Automatic Repeat Request Data Link Layer Traffic Management
|
|
- Janis Lloyd
- 6 years ago
- Views:
Transcription
1 Automatic Repeat Request Data Link Layer Traffic Management
2 Reliable Communications with Retransmission How to transport data units over an unreliable data link in a reliable way? End to End E.g.. TCP Hop to Hop E.g.. SMTP, X.25, HDLC Answer: ARQ Automatic Repeat Request ARQ is an abstract concept, not a protocol itself Used in many protocols for reliable transmission
3 Basic ARQ Data (SDUs) is divided/packaged to packets (PDUs) that contain a header and checksum These are called information frames There are also empty packets called control frames And there is a timeout mechanism Sender 1. A packet is sent 3. A packet is re-sent after a timeout Packets in transit 2. A packet is lost Receiver 4. Acknowledgment is sent Problem: what if a frame is received and acknowledged after the timeout at sender s end?
4 ARQ Sequence Numbers It is possible for the sender and receiver to get out of syncronization A problem that all protocols must address Sender and receiver can be synchronized by having a sequence number in each frame In theory one bit sequence number would be sufficient for stop-and-wait ARQ Stop-and-wait means that only one frame is in transmission at one time One bit sequence number is not sufficient if the network may duplicate frames Larger sequence numbers allow multiple frames to be in transit
5 ARQ Control Frames ACK, acknowledgment NAK, negative acknowledgment ENQ, enquiry
6 ARQ Stop-and-Wait Frame Loss Handling One frame is sent at a time Rule: the information (data transporting) frames are ACKed, control frames not When a frame is lost: 1) Sender retransmits after timeout or 2) ENQ is replied with the last frame sent Sender sends ENQ after timeout Receiver sends last ACK sent Enables re-synchronization
7 Go-Back-N ARQ Frame Loss Handling A sufficiently large sequence number and a sliding window are used Receiver ACKs only frames in sequence When an information frame is lost, it and all frames sent after it must be retransmitted Frame loss is recognized either from timeout or the receiver sends a NAK when it receives a frame out of sequence The receiver requires a buffer the size of one frame The sender has to have a buffer that holds all frames that have been transmitted but not ACKed If the ACK control frame is lost, a later ACK can replace it This increases the efficiency of bandwidth usage compared to stop-and-wait ARQ Latency is a problem for stop-and-wait ARQ
8 Selective Repeat ARQ Frame Loss Handling When the receiver receives a frame out of sequence, it sends a NAK for the missing frame and that frame only is resent More complex for the receiver, requires a larger receive buffer This is more efficient for channels with large error rates than Go-Back-N ARQ
9 Data Link Protocols
10 The Data Link Layer Traditionally the data communications world has been built on Point to point connections between LANs HDLC, PPP, SLIP, ATM etc. over telecoms infrastructure Telecoms infra: Sonet, SDH, PDH Local Area Networks Ethernet, Token Ring, ATM over physcal media Also Campus networks FDDI, HIPPI, ATM, optical rings Mobile wireless networks GPRS, UMTS, WLAN Plenty of other solutions Cable modems, Bluetooth
11 HDLC High-level Data Link Control Data link layer protocol Point-to-point and point-to-multipoint connections Unbalanced (master/slave) point-to-point and multipoint Balanced point-to-point (each side has dual roles) Encapsulates network layer packets (SDUs) to frames (PDUs) Provides both connnection oriented and connectionless service
12 HDLC Frame Format Flag Address Control Information (data) CRC Flag Flag is Bit stuffing is used for other data, every is followed by 0 HDLC is bit-limited protocol, not byte limited Address is the receiver address Control is 8 bits, 16 in extended mode for longer sequences Information is payload data CRC is the checksum in ITU-CRC, 16 or 32 bits
13 HDLC Control Byte for Information Frame Send sequence Poll/Final Receive Sequence Starts with bit 0 Sequence numbers can be extended with an additional byte to 7 bits from 3 Receive ACKs may be sent piggypacked in information frames or in control frames Poll/Final bit is used for master/slave communications In unbalanced mode the secondaries (slaves) may not send without receiving first a frame with the P/F bit on form the primary (master)
14 HDLC Control Byte for Supervisory Frame Control field Poll/Final Receive Sequence Starts with bits 10 Control 00 is RR, Receive Ready (ACK) Control 01 is REJ, Reject (NAK) Control 10 is RNR, Receive Not Ready Sent for eg. buffers full, used for flow control Control 11 is SREJ, Selective Reject Used to request retransmission of a single frame
