CompSci 356: Computer Network Architectures Lecture 5: Reliable Transmission and Multi-access links Chapter 2.4, 2.5, 2.6
|
|
- Hollie Welch
- 5 years ago
- Views:
Transcription
1 CompSci 356: Computer Network Architectures Lecture 5: Reliable Transmission and Multi-access links Chapter 2.4, 2.5, 2.6 Xiaowei Yang
2 Link layer functions Encoding Overview NRZ, NRZI, Manchester, 4B/5B Framing Byte-oriented, bit-oriented, time-based Bit stuffing Error detection Parity, checkshum, CRC Reliability FEC, sliding window Multi-access links
3 Error detection Error detection code adds redundancy Analogy: sending two copies Parity Checksum CRC Error correcting code
4 Two-dimensional parity A sample frame of six bytes Even parity bit Make an even number of 1s in each row and column Detect all 1,2,3-bit errors, and most 4-bit errors
5 Internet checksum algorithm Basic idea (for efficiency) Add all the words transmitted and then send the sum. Receiver does the same computation and compares the sums IP checksum Adding 16-bit short integers using 1 s complement arithmetic Take 1 s complement of the result Used by lab 2 to detect errors
6 1 s complement arithmetic -x is each bit of x inverted If there is a carry bit, add 1 to the sum [-2^(n-1)-1, 2^(n-1)-1] Example: 4-bit integer : 0101; -5: 1010; +2: 0010; -2: 1101; = = one carrier bit; à1000 = -7
7 Calculating the Internet checksum u_short cksum (u_short *buf, int count) { register u_long sum = 0; } while (count--) { sum += *buf++; if (sum & 0xFFFF0000) { /* carry occurred. So wrap around */ sum &= 0xFFFF; sum++; } } // one s complement sum return ~(sum & 0xFFFF); // one s complement of the sum
8 Verifying the checksum Adds all 16-bit words together, including the checksum 0: correct 1: errors
9 Remarks Can detect 1 bit error Not all two-bits Efficient for software implementation
10 Cyclic Redundancy Check Cyclic error-correcting codes High-level idea: Represent an n+1-bit message with an n degree polynomial M(x) Divide the polynomial by a degree-k divisor polynomial C(x) k-bit CRC: remainder Send Message + CRC that is dividable by C(x)
11 Polynomial arithmetic modulo 2 B(x) can be divided by C(x) if B(x) has higher degree B(x) can be divided once by C(x) if of same degree x^3 + 1 can be divided by x^3 + x^2 + 1 The remainder would be 0*x^3 + 1*x^2 + 0*x^1 + 0*x^0 (obtained by XORing the coefficients of each term) Remainder of B(x)/C(x) = B(x) C(x) Substraction is done by XOR each pair of matching coefficients
12 CRC algorithm 1. Multiply M(x) by x^k. Add k zeros to Message. Call it T(x) 2. Divide T(x) by C(x) and find the remainder 3. Send P(x) = T(x) remainder Append remainder to T(x) P(x) dividable by C(x)
13 An example 8-bit msg Divisor (3bit CRC) 1101 Msg sent:
14 How to choose a divisor Arithmetic of a finite field Intuition: unlikely to be divided evenly by an error Corrupted msg is P(x) + E(x) If E(x) is single bit, then E(x) = x i If C(x) has the first and last term nonzero, then detects all single bit errors Find C(x) by looking it up in a book
15 Hardware implementation Very efficient: XOR operations Number of bits = k 0 to k-1 registers (k-bit shift registers) If n th (n < k) term is not zero, places an XOR gate x 3 + x 2 + 1
16 Link layer functions Encoding Overview NRZ, NRZI, Manchester, 4B/5B Framing Byte-oriented, bit-oriented, time-based Bit stuffing Error detection Parity, checkshum, CRC Reliability FEC, sliding window Multi-access links
17 Reliable transmission What to do if a receiver detects bit errors? Two high-level approaches Forward error correction (FEC) Retransmission Acknowledgements Can be piggybacked on data packets Timeouts Also called Automatic repeat request (ARQ)
18 Stop-and-wait Send one frame, wait for an ack, and send the next Retransmit if times out Note in the last figure (d), there might be confusion: a new frame, or a duplicate?
