Integrity in Data Communications
description
Transcript of Integrity in Data Communications
![Page 1: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/1.jpg)
Integrity in DataIntegrity in Data CommunicationsCommunications
Packets, Frames and Error Packets, Frames and Error DetectionDetection
![Page 2: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/2.jpg)
More About PacketsMore About Packets
Networks do not transfer arbitrary amounts of Networks do not transfer arbitrary amounts of data for 2 reasons:data for 2 reasons:
1.1. Errors in large blocks cause large delays.Errors in large blocks cause large delays. --Senders and receivers have to coordinate Senders and receivers have to coordinate
transmission. Errors often occur. transmission. Errors often occur. -Dividing data into small blocks allows the -Dividing data into small blocks allows the
sending and receiving computers to make fast sending and receiving computers to make fast re- re- transmission. transmission.
These networks are called ‘packet networks’ or packet
switching networks’
![Page 3: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/3.jpg)
More About PacketsMore About Packets
2. 2. Computers have to share underlying connections Computers have to share underlying connections in hardware.in hardware.
-Communications channels are expensive so -Communications channels are expensive so sharing allows all to be treated equally. sharing allows all to be treated equally.
Early networks allowed an application to hold a Early networks allowed an application to hold a resource until finished.resource until finished.
![Page 4: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/4.jpg)
Packets and Time-Division Packets and Time-Division MultiplexingMultiplexing
Computers take turns sending and receiving Computers take turns sending and receiving small packets of data.small packets of data.
1
2
3
Computer 1 using channel to send packet.
Multiplexing occurs here.
![Page 5: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/5.jpg)
Packets and Time-Division Packets and Time-Division MultiplexingMultiplexing
Computers take turns sending and receiving Computers take turns sending and receiving small packets of data.small packets of data.
1
2
3
Computer 2 using channel to send packet.
Multiplexing occurs here.
![Page 6: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/6.jpg)
Packets and Time-Division Packets and Time-Division MultiplexingMultiplexing
Computers take turns sending and receiving Computers take turns sending and receiving small packets of data.small packets of data.
1
2
3
Computer 3 using channel to send packet.
Multiplexing occurs here.
![Page 7: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/7.jpg)
Packets and Time-Division Packets and Time-Division MultiplexingMultiplexing
Computers take turns sending and receiving Computers take turns sending and receiving small packets of data.small packets of data.
A source with a small total amount will finish A source with a small total amount will finish promptly.promptly.
Larger amounts will take longer.Larger amounts will take longer.
Data are arriving at two or more computers Data are arriving at two or more computers simultaneously.simultaneously.
![Page 8: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/8.jpg)
Packets and Hardware FramesPackets and Hardware Frames
Packet = small block of data (General)Packet = small block of data (General) Hardware technology defines size.Hardware technology defines size. Frame = term used for specific hardware Frame = term used for specific hardware
``packet``.``packet``.
![Page 9: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/9.jpg)
Packets and Hardware FramesPackets and Hardware Frames
Packet = small block of data (General)Packet = small block of data (General) Hardware technology defines size.Hardware technology defines size. Frame = term used for specific hardware Frame = term used for specific hardware
``packet``.``packet``.
soh block of data in frame eot
![Page 10: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/10.jpg)
Packets and Hardware FramesPackets and Hardware Frames
Packet = small block of data (General)Packet = small block of data (General) Hardware technology defines size.Hardware technology defines size. Frame = term used for specific hardware Frame = term used for specific hardware
``packet``.``packet``.
Hex 01Hex 01 Hex 04Hex 04
soh block of data in frame eot
Unprintable ASCII
Characters
![Page 11: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/11.jpg)
Packets and Hardware FramesPackets and Hardware Frames
Packet = small block of data (General)Packet = small block of data (General) Hardware technology defines size.Hardware technology defines size. Frame = term used for specific hardware Frame = term used for specific hardware
``packet``.``packet``. Disadvantage is overhead.Disadvantage is overhead. Advantage is reliability.Advantage is reliability.
![Page 12: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/12.jpg)
Byte StuffingByte Stuffing
Most networks cannot afford to reserve Most networks cannot afford to reserve characters.characters.
