SlideShare a Scribd company logo
1 of 25
Download to read offline
DATA LINK LAYER
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 1
CREDITS
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 2
Tanenbaum
MRS sir
Google
Fourozen
CONTENT
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 3
Introduction
Addressing
Error detection and correction
INTRODUCTION
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 4
The data link layer is
responsible for moving
frames from one hop
(node) to the next.
ADDRESSING
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 5
Four levels of addresses are used in an internet employing
the TCP/IP protocols:
physical,
logical,
port,
and specific.
RELATIONSHIP OF LAYERS AND ADDRESSES IN TCP/IP
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 6
PHYSICAL ADDRESS
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 7
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
IP ADDRESS
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 8
PORT ADDRESS
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 9
 shows two computers communicating via the
Internet.
 The sending computer is running three processes
at this time with port addresses a, b, and c.
 The receiving computer is running two processes
at this time with port addresses j and k.
 Process a in the sending computer needs to
communicate with process j in the receiving
computer.
 Note that although physical addresses change
from hop to hop, logical and port addresses remain
the same from the source to destination.
The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.
ERROR DETECTION AND CORRECTION
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 10
Data can be corrupted
during transmission.
Some applications require that
errors be detected and corrected.
Types of errors
SINGLE BIT ERROR
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 11
In a single-bit error, only 1 bit in the data unit has changed.
BURST ERROR
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 12
A burst error means that 2 or more bits in the data unit have
changed.
To detect or correct errors, we need to send extra (redundant)
bits with data.
THE STRUCTURE OF ENCODER AND DECODER
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 13
XOR’ING OF TWO SINGLE BITS OR TWO WORDS
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 14
BLOCK CODING
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 15
In block coding, we divide our
message into blocks, each of k bits,
called datawords.
We add r redundant bits to each
block to make the length n = k + r.
The resulting n-bit blocks are called
codewords.
PROCESS OF ERROR DETECTION IN BLOCK CODING
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 16
 The 4B/5B block is a good
example of this type of coding.
 In this coding scheme, k = 4
and n = 5.
 As we saw, we have 2k = 16
data words and 2n = 32 code
words.
 We saw that 16 out of 32 code
words are used for message
transfer and the rest are either
used for other purposes or
unused.
PROCESS OF ERROR DETECTION IN BLOCK CODING
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 17
 Let us assume that k = 2 and n = 3.
 Later, we will see how to derive a code word from a data word.
 Assume the sender encodes the data word 01 as 011 and
 sends it to the receiver.
An error-detecting code can detect
only the types of errors for which it is designed; other types of
errors may remain undetected.
PROCESS OF ERROR DETECTION IN BLOCK CODING
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 18
Consider the following cases:
1. The receiver receives 011. It is a valid code word. The
receiver extracts the data word 01 from it.
2. The code word is corrupted during transmission, and 111
is received. This is not a valid code word and is discarded.
3. The code word is corrupted during transmission, and 000
is received. This is a valid code word. The receiver
incorrectly extracts the data word 00. Two corrupted bits
have made the error undetectable.
STRUCTURE OF ENCODER AND DECODER IN ERROR
CORRECTION
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 19
ERROR CORRECTION
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 20
 Let us add more redundant bits to before data words, to see if the receiver can correct an error
without knowing what was actually sent.
 We add 3 redundant bits to the 2-bit data word to make 5-bit code words.
 Assume the data word is 01. The sender creates the code word 01011.
 The code word is corrupted during transmission, and 01001 is received.
 First, the receiver finds that the received code word is not in the table. This means an error has
occurred.
 The receiver, assuming that there is only 1 bit corrupted,
 uses the following strategy to guess the correct data word.
ERROR CORRECTION
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 21
1. Comparing the received code word with the first code word in the table
(01001 versus 00000), the receiver decides that the first code word is not
the one that was sent because there are two different bits.
2. By the same reasoning, the original code word cannot be the third or fourth
one in the table.
3. The original code word must be the second one in the table because this is
the only one that differs from the received code word by 1 bit. The receiver
replaces 01001 with 01011 and consults the table to find the data word
01.
HAMMING DISTANCE
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 22
 The Hamming distance between two words is the number of differences between corresponding
bits.
 The minimum Hamming distance is the smallest Hamming distance between
all possible pairs in a set of words.
 Let us find the Hamming distance between two pairs of words.
 The Hamming distance d(000, 011) is 2 because
 The Hamming distance d(10101, 11110) is 3 because
SUMMARY
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 23
Introduction
Addressing
Error detection and correction
ANY CLARIFICATIONS?
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 24
THANK YOU
1/29/2021
VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 25