19 Add a sequence number to each frame to avoid the ambiguity Sequence number
20 Stop-and-wait drawback Revisiting bandwidth-delay product Total delay/latency = transmission delay + propagation delay + queuing Queuing is the time packet sent waiting at a router s buffer Will revisit later (no sweat if you don t get it now)
21 Delay * bandwidth product For a 1Mbps pipe, it takes 8 seconds to transmit 1MB. If the link latency is less than 8 seconds, the pipe is full before all data are pumped into the pipe For a 1Gbps pipe, it takes 8 ms to transmit 1MB.
22 Stop-and-wait drawback A 1Mbps link with a 100ms two-way delay (round trip time, RTT) 1KB frame size Throughput = 1KB/ (1KB/1Mbps + 100ms) = 74Kbps << 1Mbps Delay * bandwidth = 100Kb So we could send ~12 frames before the pipe is full! Throughput = 100Kb/(1KB/1Mbps + 100ms) = 926Kbps
23 Key idea: allowing multiple outstanding (unacked) frames to keep the pipe full Sliding window
24 Sliding window on sender Assign a sequence number (SeqNum) to each frame Maintains three variables Send Window Size (SWS) Last Ack Received (LAR) Last Frame Sent (LFS) Invariant: LFS LAR SWS
25 Slide window this way when an ACK arrives Sender actions When an ACK arrives, moves LAR to the right, opening the window to allow the sender to send more frames If a frame times out before an ACK arrives, retransmit
26 Sliding window on receiver Maintains three window variables Receive Window Size (RWS) Largest Acceptable Frame (LAF) Last frame received (LFR) Invariant LAF LFR RWS
27 When a frame with SeqNum arrives Discards it if out of window Seq LFR or Seq > LAF If in window, decides what to ACK Cumulative ack Acks SeqNumToAck even if higher-numbered packets have been received Sets LFR = SeqNumToAck-1, LAF = LFR + RWS Updates SeqNumToAck
28 Finite sequence numbers Things may go wrong when SWS=RWS, SWS too large Example 3-bit sequence number, SWS=RWS=7 Sender sends 0,, 6; receiver acks, expects (7,0,, 5), but all acks lost Sender retransmits 0,,6; receiver thinks they are new SWS < (MaxSeqNum+1)/2 Alternates between first half and second half of sequence number space as stop-and-wait alternates between 0 and 1
29 Sliding window protocol (SWP) implementation typedef u_char SwpSeqno; typedef struct { SwpSeqno SeqNum; /* sequence number of this frame */ SwpSeqno AckNum; /* ack of received frame */ u_char Flags; /* up to 8 bits' worth of flags. An ack or data */ } SwpHdr; Your code will look very different!
30 typedef struct { /* sender side state: */ SwpSeqno LAR; /* seqno of last ACK received */ SwpSeqno LFS; /* last frame sent */ Semaphore sendwindownotfull; SwpHdr hdr; /* preinitialized header */ struct sendq_slot { Event timeout; /* event associated with send-timeout */ Msg msg; } sendq[sws]; /* receiver side state: */ SwpSeqno NFE; /* seqno of next frame expected */ struct recvq_slot { int received; /* is msg valid? */ Msg msg; } recvq[rws]; } SwpState;
31 static int sendswp(swpstate *state, Msg *frame) { struct sendq_slot *slot; hbuf[hlen]; } /* wait for send window to open */ semwait(&state->sendwindownotfull); state->hdr.seqnum = ++state->lfs; slot = &state->sendq[state->hdr.seqnum % SWS]; store_swp_hdr(state->hdr, hbuf); msgaddhdr(frame, hbuf, HLEN); msgsavecopy(&slot->msg, frame); slot->timeout = evschedule(swptimeout, slot, SWP_SEND_TIMEOUT); return sendlink(frame);
32 static int deliverswp(swpstate state, Msg *frame) { SwpHdr hdr; char *hbuf; hbuf = msgstriphdr(frame, HLEN); load_swp_hdr(&hdr, hbuf) if (hdr->flags & FLAG_ACK_VALID) { /* received an acknowledgment---do SENDER side */ if (swpinwindow(hdr.acknum, state->lar + 1, state->lfs)) { do { struct sendq_slot *slot; slot = &state->sendq[++state->lar % SWS]; evcancel(slot->timeout); msgdestroy(&slot->msg); semsignal(&state->sendwindownotfull); } while (state->lar!= hdr.acknum); } }
33 if (hdr.flags & FLAG_HAS_DATA) { struct recvq_slot *slot; /* received data packet---do RECEIVER side */ slot = &state->recvq[hdr.seqnum % RWS]; if (!swpinwindow(hdr.seqnum, state->nfe, state->nfe + RWS - 1)) { /* drop the message */ return SUCCESS; } msgsavecopy(&slot->msg, frame); slot->received = TRUE; if (hdr.seqnum == state->nfe) { Msg m; while (slot->received) { deliverhlp(&slot->msg); msgdestroy(&slot->msg); slot->received = FALSE; slot = &state->recvq[++state->nfe % RWS]; } /* send ACK: */ prepare_ack(&m, state->nfe - 1); sendlink(&m); msgdestroy(&m); }} return SUCCESS; }
