Lecture 3: Data Link. (A. Pattavina, Chapter 4 and 15) Ilenia Tinnirello

Size: px
Start display at page:

Download "Lecture 3: Data Link. (A. Pattavina, Chapter 4 and 15) Ilenia Tinnirello"

Transcription

1 Lecture 3: Data Link (A. Pattavina, Chapter 4 and 15)

2 Data Link Layer The main tasks of the data link layer are: Transfer data from the network layer of one machine to the network layer of another machine Convert the raw bit stream of the physical layer into groups of delimited bits ( frames ) Addressing the devices Error control: improving PHY performance by detecting and correcting errors; Flow control: avoiding buffer overflows by controlling transmission rates Network Layer Data Link Layer Physical Layer Network Layer Data Link Layer Physical Layer

3 Two types of networks at the data link layer Point-to-Point Networks: Pairs of hosts (or routers) are directly connected Broadcast Networks: All stations share a single communication channel Broadcast Network Typically, wide area networks (WANs) are point-to-point and local area networks (LANs) are broadcast. Point-to-Point Network

4 Wide Area Networks

5 MAC and LLC In any broadcast network, the stations must ensure that only one station transmits at a time on the shared communication channel The protocol that determines who can transmit on a broadcast channel are called Medium Access Control (MAC) protocol The MAC protocol are implemented in the MAC sublayer which is the lower sublayer of the data link layer The higher portion of the data link layer is often called Logical Link Control (LLC) Data Link Layer Logical Link Control Medium Access Control to Network Layer to Physical Layer

6 Framing How to recognize transmission units? One possibility is to insert gaps between frames but there is no guarantee about timing from the network. Start and end of frame marked by Character count Starting and ending chars with char stuffing Starting & ending flags with bit stuffing Physical layer coding violations

7 Character count Even if checksum is incorrect, the destination does not know where the bad frame starts.

8 Starting and ending chars w/ character stuffing Use ASCII chars DLE STX (Data Link Escape, Start TeXt) and DLE ETX (End TeXt). If receiver loses frame boundaries it should look for DLE STX and DLE ETX Problem: Binary data. DLE STX/ETX could occur and ruin framing. Stuffing:Add an ASCII DLE before each DLE in the binary data.

9 Starting & Ending Characters A B C D Data From Network Layer DLE STX A B C D DLE ETX Start Of Frame Data End Of Frame Starting & Ending Characters Added By Link Layer

10 Character Stuffing A B DLE C D data on Sender side DLE STX A B DLE DLE C D DLE ETX Start Of Frame Data A B DLE C D End Of Frame data on Reciever side

11 Start & end flags w/ bit stuffing Frame begins and ends with called flag byte. When senders DLL senses 5 consecutive 1 s it stuffs a 0 into the bit stream. Receiver sees the 5 consecutive 1 s followed by a 0 and destuffs it (i.e., deletes the 0). Bit stuffing unambiguously locates frame boundaries.

12 Starting & ending Flags With Bit Stuffing Starting flag Bit Shifted Bit BIT stuffing Ending Flag BIT Data received by Network layer On reciever side After Performing Destuffing By data link Layer Stuffing Performed By Data Link layer

13 Point-to-Point Links

14 ErrorControl Solutions Two possible approaches Forward error correction (FEC) Control information transmitted with data frames for correcting transmission errors Overhead added regardless of link conditions Automatic repeat request (ARQ) Control information for detecting transmission errors (e.g. parity checks) Explicit acknowledgements or retransmission requests with overheads depending on error rates!» STOP&WAIT» CONTINOUS ARQ

15 Retransmission scenarios referred to as ARQ schemes (Automatic Retransmission request) COMPONENTS: a) error checking at receiver; b) feedback to sender; c) retx SRC Basic ACK idea DST Error Check: OK Automatic retransmit SRC DST Basic NACK idea Error Check: corrupted SRC DST SRC DST SRC DST Retx Timeout (RTO) Error Check: corrupted Basic ACK/Timeout idea

16 Error Detection Schemes Parity Send an additional parity bit (H) per character Even parity: if # of 1 s in character is odd, H = 1; else H = 0 Odd parity: if # of 1 s in character is odd, H = 0; else H = 1 Cannot detect even numbers of bit errors Checksum Treat data as sequence of integers Compute and send arithmetic sum (H) Handles multiple bit errors, but not all errors Cyclic Redundancy Check (CRC)