More Related Content

Similar to Unit 2 part-1

Fpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageFpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageeSAT Journals
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxArunVerma37053
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesIJTET Journal
 
Data Communications (under graduate course) Lecture 5 of 5
Data Communications (under graduate course) Lecture 5 of 5Data Communications (under graduate course) Lecture 5 of 5
Data Communications (under graduate course) Lecture 5 of 5Randa Elanwar
 
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...IJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
 
Introduction to Channel Coding.pdf
Introduction to Channel Coding.pdfIntroduction to Channel Coding.pdf
Introduction to Channel Coding.pdfJimma University
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPVLSICS Design
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...IOSR Journals
 
Cmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash Adc
Cmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash AdcCmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash Adc
Cmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash AdcIOSRJECE
 
Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...IJECEIAES
 
Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.pptKashfUlHuda1
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 

Similar to Unit 2 part-1 (20)

Fpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageFpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text message
 
Unit 1 part-1
Unit 1 part-1Unit 1 part-1
Unit 1 part-1
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 
Data Communications (under graduate course) Lecture 5 of 5
Data Communications (under graduate course) Lecture 5 of 5Data Communications (under graduate course) Lecture 5 of 5
Data Communications (under graduate course) Lecture 5 of 5
 
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
20320140501004 2-3-4-5-6
20320140501004 2-3-4-5-620320140501004 2-3-4-5-6
20320140501004 2-3-4-5-6
 
Introduction to Channel Coding.pdf
Introduction to Channel Coding.pdfIntroduction to Channel Coding.pdf
Introduction to Channel Coding.pdf
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
 
Verilog HDL CODES
Verilog HDL CODES Verilog HDL CODES
Verilog HDL CODES
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...
 
Cmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash Adc
Cmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash AdcCmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash Adc
Cmos Full Adder and Multiplexer Based Encoder for Low Resolution Flash Adc
 
Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...
 
Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.ppt
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
 
Dn4301681689
Dn4301681689Dn4301681689
Dn4301681689
 

More from Vikram Nandini

IoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarIoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarVikram Nandini
 
Linux File Trees and Commands
Linux File Trees and CommandsLinux File Trees and Commands
Linux File Trees and CommandsVikram Nandini
 
Introduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsIntroduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsVikram Nandini
 
Manufacturing - II Part
Manufacturing - II PartManufacturing - II Part
Manufacturing - II PartVikram Nandini
 
Prototyping Online Components
Prototyping Online ComponentsPrototyping Online Components
Prototyping Online ComponentsVikram Nandini
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural NetworksVikram Nandini
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected DevicesVikram Nandini
 
Communication in the IoT
Communication in the IoTCommunication in the IoT
Communication in the IoTVikram Nandini
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityVikram Nandini
 
cloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfcloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfVikram Nandini
 
Introduction to Web Technologies
Introduction to Web TechnologiesIntroduction to Web Technologies
Introduction to Web TechnologiesVikram Nandini
 
Cascading Style Sheets
Cascading Style SheetsCascading Style Sheets
Cascading Style SheetsVikram Nandini
 

More from Vikram Nandini (20)

IoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarIoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold Bar
 
Design Patterns
Design PatternsDesign Patterns
Design Patterns
 
Linux File Trees and Commands
Linux File Trees and CommandsLinux File Trees and Commands
Linux File Trees and Commands
 
Introduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsIntroduction to Linux & Basic Commands
Introduction to Linux & Basic Commands
 
INTRODUCTION to OOAD
INTRODUCTION to OOADINTRODUCTION to OOAD
INTRODUCTION to OOAD
 
Ethics
EthicsEthics
Ethics
 
Manufacturing - II Part
Manufacturing - II PartManufacturing - II Part
Manufacturing - II Part
 
Manufacturing
ManufacturingManufacturing
Manufacturing
 
Business Models
Business ModelsBusiness Models
Business Models
 
Prototyping Online Components
Prototyping Online ComponentsPrototyping Online Components
Prototyping Online Components
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
 
IoT-Prototyping
IoT-PrototypingIoT-Prototyping
IoT-Prototyping
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected Devices
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Embedded decices
Embedded decicesEmbedded decices
Embedded decices
 
Communication in the IoT
Communication in the IoTCommunication in the IoT
Communication in the IoT
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
cloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfcloud computing UNIT-2.pdf
cloud computing UNIT-2.pdf
 
Introduction to Web Technologies
Introduction to Web TechnologiesIntroduction to Web Technologies
Introduction to Web Technologies
 
Cascading Style Sheets
Cascading Style SheetsCascading Style Sheets
Cascading Style Sheets
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Unit 2 part-1