Systems never confuse data with control Systems never confuse data with control information.information.
So extra bits or bytes are inserted to change So extra bits or bytes are inserted to change data for transmission.data for transmission.
i.e. bit or byte stuffingi.e. bit or byte stuffing The esc character is Hex 1BThe esc character is Hex 1B
![Page 13: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/13.jpg)
Byte StuffingByte Stuffing
Character CharactersCharacter Characters in Data Sentin Data Sent
______________________________________________________________________
sohsoh esc x esc xeoteot esc y esc yescesc esc z esc z
![Page 14: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/14.jpg)
Transmission ErrorsTransmission Errors
Parity Checking (RS 232)Parity Checking (RS 232) ChecksumsChecksums
16 bit checksums16 bit checksums Break data into 16 bit (2byte) segmentsBreak data into 16 bit (2byte) segments
Sum the valuesSum the valuesSend the sum in with the transmissionSend the sum in with the transmissionReceiver compares answers after transmissionReceiver compares answers after transmission
![Page 15: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/15.jpg)
Transmission ErrorsTransmission Errors
ChecksumsChecksums
H e l l o w o r l d .H e l l o w o r l d .
![Page 16: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/16.jpg)
Transmission ErrorsTransmission Errors
ChecksumsChecksums
H e l l o w o r l d .H e l l o w o r l d .
48 65 6C 6C 6F 20 77 6F 72 6C 64 2E
![Page 17: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/17.jpg)
Transmission ErrorsTransmission Errors
ChecksumsChecksums
H e l l o w o r l d .H e l l o w o r l d .
48 65 6C 6C 6F 20 77 6F 72 6C 64 2E
4865 + 6C6C + 6F20 + 776F + 726C + 642E + carry = 71FC
![Page 18: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/18.jpg)
EthernetEthernet
Bus topology (10/100 Megabits)Bus topology (10/100 Megabits) Gigabit Ethernet (Uses fibre as well)Gigabit Ethernet (Uses fibre as well) Hardware monitors bus for carrierHardware monitors bus for carrier No carrier – Sender transmitsNo carrier – Sender transmits Carrier – sender waitsCarrier – sender waits CollisionsCollisions
Senders use a random number generator to Senders use a random number generator to calculate delay timecalculate delay time
If collision occurs again the range of the If collision occurs again the range of the random number generator is increased.random number generator is increased.
![Page 19: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/19.jpg)
ATM TechnologyATM Technology
Designed for voice, video & dataDesigned for voice, video & dataVoice and video require low delay and jitterVoice and video require low delay and jitterVideo also requires much higher data rateVideo also requires much higher data rate
![Page 20: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/20.jpg)
ATM TechnologyATM Technology
Packets should maximize payloadPackets should maximize payload8 Kbytes is common in some networks8 Kbytes is common in some networksPhone systems use an 8 bit audio sample Phone systems use an 8 bit audio sample
every 125 microsecond (millionth of second)every 125 microsecond (millionth of second)Sender must delay more than a second to Sender must delay more than a second to
accumulate enough samples to fill a packetaccumulate enough samples to fill a packetTelephone systems employ echo cancellation Telephone systems employ echo cancellation
techniquestechniquesLarge packets also create an echo problem Large packets also create an echo problem
ATM divides all data into fixed ``cells``ATM divides all data into fixed ``cells``48 octets for data48 octets for data5 octets of header information5 octets of header information
![Page 21: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/21.jpg)
ATM TechnologyATM Technology
Nortel has developed 6.4 TbpsNortel has developed 6.4 Tbps Commercial platform of 6.4 Tbps was available Commercial platform of 6.4 Tbps was available
in 2001.in 2001. Uses Dense-wavelength division multiplexing.Uses Dense-wavelength division multiplexing. Designed to deliver 99.9999% reliabilityDesigned to deliver 99.9999% reliability
![Page 22: Integrity in Data Communications](https://reader035.fdocuments.in/reader035/viewer/2022081515/56813b2d550346895da3f832/html5/thumbnails/22.jpg)
The End.The End.