30
Komunikasi Data Teknik Komunikasi Data Digital

Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Komunikasi Data

Teknik Komunikasi Data Digital

Page 2: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

SAP Komunikasi Data

Pendahuluan Protokol dan

Arsitektur

Transmisi Data dan Media

Transmisi

Pengkodean Data Komunikasi Data Digital

Data Link Control

Switching

Multiplexing Jaringan

Komputer

Spread Spectrum

Start

Finish

UTS

UU/UAS

Tugas 1

Tugas 2

Page 3: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

DIGITAL DATA COMMUNICATION TECHNIQUES

Error Detection and Correction

Page 4: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

“Redundancy is a property of languages, codes and sign systems which arises from a superfluity of rules, and which facilitates communication in spite of all the uncertainty acting against it.

Redundancy may be said to be due to an additional set of rules, whereby it becomes increasingly difficult to make an undetectable mistake.”

—On Human Communication,

Colin Cherry

Page 5: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

TRANSMISI ASYNCHRONOUS DAN SYNCHRONOUS

• Synchronisasi adalah salah satu tugas utama dari komunikasi data. Suatu transmitter mengirim message 1 bit pada suatu waktu melalui suatu medium ke receiver.

Page 6: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

TRANSMISI ASYNCHRONOUS

• mencegah problem timing dengan tidak mengirim aliran bit panjang yang tidak putus -putusnya.

• Melainkan data ditransmisi per karakter pada suatu waktu, dimana tiap karakter adalah 5 sampai 8 bit panjangnya.

• Timing atau synchronisasi harus dipertahankan antara tiap karakter; receiver mempunyai kesempatan untuk men-synchron-kan awal dari tiap karakter baru.

Page 7: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Transmisi Asynchronous

Page 8: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

TRANSMISI SYNCHRONOUS

• Dengan transmisi synchronous, ada level lain dari synchronisasi yang perlu agar receiver dapat menentukan awal dan akhir dari suatu blok data.

• Untuk itu, tiap blok dimulai dengan suatu pola preamble bit dan diakhiri dengan pola postamble bit. Dimana pola-pola ini adalah kontrol informasi.

• Frame adalah data plus kontrol informasi. Format yang tepat dari frame tergantung dari metode transmisinya – Transmisi character-oriented (Blok data diperlakukan

sebagai rangkaian karakter-karakter (biasanya 8 bit karakter) )

– Transmisi bit-oriented (Blok data diperlakukan sebagai serangkaian bit-bit)

Page 9: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

TRANSMISI SYNCHRONOUS

Perbedaan dari kedua metode diatas terletak pada format detilnya dan kontrol informasinya.

Page 10: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Types of Errors

• An error occurs when a bit is altered between transmission and reception – Binary 1 is transmitted and binary 0 is received

– Binary 0 is transmitted and binary 1 is received

Single bit errors

Isolated error that alters one bit but does not affect nearby bits

Can occur in the presence of white noise

Burst errors Contiguous sequence of B bits in which the

first and last bits and any number of intermediate bits are received in error

Can be caused by impulse noise or by fading in a mobile wireless environment

Effects of burst errors are greater at higher data rates

Page 11: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

bits corrupted by error

Sent

Receivedburst error of

length B = 10

single-bit

error

Figure 6.1 Burst and Single-Bit Errors

0 0 1 0 0 0 1 0 0 1 1 0 0 1 0 1 1 0 1 1 1 0 0 1

0 0 0 0 0 1 0 0 0 0 1 1 0 1 0 1 1 0 0 1 1 0 0 1

Page 12: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Error Detection • Regardless of design you will have errors, resulting in the change of one or more bits in a

transmitted frame • Frames

– Data transmitted as one or more contiguous sequences of bits

• The probability that a frame arrives with no bit errors decreases when the probability of a single bit error increases

• The probability that a frame arrives with no bit errors decreases with increasing frame length – The longer the frame, the more bits it has and the higher the probability that one of

these is in error

Pb

• Probability that a bit is received in error; also known as the bit error rate (BER)

P1 •Probability that a frame arrives with no bit errors

P2

•Probability that, with an error-detecting algorithm in use, a frame arrives with one or more undetected errors

P3

•Probability that, with an error-detecting algorithm in use, a frame arrives with one or more detected bit errors but no undetected bit errors

Page 13: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

E = f(data)

k bits

data

data

data'

E' = f(data') COMPARE

n – k bits

n bits

Figure 6.2 Error Detection Process

Transmitter

Receiver

E, E' = error-detecting codesf = error-detecting code function

Page 14: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Parity Check

• The simplest error detecting scheme is to append a parity bit to the end of a block of data

If any even number of bits are inverted due to error, an undetected error occurs

Page 15: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

b1,1 b1,j

rowparity

columnparity

r1

Figure 6.3 A Two-Dimensional Even Parity Scheme

b2,1 b2,j r2

bi,1 bi,j ri

c1 cj p

(a) Parity calculation

(b) No errors

0 1 1 1 0 10 1 1 1 0 10 1 0 0 0 10 1 0 1 1 10 0 0 1 1 0

(c) Correctable single-bit error

(d) Uncorrectable error pattern

row parityerror

columnparity error

0 1 1 1 0 10 0 1 1 0 10 1 0 0 0 10 1 0 1 1 10 0 0 1 1 0

0 1 1 1 1 1 0 10 0 1 1 0 1 1 00 0 1 1 0 0 1 10 0 0 0 0 0 0 01 0 1 1 1 1 1 01 1 0 0 0 1 1 0

Page 16: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

The Internet Checksum

• Error detecting code used in many Internet standard protocols, including IP, TCP, and UDP