  • 1. DATA LINK LAYER 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 1
  • 2. CREDITS 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 2 Tanenbaum MRS sir Google Fourozen
  • 3. CONTENT 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 3 Introduction Addressing Error detection and correction
  • 4. INTRODUCTION 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 4 The data link layer is responsible for moving frames from one hop (node) to the next.
  • 5. ADDRESSING 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 5 Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific.
  • 6. RELATIONSHIP OF LAYERS AND ADDRESSES IN TCP/IP 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 6
  • 7. PHYSICAL ADDRESS 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 7 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.
  • 8. IP ADDRESS 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 8
  • 9. PORT ADDRESS 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 9  shows two computers communicating via the Internet.  The sending computer is running three processes at this time with port addresses a, b, and c.  The receiving computer is running two processes at this time with port addresses j and k.  Process a in the sending computer needs to communicate with process j in the receiving computer.  Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. The physical addresses will change from hop to hop, but the logical addresses usually remain the same.
  • 10. ERROR DETECTION AND CORRECTION 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 10 Data can be corrupted during transmission. Some applications require that errors be detected and corrected. Types of errors
  • 11. SINGLE BIT ERROR 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 11 In a single-bit error, only 1 bit in the data unit has changed.
  • 12. BURST ERROR 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 12 A burst error means that 2 or more bits in the data unit have changed. To detect or correct errors, we need to send extra (redundant) bits with data.
  • 13. THE STRUCTURE OF ENCODER AND DECODER 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 13
  • 14. XOR’ING OF TWO SINGLE BITS OR TWO WORDS 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 14
  • 15. BLOCK CODING 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 15 In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.
  • 16. PROCESS OF ERROR DETECTION IN BLOCK CODING 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 16  The 4B/5B block is a good example of this type of coding.  In this coding scheme, k = 4 and n = 5.  As we saw, we have 2k = 16 data words and 2n = 32 code words.  We saw that 16 out of 32 code words are used for message transfer and the rest are either used for other purposes or unused.
  • 17. PROCESS OF ERROR DETECTION IN BLOCK CODING 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 17  Let us assume that k = 2 and n = 3.  Later, we will see how to derive a code word from a data word.  Assume the sender encodes the data word 01 as 011 and  sends it to the receiver. An error-detecting code can detect only the types of errors for which it is designed; other types of errors may remain undetected.
  • 18. PROCESS OF ERROR DETECTION IN BLOCK CODING 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 18 Consider the following cases: 1. The receiver receives 011. It is a valid code word. The receiver extracts the data word 01 from it. 2. The code word is corrupted during transmission, and 111 is received. This is not a valid code word and is discarded. 3. The code word is corrupted during transmission, and 000 is received. This is a valid code word. The receiver incorrectly extracts the data word 00. Two corrupted bits have made the error undetectable.
  • 19. STRUCTURE OF ENCODER AND DECODER IN ERROR CORRECTION 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 19
  • 20. ERROR CORRECTION 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 20  Let us add more redundant bits to before data words, to see if the receiver can correct an error without knowing what was actually sent.  We add 3 redundant bits to the 2-bit data word to make 5-bit code words.  Assume the data word is 01. The sender creates the code word 01011.  The code word is corrupted during transmission, and 01001 is received.  First, the receiver finds that the received code word is not in the table. This means an error has occurred.  The receiver, assuming that there is only 1 bit corrupted,  uses the following strategy to guess the correct data word.
  • 21. ERROR CORRECTION 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 21 1. Comparing the received code word with the first code word in the table (01001 versus 00000), the receiver decides that the first code word is not the one that was sent because there are two different bits. 2. By the same reasoning, the original code word cannot be the third or fourth one in the table. 3. The original code word must be the second one in the table because this is the only one that differs from the received code word by 1 bit. The receiver replaces 01001 with 01011 and consults the table to find the data word 01.
  • 22. HAMMING DISTANCE 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 22  The Hamming distance between two words is the number of differences between corresponding bits.  The minimum Hamming distance is the smallest Hamming distance between all possible pairs in a set of words.  Let us find the Hamming distance between two pairs of words.  The Hamming distance d(000, 011) is 2 because  The Hamming distance d(10101, 11110) is 3 because
  • 23. SUMMARY 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 23 Introduction Addressing Error detection and correction
  • 24. ANY CLARIFICATIONS? 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 24
  • 25. THANK YOU 1/29/2021 VIKRAM NEERUGATTI, PROF. & HOD, DEPT. OF CSE, AUDISANKARA INSTITUTE OF TECHNOLOGY, GUDURU. 25