34 static bool swpinwindow(swpseqno seqno, SwpSeqno min, SwpSeqno max) { SwpSeqno pos, maxpos; pos = seqno - min; /* pos *should* be in range [0..MAX)*/ maxpos = max - min + 1; /* maxpos is in range [0..MAX]*/ return pos < maxpos; }
35 Multiple functions of the sliding window algorithm Remark: perhaps one of the best-known algorithms in computer networking Multiple functions Reliable deliver frames over a link In-order delivery to upper layer protocol Flow control Not to over un a slow slower Congestion control (later) Not to congest the network
36 Other ACK mechanisms NACK: negative acks for packets not received unnecessary, as sender timeouts would catch this information SACK: selective ACK the received frames + No need to send duplicate packets - more complicated to implement Newer version of TCP has SACK
37 Exercise Delay: 100ms; Bandwidth: 1Mbps; Packet Size: 1000 Bytes; Ack: 40 Bytes Q: the smallest window size to keep the pipe full?
38 100ms 1Mbps Window size = largest amount of unacked data How long does it take to ack a packet? RTT = 100 ms * 2 + transmission delay of a packet (1000B) + transmission delay of an ack (40B) ~=208ms How many packets can the sender send in an RTT? 1Mbps * 208ms / 8000 bits = 26 Roughly 13 packets in the pipe from sender to receiver, and 13 acks from receiver to sender
39 Concurrent logical channels A link has multiple logical channels Each channel runs an independent stop-andwait protocol + keeps the pipe full - no relationship among the frames sent in different channels: out-of-order
40 Multi-access links Multiple access links Ethernet (WiFi) Bluetooth Cell phone Note: understand the concepts
41 Original design standard defines both MAC and physical layer details Motivation: switches are expensive Metcalfe s original Ethernet Sketch
42 Multiple-access links Bus LAN Ring LAN Many nodes attached to the same link Ethernet Token rings Wireless network (WiFi) Problem: who gets to send a frame? Multiple senders lead to collision Solution: a general technique Multiple access with collision detect (CSMA/CD)
43 Ethernet Developed in mid-1970s at Xerox PARC Speed: 10Mbps Gbps Standard: 802.3, Ethernet II (DIX, stands for Digital-Intel- Xerox) Most popular physical layers for Ethernet Last digital shows segment length 10Base5 Thick Ethernet: 10 Mbps coax cable. A segment < 500m 10Base2 Thin Ethernet: 10 Mbps coax cable. < 200 m 10Base-T 10 Mbps T: Twisted Pair < 100m 100Base-TX 100 Mbps over Category 5 twisted pair, duplex 100Base-FX 100 Mbps over Fiber Optics, duplex 1000Base-FX 1Gbps over Fiber Optics, duplex 10000Base-FX 10Gbps over Fiber Optics (for wide area links), duplex
44 Bus Topology 10Base5 (thick) and 10Base2 (thin) Ethernets have a bus topology 10Base5 as our case study Ethernet 10BASE2 cable T-connector Terminator
45 Physical properties Sensing the line; if idle, sends signals 10Base5 Transceiver q A small device directly attached to the tap q It detects when the line is idle and drives the signal when the host is transmitting q It also receives incoming signals.
46 How to expand an Ethernet segment A repeater is a device that forwards digital signals Multiple segments can be joined together by repeaters No more than four repeaters between any host <2500 meters < 1024 hosts Terminators are attached to each end of the segment Manchester encoding
47 How to expand an Ethernet segment (II) Starting with 10Base-T, stations are connected to a hub (or a switch) in a star configuration 100Mbps, 1000Mbps Hub 10 Base-T cable and jack A hub is a multiway repeater
48 Collision Domain Any host hears any other host A single segment Multiple segments connected by repeaters Multiple segments connected by a hub q All these hosts are competing for access to the same link, and as a consequence, they are said to be in the same collision domain.
