datalink layer 4/14/2008. admin r assignment 4 r mac examples survey: m gsm/3g m wireless m cable...

54
Datalink Layer 4/14/2008

Upload: emory-davidson

Post on 13-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

Datalink Layer

4/14/2008

Page 2: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

Admin

Assignment 4

MAC examples survey: GSM/3G Wireless Cable Modem (DOCSIS)

Remaining class schedule

2

Page 3: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

3

Recap: The Hourglass Architecture of the Internet

IP

Ethernet FDDIWireless

TCP UDP

Telnet Email FTP WWW

Page 4: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

4

Outline

Admin. and recap Link layer overview

Page 5: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

5

Link Layer: Introduction

Some terminology: hosts and routers are nodes (bridges and switches too)

communication channels that connect adjacent nodes along a communication path are links wired, wireless dedicated, shared

2-PDU is a frame, encapsulates datagram

“link”

Page 6: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

6

Link layer: Context

Data-link layer has responsibility of transferring datagram from one node to another node over a link

Datagram transferred by different link protocols over different links, e.g., Ethernet on first link, frame relay on

intermediate links 802.11 on last link

transportation analogy

trip from New Haven to San Francisco taxi: home to union

station train: union station

to JFK plane: JFK to San

Francisco airport shuttle: airport to

hotel

Page 7: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

7

Link Layer Services Framing, encapsulate datagram into frame,

adding header, trailer, e.g., multiplexing/demultiplexing ‘physical addresses’ used in frame headers to

identify src, dest • different from IP address !

Error detection: detect errors caused by signal attenuation, noise.

Error correction: receiver improves link qualify by identifying and

correcting bit error(s) without resorting to retransmission

Page 8: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

8

Link Layer Services (more)

Link access: channel access if shared medium

Flow control: pacing between adjacent sending and receiving nodes

Reliable delivery between adjacent nodes we learned how to do this already ! seldom used on low bit error link (fiber, some twisted

pair) common for wireless links: high error rates

Page 9: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

9

Adaptors Communicating

link layer implemented in “adaptor” (aka NIC) Ethernet card,

modem, 802.11 card

adapter is semi-autonomous, implementing link & physical layers

sending side: encapsulates datagram

in a frame adds error checking bits,

rdt, flow control, etc.

receiving side looks for errors, rdt, flow

control, etc extracts datagram,

passes to receiving node

sendingnode

frame

receivingnode

datagram

frame

adapter adapter

link layer protocol

Page 10: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

10

LAN/MAC/Physical Address

Each adapter has a unique link layer address (also called MAC address)

• used as address in datalink frames to identify the interface

• 48 bit MAC address (for most types of LANs) burned in the adapter ROM

• MAC address allocation administered by IEEE;manufacturer buys portion of MAC address space (to assure uniqueness)

Page 11: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

11

Comparison of IP address and MAC Address

IP address is hierarchical for routing scalability

IP address needs to be globally unique (if no NAT)

IP address depends on IP network to which an interface is attached NOT portable

MAC address is flat

MAC address does not need to be globally unique, but the current assignment ensures uniqueness

MAC address is assigned to a device portable

Page 12: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

12

Recall Earlier Routing Discussion

Starting at A, given IP datagram addressed to E:

look up net. address of E, find C

link layer sends datagram to C inside link-layer frame; the dest. address should be C’s MAC address

C’s MACaddr

A’s MACaddr

A’s IPaddr

E’s IPaddr

IP payload

datagramframe

frame source,dest address

datagram source,dest address

223.1.1.1

223.1.1.2

223.1.1.3

223.1.1.4 223.1.2.9

223.1.2.2

223.1.2.1

223.1.3.2223.1.3.1

223.1.3.27

A

BE

C

Question: how to determine MAC address of C knowing C’s IP address?

