This involves using additional software components or
processes to provide backup in case of software failure. Examples include backup and
restore processes, failover mechanisms, and redundant data storage.
3. Information redundancy: This involves including additional information in a
message or data block to improve its accuracy and reliability. Examples include
checksums, error-correcting codes, and redundancy in data transmission protocols.
4. Time redundancy: This involves repeating a task or process multiple times to reduce
the likelihood of errors or failures. Examples include repeated testing or validation of
data, or multiple attempts to transmit a message.
Overall, redundancy is a key concept in engineering and design, as it helps to improve the
robustness and reliability of systems and processes, and can reduce the risk of errors and
failures.
Sure, here is an explanation of LRC, CRC, and VRC, which are commonly used error
detection techniques:
Example
3. Vertical Redundancy Check (VRC): VRC is a simple error detection technique that
adds an extra parity bit to each character or byte of data. The parity bit is set to 1 or 0
to make the total number of 1s in the character or byte even or odd. When the data is
transmitted, the receiver checks the parity bit of each character or byte and compares
it to the expected parity. If the parity does not match, an error is detected. VRC is also
a commonly used error detection technique in low-speed communication systems, but
it has a limited error detection capability since it can only detect errors in characters
or bytes.
In summary, LRC, CRC, and VRC are all techniques used to detect errors in transmitted data.
LRC and VRC are simpler techniques that add a parity bit to each row, column, character or
byte of data to detect errors, while CRC is a more advanced technique that uses a polynomial
division algorithm to add a checksum to the data for error detection. CRC is widely used in
modern communication systems due to its high accuracy in detecting errors.
The IEEE 802 standards are a set of protocols for network communication, developed by the
Institute of Electrical and Electronics Engineers (IEEE). Here is a brief overview of some of
the key standards in the 802 series:
1. IEEE 802.1: This standard defines the architecture and functionality of Local Area
Networks (LANs) and Metropolitan Area Networks (MANs). It includes protocols for
bridging, virtual LANs (VLANs), and Quality of Service (QoS).
2. IEEE 802.2: This standard specifies the Logical Link Control (LLC) layer of the data
link layer in a network. It defines the interface between the media access control
(MAC) layer and the network layer.
3. IEEE 802.3: This standard, also known as Ethernet, defines the physical and MAC
layer specifications for wired LANs. It specifies the data rate, frame format, and
signalling of Ethernet networks.
4. IEEE 802.4: This standard specifies the Token Bus protocol, which is used for
communication between devices in a network. It defines the token passing mechanism
used to control access to the network.
5. IEEE 802.5: This standard specifies the Token Ring protocol, which is another
method for controlling access to a network. It defines the ring topology used in Token
Ring networks and the token passing mechanism used to transmit data.
These are just a few examples of the many standards in the IEEE 802 series. Other standards
include IEEE 802.11 for wireless LANs, IEEE 802.15 for wireless personal area networks
(WPANs), and IEEE 802.16 for broadband wireless access (BWA).
The 802.11 wireless architecture is a set of standards developed by the Institute of Electrical
and Electronics Engineers (IEEE) for wireless local area networks (WLANs). The
architecture defines the protocols for the physical (PHY) and medium access control (MAC)
layers of wireless communication.
1. Access Point (AP): An access point is a network device that connects wireless
devices to a wired network. It acts as a central point for data transmission and receives
data from multiple wireless devices and sends it to the wired network.
2. Station (STA): A station is a device that communicates over a wireless network. It
can be a laptop, mobile phone, tablet, or any other wireless-enabled device.
3. Basic Service Set (BSS): A BSS is the basic building block of an 802.11 wireless
network. It consists of an access point and all the wireless devices that are associated
with it. The BSS is identified by a unique identifier called the Service Set Identifier
(SSID).
4. Extended Service Set (ESS): An ESS is a group of BSSs that are interconnected to
form a larger network. An ESS is identified by a common SSID, and roaming
between BSSs is possible within an ESS.
5. Distribution System (DS): A DS is a wired network that connects multiple access
points in an ESS. It allows wireless devices in one BSS to communicate with devices
in another BSS within the same ESS.
The 802.11 architecture supports different types of wireless communication protocols, such
as the 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac protocols. Each protocol has its
own specifications for data rates, frequency bands, and channel widths.
MAC Sublayer
The MAC (Media Access Control) sublayer is a sublayer of the data link layer in the OSI
(Open Systems Interconnection) model. It is responsible for managing access to the physical
medium and implementing protocols for data transmission and reception.
The MAC sublayer is divided into two sublayers: the Logical Link Control (LLC) sublayer
and the MAC Control sublayer.
1. Logical Link Control (LLC) sublayer: The LLC sublayer is responsible for
providing a reliable data link between two devices in a network. It performs functions
such as error detection and correction, flow control, and congestion control. The LLC
sublayer is independent of the physical medium and provides a common interface to
the network layer.
2. MAC Control sublayer: The MAC Control sublayer is responsible for controlling
access to the physical medium and implementing protocols for data transmission and
reception. It performs functions such as medium access control, frame
synchronization, and error detection. The MAC Control sublayer is dependent on the
physical medium and varies depending on the type of network (wired or wireless).
The MAC sublayer works closely with the Physical layer to manage the flow of data between
two devices. It determines when a device can transmit data and manages collisions that occur
when multiple devices try to transmit data simultaneously. The MAC sublayer also performs
error detection and correction to ensure that data is transmitted accurately and reliably.
Addressing Mechanism
Bluetooth architecture is based on a master-slave model, where one device (the master)
controls the communication with one or more other devices (slaves). The master device is
responsible for setting up and managing the connection with the slave devices. The Bluetooth
architecture includes two important concepts: Piconet and Scatternet.
1. Piconet: A piconet is a network consisting of one master device and up to seven slave
devices. The master device controls the communication with the slave devices and
sets the frequency hopping pattern that all devices in the piconet use to communicate.
In a piconet, the master device is responsible for initiating and maintaining the
connection with the slave devices, and can communicate with each slave device in
turn.
2. Scatternet: A scatternet is a network consisting of multiple piconets that are
connected. Each piconet has one master device and up to seven slave devices. Devices
in one piconet can communicate with devices in another piconet through the master
device of each piconet. The Bluetooth architecture supports up to 10 piconets in a
scatternet, allowing multiple devices to communicate with each other.
In a scatternet, devices can move between piconets without losing their connection. For
example, a device can be a slave in one piconet and a master in another piconet. This allows
devices to communicate with many other devices, even if they are not directly connected.
Overall, the Bluetooth architecture allows for flexible and efficient wireless communication
between devices, making it a popular technology for a wide range of applications.
Mobile Generation- 1G to 5G
1G - First Generation: The first generation of mobile networks, introduced in the 1980s,
used analogy technology for voice communication. The networks were limited to voice calls
and had limited coverage. The earliest mobile phones were large, heavy, and expensive, and
were primarily used by business professionals. The networks used a technology called
Frequency Division Multiple Access (FDMA), which divided the available frequency bands
into channels and allocated one channel to each user. 1G networks had very low data transfer
speeds and were not capable of supporting any data services beyond basic text messaging.
5G - Fifth Generation: The fifth generation of mobile networks, introduced in the late
2010s and continuing to evolve, is designed to provide significantly faster data transfer
speeds, lower latency, and higher network capacity than 4G networks. 5G networks use
advanced technologies such as beamforming, massive MIMO, and network slicing to
enable new applications such as autonomous vehicles, remote surgery, and smart cities.
5G networks also introduce new frequency bands such as millimeter-wave (mm Wave),
which provide even faster data transfer speeds but have limited coverage.