17 Checksum Examples Checksum computed over data Checksum appended to frame (19)=20 2 nd bit reversed in each item, but checksum is the same

18 CRC Example ) = R T = M R =

19 Sequencenumbers a must Sender side: Receiver side: RTO rtx DATALINK or NETWORK (ACK lost) New data? Old data? Need to univocally label all packets circulating in the network between two end points. 1 bit (0-1) enough for Stop-and-wait

20 Stop & Wait Protocol description without errors Efficiency Protocol operation in case of errors Timeouts Sequence numbers 0/1 Efficiency for fixed bit error rates Timeout effects on efficiency Ack numbering 0/1

21 NormalOperation The sender will not send the next piece of data until it is sure that the current one is correctly received sequence number necessary to check for duplicated packets No NACK when packet is corrupted duplicate ACKs instead REMARK: throughput always lower than Available link rate!

22 Lost or damaged frameroundtrip delay + processing in the receiver

23 Lost ACK- Importance of numbering

24 Delayed ACK- Importance of ACK numbering

25 Duplex Stop-and-Wait ARQ Piggybacking combine data with ACK (less overhead saves bandwidth)

26 Performance Figures Utilization (U) fraction of time the link is used for transmitting data Throughput (b/s) effective b/s as experienced by user data Throughput = C * U (b/s) Throughput (frame/s) average data frames per second the link is supporting Throughput = C*U/data_frame_size (frame/sec) A frame ACK frame ACK frame ACK B frame ACK frame ACK frame ACK

27 Efficiency After every frame, source must wait till acknowledgment Hence link propagation time is significant Total time to for one frame: T_total = Tf + 2τ + Tp + Ta if we ignore Tp and Ta (usually very small) T_total = Tf + 2τ Link utilization, U is equal to U = Tf/ (T_total), or =1 / (1+2τ /Tf) = 1 / (1 + 2 a) where a = τ /Tf = length of link in bits If a < 1 (i.e. Tf > τ when 1st transmitted bit reaches destination, source will still be transmitting U is close 100% If a > 1 (i.e. Tf < τ frame transmission is completed before 1st bit reaches destination U is low T f τ T p τ T a Source time Destination

28 Efficiencywith errors Assume a frame is in error with probability P Therefore, average utilization can be written as U = Tf / (Nr * T_total) Nr is the average number of transmissions of a frame, while T_total is equal to Tf + 2 τ. For stop-and-wait, Nr is given by Nr = E[no of transmissions] = Σ i *Prob[ i transmissions]= Σ i *P i-1 (1-P)= 1/(1-P) Therefore, utilization is given by U = (1-P)/(1+2a) Note that for P = 0 (i.e. error free), the expression reduced to the previous result! A timeout frame ACK frame frame ACK B frame ACK frame frame ACK

29 stop-and-wait: upper bound/1 MSG = 1500 bytes Under-utilization with: 1) high capacity links, 2) large RTT links Bianchi, Tinnirello

30 stop-and-wait: upper bound/2 MSG = 1500 bytes Under-utilization with: 1) high capacity links, 2) large RTT links Bianchi, Tinnirello

31 Example Lf = 1500 bytes 2τ = 10 ms 2τ=100ms Link rate (kbps) throughput efficiency throughput efficiency 33 32,12 97,32% 25,88 78,43% ,66 90,36% 61,94 48,39% ,45 54,55% 107,14 10,71% ,43 10,71% 118,58 1,19% ,77 1,19% 119,86 0,12% ,56 0,12% 119,99 0,01% INFINITE 1200,00 N/A 120,00 N/A Lf Lf thr = lim = C 2τ + L / C 2τ f

32 Drawbacks of Stop-and-Wait After sending each frame, the host must wait for an ACK inefficient use of bandwidth To improve efficiency, ACK should be sent after multiple frames Alternatives: Sliding Window protocols 1. Go-back-N ARQ 2. Selective Repeat ARQ

33 Pipelining One task begins before the other one ends increases efficiency in transmission There is no pipelining in Stop-and- Wait ARQ