Page 13: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

13

ARP: Address Resolution Protocol

Each IP node (Host, Router) on LAN has ARP table

ARP Table: IP/MAC address mappings for some LAN nodes

< IP address; MAC address; TTL> TTL (Time To Live): time

after which address mapping will be forgotten (typically 20 min)

[yry3@cicada yry3]$ /sbin/arpAddress HWtype HWaddress Flags Mask Ifacezoo-gatew.cs.yale.edu ether AA:00:04:00:20:D4 C eth0artemis.zoo.cs.yale.edu ether 00:06:5B:3F:6E:21 C eth0lab.zoo.cs.yale.edu ether 00:B0:D0:F3:C7:A5 C eth0

Page 14: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

14

ARP Protocol

ARP is “plug-and-play”: nodes create their ARP tables without

intervention from net administrator

A broadcast protocol: A broadcasts query frame, containing queried

IP address • all machines on LAN receive ARP query

destination D receives ARP frame, replies• frame sent to A’s MAC address (unicast)

Page 15: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

15

Outline

Admin. and recap Link layer service Error detection

Page 16: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

16

Error Detection

D = Data protected by error checking, may include header fieldsED = Error Detection bits (redundancy)

• Error detection not 100% reliable!• a good error detector may miss some errors, but rarely• larger ED field generally yields better detection

Page 17: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

17

Error Detection: Simple Techniques Parity Checking: add a parity bit for every d data bits so that the number of ones of each d+1 data and parity bits is even (odd is also OK, so long consistent)

Internet checksum

10111 0001 1010 1011

1010 1010 0101 0101

Page 18: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

18

Cyclic Redundancy Check: Background Widely used in practice, e.g.,

Ethernet, DOCSIS (Cable Modem), FDDI, PKZIP, WinZip, PNG

For a given data D, consider it as a polynomial D(x) consider the string of 0 and 1 as the

coefficients of a polynomial• e.g. consider string 10011 as x4+x+1

addition and subtraction are modular 2, thus the same as xor

Choose generator polynomial G(x) with r+1 bits, where r is called the degree of G(x)

Page 19: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

19

Cyclic Redundancy Check: Encode Given data G(x) and D(x), choose R(x)

with r bits, such that D(x)xr+R(x) is exactly divisible by G(x)

The bits correspond to D(x)xr+R(x) are sent to the receiver

+x

Page 20: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

20

Cyclic Redundancy Check: Decode

Since G(x) is global, when the receiver receives the transmission T’(x), it divides T’(x) by G(x) if non-zero remainder: error detected! if zero remainder, assumes no error

Encode:CRC(G)

DT = D(x)xr+R(x) T’

check

Page 21: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

21

CRC: Steps and an Example

Suppose the degree of G(x) is r

Append r zero to D(x), i.e. consider D(x)xr

Divide D(x)xr by G(x). Let R(x) denote the reminder

Send <D, R> to the receiver

Page 22: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

22

The Power of CRC Let T(x) denote D(x)xr+R(x), and E(x) the polynomial of the

error bits the received signal is T’(x) = T(x)+E(x)

Since T(x) is divisible by G(x), we only need to consider if E(x) is divisible by G(x)

Encode:CRC(G)

DT = D(x)xr+R(x) T’

check

Page 23: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

23

The Power of CRC

Detect a single-bit error: E(x) = xi

if G(x) contains two or more terms, E(x) is not divisible by G(x)

Detect an odd number of errors: E(x) has an odd number of terms: lemma: if E(x) has an odd number of terms, E(x) cannot

be divisible by (x+1)• suppose E(x) = (x+1)F(x), let x=1, the left hand will be 1, while

the right hand will be 0 thus if G(x) contains x+1 as a factor, E(x) will not be

divided by G(x)

Many more errors can be detected by designing the right G(x)

Page 24: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

24

Example G(x)

16 bits CRC: CRC-16: x16+x15+x2+1,

CRC-CCITT: x16+x12+x5+1 both can catch

• all single or double bit errors• all odd number of bit errors• all burst errors of length 16

or less• >99.99% of the 17 or 18 bits

burst errors

CRC-16 hardware implementationUsing shift and XOR registers

http://en.wikipedia.org/wiki/CRC-32#Implementation

Page 25: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

25

Example G(x) 32 bits CRC:

CRC32: x32 + x26 + x23 + x22 + x16 + x12 + x11 + x10 + x8 + x7 + x5 + x4 + x2 + x + 1

used by Ethernet, FDDI, PKZIP, WinZip, and PNG GSM phones

For more details see the link below and further links it contains: http://en.wikipedia.org/wiki/Cyclic_redundancy_check

                      .