15 HDLC Control Byte for Unnumbered Frame Message Poll/Final Message Starts with bits 11 Used to set up connections and master/slave relationships
16 ATM, Asynchronous Transfer Mode Standardized by the ATM Forum, an industry consortium When introduced, a competitor for Internet Protocol ATM to the desktop Currently mostly used as flexible telecoms infrastructure Customer connections can be configured immediately from a central control location Enables allocation and control of bandwidth (not at the ATM level but at the endpoints) ATM network consists of ATM switches that are connected to other switches and ATM nodes using point to point connections Different from traditional LAN topologies
17 How the ATM works Two entities want to communicate A route over the ATM network is created The routing is a separate function from data transmission (switching) Done by hand (permanent virtual circuit) or by using PNNI protocol (Private Network to Network Interface) The route is named using using a VPI/VCI pair and configured in each switch of the ATM network Virtual Path Identifier Virtual Channel Identifier After route creation each switch along the route knows where to send a packet with a certain VPI/VCI header The VPI/VCI header may change along the route Each ATM switch needs only to be aware of the next hop
18 How the ATM works (cont.) The ATM data unit is called a cell Exactly 53 bytes long The header is 5 bytes long and contains the VPI/VCI address (VPI is 8 or 12 bits, VCI is 16 bits) Payload type (3 bits) Priority (1 bit) Header checksum (8 bits) The header contains all needed information for the switches to transmit the packet The rest of 48 bytes is the payload (data) Now how do we use the 48 bytes?
19 ATM Addressing The VPI/VCI pair need to be unique only in each switch along the path It may be changed along the switching path 20 octet (byte) ATM addresses exist 13 bytes of prefix (network address) 6 byte ID (can be Ethernet address) Other 20 byte addressing schemes exist also
20 AAL, ATM Adaptation Layer The different AAL layers provide ATM services to higher level protocols AAL1 provides a constant rate bitstream No error detection, missing cells are reported Suits for audio and video AAL2 was intended for packet data, but is dead AAL3/4 is a connection oriented or connectionless stream or packet data service with or without reliability Supports multiplexing several connections/packets over a single VPI/VCI AAL5 is a more simple and efficient version of the AAL3/4 The AAL usually selected for IP traffic
21 The Ethernet IEEE standard A limited distance LAN protocol and cabling standard Several physical cabling and bandwidth options Coaxial cable 10Base5 and 10Base2, mostly historical All nodes connect to the same coax Twisted pair 10BaseT, 100BaseT Nodes are connected using a hub or switch Also optical and wireless Ethernet and gigabit speeds
22 How the Ethernet Uses the Shared Media? 1-persistent CSMA/CD Carrier Sense Multiple Access / Collision Detection Each node waits for a free moment to send If two or more send simultaneously they detect the collision and each stops sending and waits a random interval All nodes listen to all traffic and pick their own as directed by the MAC address
23 Ethernet Addressing Each network card has a unique hardware address (MAC) In some hardware can be changed with software The MAC address usually has a manufacturer ID part and an unique part Duplicate MAC addresses in the same LAN happen, but extremely rarely Ethernet frames start with a 48-bit destination address followed by a 48-bit source address Hosts can send unicasts or broadcasts The broadcast is used to find who else is on the same LAN Or to find who has a certain IP address on this LAN (ARP) Or to find configuration parameters for this host (DHCP) Unicasts are used for normal traffic
24 Hubs and switches Twisted pair Ethernet hosts use a physical star configuration A hub repeats all traffic to all stations A switch learns which MAC addresses are in which physical ports and transmit only necessary traffic Security point: switches are harder to eavesdrop, but can usually be made to enter a fail-safe mode, where they act as a hub Switches provide better performance than hubs Both may be chained within certain limits
25 Extending Ethernet The physical reach of the Ethernet can be extended using repeaters, bridges and other devices However having a large (many hosts) Ethernet is very vulnerable to problems Broadcast storms can cripple the whole network (as happened to FUNET once) There is a reason for the higher level protocols like IP
26 Lan topologies Lans can be Buses Stars Rings Other A switch with connections to local hubs, a star of stars Wireless Raises interesting problems, A can see B, B can see C, A can not see C...