34 Pipelining Idea W=1 W=4 W=10 Send up to W frames before receiving the first ACK!

35 Sliding Window Protocol Stop-and-Wait can be very inefficient when a > 1 Protocol: Assumes full duplex line Source A and Destination B have buffers each of size W frames For k-bit sequence numbers: Frames are numbered: 0, 1, 2,, 2 k -1, 0, 1, (modulo 2 k ) ACKs (RRs) are numbered: 0, 1, 2,, 2 k -1, 0, 1, (modulo 2 k ) A is allowed to transmit up to W frames without waiting for an ACK B can receive up to W consecutive frames ACK J (or RR J), where 0<=J<= 2 k -1, sent by B means B have received frames up to frame J-1 and is ready to receive frame J Window size, W can be less or equal to 2 k -1

36 Example: k=3, W=7 Observations: A may tx W = 7 frames (F0, F1,, F6) After F0, F1, & F2 are txed, window is shrunk (i.e. can not transmit except F3, F4,, F6) When B sends RR3, A knows F0, F1 & F2 have been received and B is ready to receive F3 Window is advanced to cover 7 frames (starting with F3 up to F1) A sends F3, F4, F5, & F6 B responds with RR4 when F3 is received A advances the window by one position to include F2 W W W W W W = distance between first unacknowledged frame and last frame that can be sent

37 Piggybacking When using sliding window protocol in full duplex connections: Node A maintains its own transmit window Node B maintains its own receive window A frame contains: data field + ACK field There is a sequence number for the data field, and a sequence number for the ACK field

38 Efficiency: W>=2a+1 Assume k=3, W = 7 (ignoring Ta) Source can continuously keep transmitting!! Because the ACK can arrive to source before the window is completed Utilization = 100% T f τ τ time Source Destination W T f Sending ACK0 as soon as F0 is received is the maximum help the destination can do to increase utilization

39 Efficiency: W<2a+1 Assume k = 3, W = 3 (ignoring Ta) Source can NOT continuously keep transmitting!! T f Because the ACK can NOT arrive to source before the window is completed τ Source Destination W T f W * Tf Utilization = Tf + 2 *τ W = a time

40 Pipelining summary τ(+1tx) W=4? W=10 time time UNDER-SIZED WINDOW: THROUGHPUT INEFFICIENCY thr = Bianchi, Tinnirello min C, W 2τ + WINDOW SIZING that allows CONTINUOUS TRANSMISSION L L f f / C

41 Sliding Window Protocol Sliding Window Protocol Simulation ( re/comms/jasper/swp3.html)

42 Question What is the consequence of the window size in case of transmission errors? Frames can be received out of order Definition of receiver window window size 1 means that the packets have to be received in order Window size > 1 means that packets are buffered up to the window size for waiting for the missed packets.

43 Go Back N protocol Sequence number: b bits N=2 b values Repeated modulo N Sender window Ws=N-1 number of possible sequence numbers minus 1 Receiver rules RX: accept frames only if received in strict sequence!! If out of order frame, reply with NACK NACK(i) = I have received ALL frames up to (i-1) mod N, but I haven t received i-th frame

44 GBN example NACK Bianchi, Tinnirello

45 Frame 2 Frame 3 Frame 0 Frame 1 W=N=4 WhyWs= N-1? Frame X-1 = ACK 1 Frame 2 Frame 3 Frame 0 Frame 1 W=N=4 Frame X-1 = ACK 1 Frame X = ACK 1 Frame X = ACK 1 All successful OR all lost??????????????? Bianchi, Tinnirello

46 Go-back-N Inefficient all out of order received packets are discarded This is a problem in a noisy link many frames must be retransmitted -> bandwidth consuming Solution re-send only the damaged frames Selective Repeat ARQ avoid unnecessary retransmissions

47 SelectiveRepeat Key RX difference: Received frames buffered also if out of order New parameter: Receiver Window Wr New window sizing rule: GBN: Ws < N SR: Ws + Wr N TO N=4; Ws=3; Wr= ACK 0 2 retx Rx window NEW!! GBN = special case Wr=1 Bianchi, Tinnirello

48 Choiceofwindows N=8 Wr > 4 not useful not enough in-fly frames since Ws<4 Ws > 4 out of order may harm not enough RX window size to capture all possible out of order cases Most appropriate choice: Wr=Ws=4 but remember throughput limits, though! Bianchi, Tinnirello