• Ones-complement operation

– Replace 0 digits with 1 digits and 1 digits with 0 digits

• Ones-complement addition

– The two numbers are treated as unsigned binary integers and added

– If there is a carry out of the leftmost bit, add 1 to the sum (end-around carry)

Page 17: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Partial sum 0001

F203

F204

Partial sum

0001

F203

F204

Partial sum F204

F4F5

1E6F9

Partial sum

F204

F4F5

1E6F9

Carry E6F9

1

E6FA

Carry

E6F9

1

E6FA

Partial sum E6FA

F6F7

1DDF1

Partial sum

E6FA

F6F7

1DDF1

Carry DDF1

1

DDF2

Carry

DDF1

1

DDF2

Ones complement of the result 220D

Partial sum DDF2

220D

FFFF

(a) Checksum calculation by sender (b) Checksum verification by receiver

Figure 6.4 Example of Internet Checksum

Page 18: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Cyclic Redundancy Check

• one of most common and powerful checks

• for a block of k bits transmitter generates an n bit frame check sequence (FCS)

• transmits k+n bits which is exactly divisible by some number

• receiver divides frame by that number

– if no remainder, assume no error

– for math, see Stallings chapter 6

Page 19: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

CRC Generator and Checker

Page 20: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

CRC Process

• Modulo 2 arithmetic

– Uses binary addition with no carries

– An example is shown on page 218 in the textbook

• Polynomials

– Express all values as polynomials in a dummy variable X, with binary coefficients

– Coefficients correspond to the bits in the binary number

– An example is shown on page 221 in the textbook

• Digital logic

– Dividing circuit consisting of XOR gates and a shift register

– Shift register is a string of 1-bit storage devices

– Each device has an output line, which indicates the value currently stored, and an input line

– At discrete time instants, known as clock times, the value in the storage device is replaced by the value indicated by its input line

– The entire register is clocked simultaneously, causing a 1-bit shift along the entire register

– An example is referenced on page 223 in the textbook

Page 21: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Modulo 2 Arithmetic (XOR)

• Define: – T = (k+n)-bit frame to be transmitted, n < k

– M = k-bit message, the first k bits of T

– F = n-bit FCS, the last n bits of T

– P = pattern of n+1 bits, the predetermined divisor

• We would like T/P to have no remainder

– T = 2nM + F

– 2nM/P = Q + R/P, R is at least one bit less than P

– Use R as the FCS (i.e. F), i.e. T = 2nM + R

– Examine if T/P have no remainder?

• T/P = (2nM + R)/P = Q + R/P + R/P = Q + (R+R)/P = Q

Page 22: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Modulo 2 Arithmetic (cont)

• Occurrence of errors

– Tr = T + E

– T = transmitted frame

– E = error pattern with 1s in positions of error

– Tr = received frame

• Fail to detect an error if and only if Tr is divisible

by P

– i.e. if and only if E is divisible by P

Page 23: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

X5 + X4 + X2 + 1

X9 + X8 + X6 + X4 + X2 + X

X14 X12 X8 + X7 + X5

X12 X11 X9 X8

X14+ + +X13 X11 X9

+ + + +X13

+X13 + +X12 X10 X8

+X10+ +

+

X9

X9

X7

X7

X11

+X10 X8

X8

X6

X6

+ +

+ +

X7 + +

X5

X5

+X5

+

+X9 X8 X6 X4

X4

+ +

+X7 X6 X4 X2

X2

X2

+

X6 +

+

X11

+X6 X5 X3 X+ +

X3 X+ +

P(X)

R(X)

X5D(X)

Q(X)

Figure 6.5 Example of Polynomial Division

Page 24: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi
Page 25: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi
Page 26: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Forward Error Correction

• Correction of detected errors usually requires data blocks to be retransmitted

• Not appropriate for wireless applications: – The bit error rate (BER) on a wireless link can be quite high, which

would result in a large number of retransmissions – Propagation delay is very long compared to the transmission time of a

single frame

• Need to correct errors on basis of bits received

Codeword

• On the transmission end each k-bit block of data is mapped into an n-bit block (n > k) using a forward error correction (FEC) encoder

Page 27: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

data

no

err

or

or

corre

ctab

leer

ror

dete

cta

ble

bu

t n

ot

corr

ecta

ble

err

or

codeword

FECdecoder

k bits

data

codeword

FECencoder

n bits

Transmitter Receiver

Figure 6.8 Error Correction Process

Page 28: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

Block Code Principles

• Hamming distance – d(v1, v2) between two n–bit binary sequences v1 and

v2 is the number of bits in which v1 and v2 disagree – See example on page 227 in the textbook

• Redundancy of the code – The ratio of redundant bits to data bits (n-k)/k

• Code rate – The ratio of data bits to total bits k/n – Is a measure of how much additional bandwidth is

required to carry data at the same data rate as without the code

– See example on page 229 in the textbook

Page 29: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

0 1 2 3 4 5 6 7 8 9

3 dB

10 11 12 13 14

10–5

10–6

10–4

10–3

10–2

10–1

1

Pro

bab

ilit

y o

f b

it e

rro

r (B

ER

)

(Eb/N0) (dB)

Figure 6.9 How Coding Improves System Performance

2.77 dB

Region of

coding gain

Without

coding

Rate 1/2

coding

Page 30: Sistem Keamanan Komputerrobby_kurniawan.staff.gunadarma.ac.id/Downloads/files/... · SAP Komunikasi Data Pendahuluan Protokol dan Arsitektur Transmisi Data dan Media Transmisi Komunikasi

THANKS! Any questions?

You can find me at:

[email protected]

30