Page 26: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

26

Error Correcting Code (ECC) A lower bound:

assume the objective is to correct all single-bit errors

assume m message bits assume r check bits (thus total transmitted bits

n = m+r) since the check bits need to be able to identify

all of the (m+r+1) cases, therefore m+r+1 <= 2r

Examples suppose m = 7, what is the lower bound value

on r? how about m = 1000?

Page 27: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

27

Hamming Code (1950)

Achieve the lower bound The bits of the code word are numbered

consecutively, starting from 1 The bits that are powers of 2 (1, 2, 4, 8,

…) are check bits For the k-th bit, rewrite k as a sum of

powers of 2, e.g. 11 = 1+2+8, 29 = 1+4+8+16; let Sk denote the powers of 2 in the sum for k

For the check bit 2i, calculate its value as the parity check of those k if 2i in Sk

Page 28: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

28

Hamming Code: Example

Message is 7 bits Consider 1001000 We then need 4 check bits 1+2 1+4 2+4 1+2+4 1+8 2+8 1+2+8

1 2 3 4 5 6 7 8 9 10 11

c c m c m m m c m m m 1 0 0 1 0 0 0 0 0 1 0

If one bit is error, then the related check bits do not check, we find the flipped bit by summing the indices of all the check bits which failed the parity check

bit#

Page 29: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

29

Other Codes

Many other types of codes are commonly used in networks, e.g., Reed-Solomon codes (used in DSL, WiMax) convolutional codes tornado codes

Page 30: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

30

Outline

Admin. and recap Link layer overview Error detection and correction Media access control (MAC) protocols

overview

Page 31: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

31

Multiple Access Links and Protocols

Two types of “links”: point-to-point

e.g., a leased dedicated line, PPP for dial-up access

broadcast (shared wire or medium) traditional Ethernet 802.11 wireless LAN satellite

Page 32: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

32

Multiple Access Protocols Single shared broadcast channel

thus, if two or more simultaneous transmissions by nodes, due to interference, only one node can send successfully at a time (see CDMA later for an exception)

multiple access protocol Protocol that determines how nodes share

channel, i.e., determines when nodes can transmit Communication about channel sharing must use

channel itself !

Discussion: properties of an ideal multiple access protocol.

Page 33: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

33

Ideal Mulitple Access Protocol

Broadcast channel of rate R bps- Efficiency: when one node wants to transmit, it

can send at rate R

- Fairness: when N nodes want to transmit, each can send at average rate R/N

- Decentralized: no special node to coordinate transmissions no synchronization of clocks

- Simple

Page 34: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

34

MAC Protocols: a Taxonomy

Goals efficient, fair, decentralized, simple

Three broad classes: channel partitioning

divide channel into smaller “pieces” (time slot, frequency, code)

Non-partitioning random access

• allow collisions “taking-turns”

• a token coordinates shared access to avoid collisions

Page 35: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

35

Outline

Admin. and recap Link layer overview Error detection and correction Media access control (MAC) protocols

channel partitioning

Page 36: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

36

Channel Partitioning: TDMA

TDMA: time division multiple access Access to channel in "rounds" Each station gets fixed length slot (length =

pkt trans time) in each round Unused slots go idle Example: 6-station LAN, 1,3,4 have pkt, slots

2,5,6 idle

Page 37: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

37

Channel Partitioning: FDMA

FDMA: frequency division multiple access Channel spectrum divided into frequency bands Each station assigned fixed frequency band Unused transmission time in frequency bands go

idle Example: 6-station LAN, 1,3,4 have pkt,

frequency bands 2,5,6 idle

frequ

ency

bands time

5

1

4

3

2

6

Page 38: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

38

TDMA and FDMA

Often combined in practice, for example, in cellular phone networks:

GSM uses 200 KHz channels divided into eight time slots. A single handset uses one slot in two channels for sending and receiving.