49 SR exampleand TX operation NACK ACK 3 7,0,1,2,3 6 Bianchi, Tinnirello

50 Go-Back-N: Efficiency With Errors Remember that Go-back-N ARQ utilization for error-free channels is given by: U = 1 for W > 2a + 1 U= W/(2a+1) for W < 2a + 1 Assume a data frame can be in error with probability P With Go-back-N, if one frame in error, we may retransmit a number of frames, on average K, and NOT only one! The average number of transmitted frames to transmit one frame correctly, Nr, is given by Nr = E[number of transmitted frames to successfully transmit one frame] = Σ f(i) x P i-1 (1-P) If a frame is transmitted i times (i.e. first (i-1) times are erroneous while it was received correctly in the ith time), then f(i) is the total number of frame transmissions if our original frame is in error: f(i) is given by = 1 + (i-1)k Substituting f(i) in the above relation, yields Nr = (1-P+KP)/(1-P) Examining the operation of Go-back-N, an approximate value for K is 2a+1; Then utilization with errors is given by U = (1-P)/(1+2aP) for W > 2a+1 U=(1-P)W/{(2a+1)(2-P+WP)} for W < 2a+1

51 Selective Repeat: Efficiency With Errors Remember that Selective Reject utilization for error-free channels is given by: U = 1 for W > 2a + 1 U = W/(2a+1) for W < 2a + 1 Assume a data frame can be in error with probability P With Selective Reject if one frame in error, we retransmit only the required frame The average number of transmitted frames to transmit one frame correctly, Nr, is given by Nr = E[number of transmitted frames to successfully transmit one frame] = Σ i x P i-1 (1-P) = 1/(1-P) Then utilization with errors is given by U =1-P for W > 2a+1 U=(1-P)W/(2a+1) for W < 2a+1

52 ARQ Utilization as a Function of a Remember a is given by τ/tf i.e. the length of the link in bits The curves are for P = 10-3 Note for W = 1, go-back-n and selective reject degenerate to the case of stop-and-wait Please note that the previous analyses are only approximate errors in ACKs were ignored. Furthermore, in the case of go-back-n, errors in retransmitted frames other than the frame of interest were also ignored

53 Broadcast Links

54 Random Access Protocols: Why? When multiple nodes share a common channel, the channel is not multiplexed a priori e.g. wireless networks Basic Idea: nodes which need to transmit a packet, try to access the channel at random instants using the whole capacity channel is used only by nodes which need it! Trading off simplicity with efficiency No a priori coordination or little coordination among the nodes Resource wastes are possible if multiple nodes transmit simultaneously

55 Random Access Protocols: Where? Several real networks make use of random access protocols Alohanet (early 70 s) Ethernet WiFi Cellular networks

56 How do theywork? Basic Operations: Transmit at random time instants Feedback is known without errors Success/Collision e.g. by means of ACK/ACK Timeout on an independent channel Reschedule transmissions in case of collisions Several protocol variants according to the way in which random instants and retransmissions are managed Aloha, Slotted Aloha Carrier Sense Multiple Access CMSA/CD, CSMA/CA

57 Whichefficiency? How much wastes on channel resources? Because channel is idle Because of collisions: when two or more transmissions overlap! Intuition: In case of low traffic, collisions are uncommon but channel is mostly idle In case of high traffic, several transmissions but a lot of collisions Are there possible optimizations? Which measure? Assuming all the frames have equal size: Successful_Transmission_Time / Total_Channel_Time #Successful_Frames/#Pkt_Times=E[Succesful frames]/pkt_time Packet T Packet T Packet T Collision Collision Packet T

58 Simplest case: ALOHA No synchronization at all If a pkt needs transmission: send immediately Collision is detected at the end of transmission (e.g. ACK) Reschedule transmission after a random time until it is successfully transmitted rnd RTX delay packet packet packet packet new frame arrival new frame arrival new frame arrival

59 Analysis of Pure ALOHA Notation: T = pkt_time S: Average number of successful transmissions per pkt_time ; that is, the throughput or efficiency. e.g. 2frames/7pkt_time G: Average number of total frames transmitted per pkt_time e.g. 2frames/7pkt_time in the first case, 6frames/7pkt_time in the second case Packet T Packet T Packet T Packet TPacket T Packet Packet T T Packet T