27 LAN cabling Expensive, difficult to change afterwards The reason for 10BaseT was the ability to use existing telephone cabling Since the analog signals are RF, the quality of cabling and connectors is very important CAT 5 minimum The physical routing of the cabling creates security considerations The physical maximum length of a single hub to workstation and overall cabling length creates installation considerations
28 Token Ring Instead of collision detection, there is a token (data) circulating in the network The node having the token at the moment has the permission to send, all others must wait for their turn The protocol must be able to handle situations like the node dieing, while it posesses the token Usually if there is no token seen within a certain time period, a new token is created IBM Token Ring network was physically a star, logically a ring
29 ATM LANs ATM provides only point to point connections IP on a LAN assumes that local network addresses can be reached directly and traffic to other addresses must be sent to the router There are several workarounds that make it possible to build an IP LAN using ATM Most common is an ATM LAN Emulation server that emulates broadcasts and other services But the 100 Mbps switched Ethernet killed the need for ATM LANs
30 Point-to-point links Need to connect 2 networks or computers with a dedicated link dial-up hosts and modem pools, inter-office routing Endpoints might be single computers, routers or bridges Dial-up connections, on-demand routing Dial-up access to networks with telephone/isdn lines Routing between offices over leased lines Encapsulating of network routes over different networks (tunneling)
31 SLIP overview Simple packet framing protocol Framing is done with END (octal 300) and ESC (octal 333) special characters. Sender just transfers data packet and END Occurrances of END and ESC characters in data bytes are escaped with two byte sequences (ESC+octal 334 nad ESC+octal 335, respectively) Static IP addresses for endpoints Every dial-up client needs own IP address No type field for packets only one protocol over one SLIP connection Old de facto-standard, description in RFC 1055
32 PPP overview Specification in RFCs 1661,1662, 1663 and others A protocol capable of multiplexing different network protocols over a single point-to-point link For example IP, IPX, XNS and AppleTalk concurrently HDLC-like Carefully designed for compatibility with most commonly used hardware Independent protocols for link and network control Link encapsulation options, authentication and link quality control configured with link control protocol, with reasonable default values Extensible with new network protocols: each network protocol has its own network control packets and configuration options
33 Practical PPP examples Dial-up Internet connections Physical connection with modem or ISDN Dynamic IP addresses and network configuration for clients Easy to install and reliable Supported for almost all client platforms Simple VPN (Virtual private network) over TCP/IP and ssh Secure Shell connection from distant location to intranet over untrusted networks PPP runs over SSH connection with link ends in secure networks Packets from distant location to intranet are routed over PPP to intranet. Cheap, dirty and practical VPN solution
34 Practical PPP examples PPP over Ethernet Specified in RFC 2516 Used in some DSL and cable modem configurations Makes it possible to decouple providing Integrates with existing authentication/billing systems
35 Description of a PPP Session A simplified PPP state diagram: Up Opened Dead Established Authenticate Success/ None Fail Fail Down Terminate Closing Network Session up/down events not shown (from hardware or manually) In Network state different network layer protocols may open or close while PPP stays connected: different possible states not shown
36 Some Other Data Link Protocols ISDN Frame Relay FDDI GPRS + UMTS WLAN Bluetooth Cable modems And the mighty IP runs over everything
37 Congestion Control Paul Ferguson and Geoff Huston, Quality of Service: Delivering QoS on the Internet and in Corporate Networks, Wiley, 1998
38 The Problem On a network with multiple hosts, traffic arrives in bursts to the routers Often there is only a single link for the traffic to go on This is a Quality of Service issue (QoS) Here we discuss only the basic case of one quality class
39 Traffic Shaping Individual flows can be shaped Packets are put on wait Packets are discarded It is also possible to shape future traffic Does not necessarily compete with queuing but rather supports it Can be done by the sender or along the transmission path
40 Filtering of Bursts Simplest traffic shaping method is to filter traffic bursts Leaky bucket can be used Excess traffic burst are filtered Packets can be discarded Basically a buffer and some logic Limits the outflow of data Used originally in ATM networks Potentially creates latency Can be a problem for some real time audio and video applications
41 Leaky Bucket Fixed queue size When the queue is full extra incoming packets get discarded Constant exit rate
42 Token Bucket A token is required for forwarding of packets Based on bucket, which can hold B tokens R tokens arrive the bucket per each second Extra tokens are stored in the bucket if they are not needed Bursts are allowed to certain limit Regulates also the interval of outgoing packets Allows short bursts to go through When the bucket is full of tokens Longer bursts are held back When the token bucket is empty, the outgoing rate is same as token creation date
43 Token Bucket R tokens per second B tokens in bucket
44 Random Early Detection (RED) When the buffer in the router starts to fill, arriving packets are dropped randomly Likelihood of a packet getting discarded is directly related to how full the buffer is A discarded packet sends a message to the higher level protocol used Suits well with TCP protocol Individual TCP protocol sessions drop speed Affects future traffic Happens gradually
45 Random Early Detection Router queue Likelihood of an incoming packet getting discarded: (qlen - minth) maxth - minth maxth qlen minth
46 Conclusions Routers (and switches) have important effect on the QoS properties of the network This should be taken in consideration in implementations Different queues Individual traffic flows can be shaped Leaky bucket, token bucket, RED
Digital Access Networks. T /301 Jouni Karvo, Timo Kiravuo
Digital Access Networks T-110.300/301 Jouni Karvo, Timo Kiravuo User Access to the Telecommunications Network The traditional access link is an analog copper wire to customer premises. Allows full-duplex
More informationFlow control: Ensuring the source sending frames does not overflow the receiver
Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationPart 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross
Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationAsynchronous Transfer Mode
ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationWilliam Stallings Data and Computer Communications. Chapter 7 Data Link Control
William Stallings Data and Computer Communications Chapter 7 Data Link Control Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More information3. Data Link Layer 3-2
3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link
More information(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.
Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL
More informationData Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.
Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT
More informationBackbone network technologies. T Jouni Karvo, Timo Kiravuo
Backbone network technologies T-110.300 Jouni Karvo, Timo Kiravuo Backbone network technologies This lecture tells about landline backbone networks After this lecture, you should know WDM, PDH, SDH and
More informationChapter 7: Data Link Control. CS420/520 Axel Krings Page 1
Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error
More informationChapter 7: Data Link Control. Data Link Control Protocols
Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationSRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of
More informationData Link Control Protocols
Data Link Control Protocols need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error control addressing control and data link management Flow Control
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationData link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection
2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationEthernet Switches (more)
Ethernet Switches layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-B and A - to-b simultaneously, no collisions large number of interfaces often: individual hosts, star-connected
More informationChapter 6: Network Communications and Protocols
Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols
More informationCS 416: Operating Systems Design April 11, 2011
Modes of connection Operating Systems Design 3. Client-Server Networking Paul Krzyzanowski pxk@cs.rutgers.edu Circuit-switched dedicated path guaranteed (fixed) bandwidth [almost] constant latency Packet-switched
More informationChapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationCHAPTER -1. Introduction to Computer Networks
CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationData Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking
Data Link Layer Bharati Vidyapeeth s Institute of Computer Applications and Management,New Delhi-63 by Vishal Jain U2. 1 Learning Objectives To introduce the design issues of data link layer. To discuss
More informationCS610- Computer Network Solved Subjective From Midterm Papers
Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationComputer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and
Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?
More informationData Link Control. Outline. DLC functions
Data Link Control #8 1 Outline functions Framing Error and flow control Performance of Example of a standard protocol- >H Open loop flow control 2 Data Link Layer Functions Data Link layer provides a error
More informationINTERNET ARCHITECTURE & PROTOCOLS
INTERNET ARCHITECTURE & PROTOCOLS Set # 02 Delivered By: Engr Tahir Niazi Need for Data Link Layer possibility of transmission errors receiver need to regulate the rate at which data arrive that's why
More informationBROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION ATM stands for Asynchronous Transfer Mode ATM is a flexible high bandwidth, low delay network technology that is: Capable of handling voice, video and data
More informationPPP. Point-to-Point Protocol
PPP Point-to-Point Protocol 1 Introduction One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs,
More informationQuality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services
1 Computer network and QoS QoS ATM QoS implementations Integrated Services Differentiated Services Quality of Service (QoS) The data transfer requirements are defined with different QoS parameters + e.g.,
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationContents. Introduction to Networking. Preface...i. Introduction... xix
Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and
More informationCS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017
CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationA LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,
CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationCompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches
More information(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker
Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,
More informationNetwork Model. Why a Layered Model? All People Seem To Need Data Processing
Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More informationData Link Layer. Overview. Links. Shivkumar Kalyanaraman
Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction
More informationNetwork management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:
Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized
More informationChapter 5 Data-Link Layer: Wired Networks
Sungkyunkwan University Chapter 5 Data-Link Layer: Wired Networks Prepared by Syed M. Raza and H. Choo 2018-Fall Computer Networks Copyright 2000-2018 Networking Laboratory Chapter 5 Outline 5.1 Introduction
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationOperating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski
Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationMPLS AToM Overview. Documentation Specifics. Feature Overview
MPLS AToM Overview This document provides an introduction to MPLS AToM and includes the following sections: Documentation Specifics, page 14 Feature Overview, page 14 Benefits, page 26 What To Do Next,
More informationThe Transport Layer. Part 1
The Transport Layer Part 1 2 OVERVIEW Part 1 User Datagram Protocol Transmission Control Protocol ARQ protocols Part 2 TCP congestion control Mowgli XTP SCTP WAP 3 Transport Layer Protocols Connect applications
More informationDepartment of Information Technology. CS6551 Computer Networks. Anna University - Two Mark Questions
Department of Information Technology CS6551 Computer Networks Anna University - Two Mark Questions 1. What are the functions of application layer? The application layer is the top-most layer of OSI model.