49 Access control Bit-oriented framing In a host s memory, Ethernet header is 14 bytes The adaptor adds the preamble and CRC The type field is the de-multiplexor bytes of data Pad to minimum length Minimum length is for collision detection has the same header format, but substitutes type with length field How to tell whether the field indicates type or length? All types > 1500B
50 A prettier picture You ll need to know this for Lab 2
51 Ethernet addresses A flat unique 6-byte address per adaptor E8-6D-8C-3D Each manufacture is given a unique prefix e.g: 8:0:20:??:??:?? - Advanced Micro Devices (AMD) An all 1s address is a broadcast address (FF:FF:FF:FF:FF:FF) An address with first bit 1 but not broadcast is multicast An adaptor receives Frames with its address as a destination address In promiscuous mode, delivers all frames Broadcast frames Multicast frames if configured to
52 Transmitter Algorithm (1) 1. The adaptor receives datagram from network layer, creates frame 2. If the adaptor senses channel idle, starts frame transmission. If NIC senses channel busy, waits until channel idle, then transmits. 3. If NIC transmits an entire frame without detecting another transmission, NIC is done with frame! 4. If NIC detects another transmission while transmitting, aborts and sends jam signal (collision!!)
53 Transmitter Algorithm (2) If collision jam for 32 bits, then stop transmitting frame Wait and try again exponential backoff (doubling the delay interval of each collision) After the nth collision:: the adaptor waits for k x 51.2us, for randomly selected k=0,, 2 n 1 1st time: 0 or 51.2us 2nd time: 0, 51.2, 102.4, or 153.6us give up after several tries (usually 16)
54 Collision detection An adaptor senses the signals on the line and compares it with its own If same, no collision; otherwise, collision Sends 32-bit jamming sequence after collision In the worst case, a sender needs to send 512 bits ( = 64B) to detect collision Why?
55 (a) A sends a frame at time t ; (b) A s frame arrives at B at time t + d; (c) B begins transmitting at time t + d and immediately collides with A s frame; (d) B s runt (32-bit) frame arrives at A at time t + 2d. q A and B are at opposite ends of the network q One way delay is d q A needs to send for 2d (round-trip delay) to detect collision q 2d = 51.2 µs. On a 10Mps Ethernet, corresponds to 512 bits q Related to maximum Ethernet length ~ 2500 m
56 The IEEE Baseband Five physical segments between any two nodes Four repeaters between the nodes. Three of these physical segments can have connected node Each segment < 500m à Total < 2500m
57 Propagation delay for this maximum-extent Ethernet network is 25.6us 2*d = 51.2us Minimum Ethernet packet frame is 512 bits (64B) Header 14B, payload 46B, CRC 4B
58 Ethernet experience 30% utilization is heavy Most Ethernets are not light loaded Very successful Easy to maintain Price: does not require a switch which used to be expensive
59 Wireless links Most common Asymmetric Point-to-multipoint
60 Wireless access control Can t use Ethernet protocol Hidden terminal A and C can t hear each other s collision at B Exposed terminal B can send to A; C can send to D
61 (WiFi) Multiple access with collision avoidance Sender and receiver exchange control Sender à receiver: Request to send (RTS) Specifies the length of frame Receiver à sender: Clear to send (CTS) Echoes length of frame Sender à receiver: frame Receiver à sender: ack Other nodes can send after hearing ACK Node sees CTS Too close to receiver, can t transmit Addressing hidden terminals Node only sees RTS Okay to transmit Addressing exposed terminals
62 How to resolve collision Sender can t do collision detection Single antenna can t send and receive at the same time If no CTS, then RTS collide Exponential backoff to retransmit
63 Distribution system Hosts associate with APs APs connect via the distribution system A layer-2 system Ethernet, token ring, etc. Host IP addresses do not need to change
64 AP association Active scanning Node: Probe APs: Probe response Node selects one of APs, send Association request AP replies Association Response Passive scanning AP sends Beacon to announce itself Node sends Association Request
65 Frame format Same AP Addr1: dst Addr2: src Different Aps ToDS and FromDS in control field set Add1: dst, Addr2: AP_dst Addr3: AP_src, Add4: src
66 Bluetooth Connecting devices: mobile phones, headsets, keyboards Very short range communication Low power License exempt band 2.45 Ghz 1~3Mpbs Specified by Bluetooth Special Interest Group
67 A bluetooth piconet A master device and up to seven slave devices Communication is between the master and a slave
68 Bluetooth uses a spread spectrum technique Frequency-hopping with 79 channels Each for 625 us A frame takes up 1, 3, or 5 slots The master can start in odd-numbered slots A salve can start in an even-numbered slot, in response to a request from the master A slave device can be parked In active, low power, only be reactivated by the master
69 Cell phone technologies Using licensed spectrum Europe: 900 Mhz and 1800 Mhz North America: 850 Mhz and 1900 Mhz Base stations form a wired network Geographic area served by a base station s antenna is called a cell Similar to wifi Phone is associated with one base station Leaving a cell entering a cell causes a handoff
70 Cellular technologies 1G: analog 2G: digital and data 3G: higher bandwidth and simultaneous voice and data Variants of Code Division Multiple Access (CDMA) A spread spectrum technology Each transmitter uses a pseudorandom chipping code using a wide spectrum Good for bursty traffic: no hard limit on how many users can send simultaneously 4G: even higher
71 Summary A new reliable transmission mechanism Current logical channels Multiple access links Ethernet (WiFi) Bluetooth Cell phone Note: understand the concepts Lab 1 out: much harder than Lab 0. Pls start early!