60 Modeling Assumptions Infinite number of stations a new frame arrival is managed by a new contending station All frames are of constant length, whose duration is T The channel is noise-free; the errors are only due to collisions Frame arrival rate Poisson process. X frames/s; XT frames/pkt_time; In equilibrium conditions: arrival_rate=s! Each new packet takes the place of a successful packet leaving contention Frame transmission rate (including retransmissions) Poisson process Λ frames/s; ΛT frames/pkt_time; G = ΛT frames/pkt_time >= S!

61 Vulnerabilityperiod: 2T T T Target STA Packet T OK! Interfering STA Collision on initial part of the pkt Collision on final part of the pkt

62 Analysis of Pure ALOHA Since S represents the number of good transmissions per pkt_time, and G represents the total number of attempted transmissions per pkt_time, then we have: S = G (Probability of good transmission) G = ΛT Good transmissions are performed if no transmission attempt is originated in a vulnerable time of 2T Remind that transmissions attempts are a Poisson process..

63 Analysis of Pure ALOHA Using Pr to have k tx in t: P k ( t) = k ( Λt) e k! Λt and considering: Λ 2 T = 2G S we have: S = G ( ) k 2G 2G 2G k! e k = 0 = Ge G

64 Maximumthroughput ( ) ( ) / max 2 2 ' 2 = = = = = = = = e e e S G Ge e G S Ge G S G G G Can we do better?

65 Slotted ALOHA Channel is slotted Channel access times are discrete Slot size equal to pkt_time A new frame can be transmitted only at the beginning of the next slot In case of collision Reschedule transmission after a random number of slots Now.. synchronization is required among nodes! packet collision packet new frame arrival channel access time k channel access time k+1 new frame arrivals rnd RTX delay

66 Vulnerabilityperiod: T slot k-1 slot k slot k+1 Target STA Packet T Interfering STA Synchronized collisions!

67 SlottedAlohaimprovements Being the vulnerability period T only.. S S k G G G = G e = Ge k! k = 0 1 = = for G e max Throughput doubled with respect to un-slotted version, but SYNC required! = G = offered load Slotted Aloha Pure Aloha

68 Random Access Instability What happens if the offered load slightly changes? Case A: G increases, S increases thus reducing G to the old value Case B: G increases, S decreases thus further increasing G If backlog increases beyond stable point, S will reach 0! A B S G

69 CSMA: Motivations The capacity of ALOHA or slotted ALOHA is limited by the large vulnerability period of a packet. By listening before transmitting, stations try to reduce the vulnerability period to one propagation delay. Useful if propagation delay τ is smaller than packet duration!

70 Vulnerabilityperiod: τ Target STA Busy defer tx! Packet T Propagation delay τ Packet T Busy Interfering STAs Collision!

71 CSMA: Protocol Families CSMA: listen before transmit: If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission Non-persistent CSMA: retry after random backoff interval Persistent CSMA: retry immediately with probability p (even p=1) when channel becomes idle, wait a fixed time with probability 1-p Continuously sense the channel Slotted, Unslotted human analogy: don t interrupt others!

72 CSMA Examples

73 EfficiencyExample: non-persistent CSMA STA A Packet T τ STA B Packet T τ Packet T τ STA C y Packet T τ busy idle busy idle Channel time organized into cycles Busy, Idle intervals Busy intervals defined as the total time in which the channel is sensed busy If the delay is constant per each source-destination pair, we get a lower performance bound

74 Efficiency(2)

75 CSMA versus Aloha Comparison of the channel utilization versus load for various random access protocols.

76 CSMA/CD CSMA with collision detection. Problem: when frames collide, medium is unusable for duration of both (damaged) frames. For long frames (when compared to propagation time), considerable waste. What if station listens while transmitting? If collision detected, transmit brief jamming signal and abort transmission. After aborting, wait random time, try again Is listening always possible? No, in wireless networks, where received and transmitted power levels are very different!!