More informationChapter 5 part 2 LINK LAYER. Computer Networks Timothy Roscoe Summer Networks & Operating Systems Computer Networks
Chapter 5 part 2 LINK LAYER Computer Networks Timothy Roscoe Summer 2007 LAN technologies Data link layer so far services, error detection/correction, multiple access Next: LAN technologies LAN addressing,
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More information(Refer Slide Time: 2:20)
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture -23 X.25 and Frame Relay Hello and welcome to today s lecture on X.25 and
More informationComputer Networks (Introduction to TCP/IP Protocols)
Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of
More informationLocal Networks. Lecture 4 6-Apr-2016
Local Networks Lecture 4 6-Apr-2016 Roadmap of the Course So far Basic telecom concepts General study of LANs LAN topologies Flow and error control Today we continue the general study of LANs Medium access
More informationUDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data
ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission
More informationET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code
More informationData and Computer Communications
Data and Computer Communications Chapter 7 Data Link Control Protocols Eighth Edition by William Stallings Lecture slides by Lawrie Brown Data Link Control Protocols "Great and enlightened one," said Ten-teh,
More informationIntroduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services
More informationCOMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a
COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION Q-1(a) In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities can send at the same time. (b)
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationMultimedia Systems. Networks WS 2009/2010
Multimedia Systems WS 2009/2010 Networks Prof. Dr. Paul Müller University of Kaiserslautern, Germany Integrated Communication Systems Lab Email: pmueller@informatik.uni-kl.de 1 Outline Network basics for
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationCS422 Computer Networks
CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service
More informationAsynchronous Transfer Mode (ATM) ATM concepts
Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationHDLC (High level Data Link Control)
High-level Data Link Control HDLC (High level Data Link Control) Modem, EIA-232, HDLC Framing and Procedures Agenda Line Management, Modems Introduction HDLC Station Types, Modes of Operation Frame Format,
More informationLine Protocol Basics. HDLC (High level Data Link Control) Agenda. Additional Issues
Line Protocol Basics High-level Data Link Control HDLC (High level Data Link Control), EIA-232, HDLC Framing and Procedures line protocol basics already explained serial transmission techniques bit-synchronization
More informationComputer Facilities and Network Management BUS3150 Tutorial - Week 13
Computer Facilities and Network Management BUS3150 Tutorial - Week 13 *** FOR TUTORS ONLY *** The answers provided here are only brief guides. If you have any comments or suggestions for improvement to
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG
Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we
More informationPacket Switching Techniques
Packet Switching Techniques 188lecture3.ppt Pasi Lassila 1 Problem Aim: Build larger networks connecting more users also spanning different network technologies Shared media networks limited number of
More informationCHAPTER 2 - NETWORK DEVICES
CHAPTER 2 - NETWORK DEVICES TRUE/FALSE 1. Repeaters can reformat, resize, or otherwise manipulate the data packet. F PTS: 1 REF: 30 2. Because active hubs have multiple inbound and outbound connections,
More informationPeer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja
Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationChapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
Chapter 4 DataLink Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. DataLink Layer Link Layer 4.1 Link-Layer Addressing 4.2 Ethernet
More information19: Networking. Networking Hardware. Mark Handley
19: Networking Mark Handley Networking Hardware Lots of different hardware: Modem byte at a time, FDDI, SONET packet at a time ATM (including some DSL) 53-byte cell at a time Reality is that most networking
More informationModule 16: Distributed System Structures
Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication
More informationCHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS
CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS 15.1 Computer room networks require very high data rates and usually are concerned with transfer of large blocks of data. 15.2 Backend LAN: Backend networks
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationInternetwork Basic. Possible causes of LAN traffic congestion are
Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible
More informationYour favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY
VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th
More information