Page 39: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

39

1 2 3 4 5 6 7 8

935-960 MHz124 channels (200 kHz)downlink

890-915 MHz124 channels (200 kHz)uplink

frequ

ency

time

GSM TDMA frame

GSM time-slot (normal burst)

4.615 ms

546.5 µs577 µs

tail user data TrainingSguardspace S user data tail

guardspace

3 bits 57 bits 26 bits 57 bits1 1 3

GSM - TDMA/FDMA

S: indicates data or control

Page 40: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

40

Channel Partitioning: CDMA

CDMA (Code Division Multiple Access) Used mostly in wireless broadcast channels

(cellular, satellite, etc) A spread-spectrum technique

Example: Sprint , Verizon 3G802.11

History: http://people.seas.harvard.edu/~jones/cscie129/nu_lectures/lecture7/hedy/lemarr.htm

Page 41: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

41

CDMA: Encoding

All users share same frequency, but each user m has its own unique “chipping” sequence (i.e., code) cm to encode data, i.e., code set partitioning e.g. cm = 1 1 1 -1 1 -1 -1 -1

Assume original data are represented by 1 and -1

Encoded signal = (original data) modulated by (chipping sequence) assume cm = 1 1 1 -1 1 -1 -1 -1

if data is d, send d cm, • if data d is 1, send cm

• if data d is -1 send -cm

Page 42: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

CDMA: Encoding

42

user data d(t)

chipping sequence c(t)

resultingsignal

1 -1

-1 1 1 -1 1 -1 1 -11 -1 -1 1 11

X

=

tb

tc

tb: bit periodtc: chip period

-1 1 1 -1 -1 1 -1 11 -1 1 -1 -11

Page 43: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

43

CDMA: Decoding

Inner-product (summation of bit-by-bit product) of encoded signal and chipping sequence if inner-product > 0, the data is 1; else -1

Page 44: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

44

CDMA Encode/Decode

Code of user m cm: 1 1 1 -1 1 -1 -1 -1

- The number of bitsof each chipping sequence is M

Encode

Decode

Page 45: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

45

CDMA: Deal with Multiple-User Interference

Two codes Ci and Cj are orthogonal, if , where we use “.” to denote inner

product, e.g.

If codes are orthogonal, multiple users can “coexist” and transmit simultaneously with minimal interference:

iiij

jj cdccd )(

0 ij cc

C1: 1 1 1 -1 1 -1 -1 -1 C2: 1 -1 1 1 1 -1 1 1-----------------------------------------C1 . C2 = 1 +(-1) + 1 + (-1) +1 + 1+ (-1)+(-1)=0

Analogy: Speak in different languages!

Page 46: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

46

CDMA: Two-Sender Interference

Code 1: 1 1 1 -1 1 -1 -1 -1Code 2: 1 -1 1 1 1 -1 1 1

Page 47: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

Discussions

Advantages of channel partitioning

Problems of channel partitioning

47

Page 48: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

48

Outline

Admin. and recap Link layer overview Error detection and correction Media access control (MAC) protocols

o channel partitioning random access

Page 49: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

49

Random Access Protocols

When a node has packets to send transmit at full channel data rate R. no a priori coordination among nodes

Two or more transmitting nodes -> “collision”

Random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed

retransmissions) Examples of random access MAC protocols:

slotted ALOHA and pure ALOHA CSMA and CSMA/CD, CSMA/CA

Page 50: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

Backup

50

Page 51: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

51

Forward Error Correction Code: Block Erasure Code

Basic idea: encode the k-bit data to n bits so that if the receiver receives any k bits, it can recover the original

x

y

Page 52: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

52

FEC/Block: Example Implementation

Suppose data signal is x, and the encoded signal y = Gx, where G is the generator matrix; assume receives only a subset of y

The y-bits in yellow are received; other y-bits are dropped (corrupted)

Page 53: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

53

FEC: An Example using Vandermonde Matrix Suppose gij are the entries after the

identify matrix gij= ai

j-1, where ai are distinct numbers

Suppose k=3, and n=5 (typical reed-solomon k=223, n =255)

3

2

1

222

211

5

4

3

2

1

1

1

100

010

001

x

x

x

aa

aa

y

y

y

y

y

Page 54: Datalink Layer 4/14/2008. Admin r Assignment 4 r MAC examples survey: m GSM/3G m Wireless m Cable Modem (DOCSIS) r Remaining class schedule 2

54

FEC: An Example using Vandermonde Matrix

Suppose y2 and y3 are dropped, then we have y1, y4, and y5. Given the relationship (we know they are y1, y4, y5)

Since the matrix is not singular, we can recover x1, x2, and x3 from y1, y4, y5

3

2

1

222

211

5

4

3

2

1

1

1

100

010

001

x

x

x

aa

aa

y

y

y

y

y

3

2

1

222

211

5

4

1

1

1

001

x

x

x

aa

aa

y

y

y