77 Taking Turns MAC protocols Polling: master node invites slave nodes to transmit in turn Request to Send, Clear to Send msgs concerns: polling overhead latency single point of failure (master) Token passing: control token passed from one node to next sequentially. token message concerns: token overhead latency single point of failure (token)

78 Reservation-based protocols Distributed Polling: time divided into slots begins with N short reservation slots reservation slot time equal to channel end-end propagation delay station with message to send posts reservation reservation seen by all stations after reservation slots, message transmissions ordered by known priority

79 Backup Slides

80 Delay Note that G/S represents the total number of transmissions for each packet generated into the systems Nrtx = G/S -1 =e 2G -1 for Aloha Nrtx= G/S=e G -1 for Slotted Aloha Each retransmission requires the packet transmission time T + the ACK timeout (2τ) + the random delay +(slot waiting time for slotted Aloha) E[rtx]=T+2τ+E[rnd] D=T+τ+Nrtx E[rtx]; Normalized D/T log(d/t) S E[rnd]=50T E[rnd]=5T E[rnd]=T

81 Efficiency with finite users Slotted Aloha Previous models refer to the case of infinite users.. What happens in real networks? Consider slotted Aloha with N stations generating the offered load G each transmits in slot with probability G/N probability of successful transmission for each node is: G/N (1-G/N) (N-1) S=G(1-G/N) N-1 ; S max =S(1)=(1-1/N) N-1 N=1: Smax=1! N=2: Smax=1/2; N=3: Smax =4/9; N=5: Smax = 0.41; N=10: Smax=0.39; N= : Smax=0.368 With ten or a few tens of stations performance approaches the limit case!

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Inst: Chris Davison

Inst: Chris Davison ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

Goals of Today s Lecture. Adaptors Communicating

Goals of Today s Lecture. Adaptors Communicating Goals of Today s Lecture EE 122: Link Layer Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review. EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection 2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow

More information

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control Links EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/ Announcements Homework

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

Chapter 5 Data-Link Layer: Wired Networks

Chapter 5 Data-Link Layer: Wired Networks Sungkyunkwan University Chapter 5 Data-Link Layer: Wired Networks Prepared by Syed M. Raza and H. Choo 2018-Fall Computer Networks Copyright 2000-2018 Networking Laboratory Chapter 5 Outline 5.1 Introduction

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006 CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject

More information

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Telecommunication Protocols Laboratory Course. Lecture 2

Telecommunication Protocols Laboratory Course. Lecture 2 Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer. Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.

More information

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction

More information

COMMUNICATION NETWORKS NETW 501

COMMUNICATION NETWORKS NETW 501 COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Introduction to Computer Networks. 03 Data Link Layer Introduction

Introduction to Computer Networks. 03 Data Link Layer Introduction Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015

More information

Local Networks. Lecture 4 6-Apr-2016

Local Networks. Lecture 4 6-Apr-2016 Local Networks Lecture 4 6-Apr-2016 Roadmap of the Course So far Basic telecom concepts General study of LANs LAN topologies Flow and error control Today we continue the general study of LANs Medium access

More information

Networking Link Layer

Networking Link Layer Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Lecture 6. TCP services. Internet Transport Layer: introduction to the Transport Control Protocol (TCP) A MUCH more complex transport

Lecture 6. TCP services. Internet Transport Layer: introduction to the Transport Control Protocol (TCP) A MUCH more complex transport Lecture 6. Internet Transport Layer: introduction to the Transport ontrol Protocol (TP) RF 793 (estensioni RF 1122,1323,2018,2581,working group tsvwg) A MUH more complex transport for three main reasons

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols Link Layer: Introduction daptors ommunicating Terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links LNs

More information

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16 Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error

More information

Chapter 4 Data Link Layer

Chapter 4 Data Link Layer Chapter 4 Data Link Layer Data Link Layer Objectives: understand principles behind data link layer services: error detection and correction ( by the receiver) reliable data transfer link access by sharing

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses roadcast Links, ddressing and Media ccess Control Message M C Message M Link Layer In a broadcast, there are two additional issues that must be resolved How do the nodes agree on who gets to use the next?

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames. Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

3. Data Link Layer 3-2

3. Data Link Layer 3-2 3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Lecture 8 Link Layer: functionality, error detection, media access algorithm Lecture 8 Link Layer: functionality, error detection, media access algorithm From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright

More information