72 Backup
73 Token rings A token circulates the ring If a node has something to send, take the token off the ring, and send the frame Node 1 Each node along the way simply forwards the frame Receiver copies the frame Node 4 Frame comes back to sender Sender removes the packet and puts the token back
74 Token ring standard IBM Token Ring A nearly identical IEEE standard 802.5: not widely used Fiber Distributed Data Interface (FDDI) Derived from the IEEE Resilient Packet Ring (RPR)
75 Challenges must be addressed Fault tolerance Media access control How long each node can hold the token? Reliability How does the sender know the frame is received Resource utilization
76 Adding fault tolerance an electromechanical relay Problem: single node powers off disconnects the ring Solution: relay that closes when host s powered off
77 Token ring media access control An adaptor has a receiver and a transmitter Problem: how long can a node holds a token? Token holding time (THT), default 10ms in Short: waste bandwidth Long: starve others What if you have an important short message?
78 802.5 Token Access Protocol A token has a 3-bit priority field A frame has three reservation bits A device seizes the token if its packet is at least as the token Reservation A sender X sets priority n in the three reservation bits in a frame if The bits are not set to a higher value The station that holds the token set priority to n Sender X lowers the token priority after releasing it so other senders can send Drawback: may starve lower priority traffic
79 Token ring reliability No sliding window! Two trailing bits (A, C) after each frame A recipient sets A bit when it sees the frame Sets C bit after it copies the frame back to its adaptor If a sender does not see both bits set, retransmits q A=0, C=0: the intended recipient is not functioning or absent q A=1, C=0: for some reason (e.g., lack of buffer space), the destination could not accept the frame q A=1, C=1: frame received
80 When to release a token Better bandwidth utilization Early release: Sender inserts the token back onto the ring immediately following its frame Late release: Sender inserts the token after the frame it transmits has gone all the way around the ring and been removed Which one is better? originally used (b), and adds (a) later
81 802.5 Token ring maintenance A monitor makes sure the token is not lost Periodically announces itself If the monitor fails A station elects itself by sending a claim token If the token comes back, it s the monitor If competition, highest address wins
82 Monitor s job If it does not see a token for a long time, it creates a new one # of stations * token holding time + ringlatency Detect and remove orphaned frames (whose parent died) Monitor sets a head bit to 1 after seeing a frame If it sees the bit already set, remove the packet
83 802.5 Frame format q Similar to the Ethernet, addresses are 48 bits long. q The frame also includes a 32-bit CRC. q Frame status byte includes the A and C bits for reliable delivery
84 Transmitter Algorithm Begin: Wait until the line is idle and has data to send, the adaptor sends it, and listens to collision If no, go back to Begin else exponentially backoff randomly selects a k between [0,2 n -1], waits for k x 51.2 µs to try Begin again Gives up after n reaches 16
85 One way delay is d A needs to send for 2d duration to detect collision 2d = 512 µs. On a 10Mps Ethernet, corresponds to 512 bits
86 Token rings A token circulates the ring If a node has something to send, take the token off the ring, and send the frame Receiver copies the frame Frame comes back to sender Sender removes the packet and puts the token back
87 When to release a token A) early; b) late Which one is better? has a,b
Point-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1
Point-to-Point Links Outline Encoding Framing Error Detection Sliding Window Algorithm Fall 2004 CS 691 1 Encoding Signals propagate over a physical medium modulate electromagnetic waves e.g., vary voltage
More informationCompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4
CompSci 356: Computer Network Architectures Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4 Xiaowei Yang xwy@cs.duke.edu Overview Review: link/network performance metrics
More informationDirect Link Networks (II)
Direct Link Networks (II) Computer Networking Lecture 03 HKU SPACE Community College January 30, 2012 HKU SPACE CC CN Lecture 03 1/25 Outline Reliable Link Service Stop-and-Wait Sliding Window Media Access
More informationReliable Transmission
Reliable Transmission How to fix corrupted frames. Error correcting codes too expensive Should discard frames (retransmission) Recover from Corrupt s should be done in the Link Level Data Link Networks
More informationIslamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.
Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 2 Getting Connected Eng. Haneen El-Masry March, 2014 2.2 ENCODING Encoding the
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationEthernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet
Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks
More informationCS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16
Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error
More informationLecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1
Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationLecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1
Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationError Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.
Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced
More informationEE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002
EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control
More informationHigh Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection
High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution
More information2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not
CS475 Networks Lecture 5 Chapter 2: Direct Link Networks Assignments Reading for Lecture 6: Sections 2.6 2.8 Homework 2: 2.1, 2.4, 2.6, 2.14, 2.18, 2.31, 2.35. Due Thursday, Sept. 15 2.4 Error Detection
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More informationCSCI-1680 Link Layer Reliability John Jannotti
CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today
More informationCSCI-1680 Link Layer Reliability Rodrigo Fonseca
CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationComputer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1
Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter
More informationHousekeeping. Fall /5 CptS/EE 555 1
Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section
More informationNetworking Link Layer
Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding
More informationCopyright 2010, Elsevier Inc. All rights Reserved
Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie C 2 Getting Connected Copyright 2010, Elsevier Inc. All rights Reserved Perspectives on Connecting An end-user s view of the
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationLink Layer (L2) Review
Link Layer (L2) Review 188lecture2.ppt Pasi Lassila 1 Problem How to connect 2 (or more) computers directly to each other? physical cable? bit encoding, framing, error detection? reliable transfer mechanisms?
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationProblem Statement. Physical and Data Link Layer Overview. Five Tasks Encoding. Make two computers talk to each other
Physical and Data Link Layer Overview Problem Statement Make two talk to each other Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Physical media transmit Analog signals Modulate/demodulate
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationCS 457 Networking and the Internet. Link Layer Protocols. Problems 8/31/16. Fall 2016 Indrajit Ray
CS 457 Networking and the Internet Fall 2016 Indrajit Ray Link Layer Protocols Problems In earlier lectures we saw networks consisting of links interconnecting nodes. How to connect two nodes together?
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer
More informationData Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1
Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation
More informationLink layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationCS 640 Lecture 4: 09/11/2014
CS 640 Lecture 4: 09/11/2014 A) Bandwidth-delay product B) Link layer intro C) Encoding, Framing, Error Detection D) Multiple access Ethernet A. Bandwidth-delay product This in the above example is C *
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer
More informationData always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send
Token Ring Developed by IBM, adopted by IEEE as 802.5 standard Token rings latter extended to FDDI (Fiber Distributed Data Interface) and 802.17 (Resilient Packet Ring) standards Nodes connected in a ring
More informationLink Layer: Retransmissions
Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationData Communication & Computer Networks INFO
Data Communication & Computer Networks INFO Instructor: Dr. A. SARI Department: Management Information Systems Course Code: MIS 305 Academic Term: 2013/2014 Fall Title: Data Communication & Computer Networks
More informationData Link Layer. Srinidhi Varadarajan
Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request
More informationCSE/EE 461 Section 2
CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan
More informationCSE 461: Framing, Error Detection and Correction
CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationCS 4453 Computer Networks Winter
CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session
More informationIntroduction to Computer Networks. IEEE Ethernet
Introduction to Computer Networks IEEE 802.3 Ethernet All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationCS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017
CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology
More informationUnit II. Part A (2 Marks)
Unit II Part A (2 Marks) 1. Differentiate fast Ethernet and Gigabit Ethernet. Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s). Gigabit Ethernet was the next iteration, increasing
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today: Link Layer (cont.) Framing Reliability Error correction Sliding window Medium
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationMultiple Access Channels
Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationKing Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering
Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationL5: Building Direct Link Networks III. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L5: Building Direct Link Networks III Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were
More informationChapter 2: Getting Connected
Islamic University of Gaza Faculty of Engineering Eng. Jehad Aldahdooh Computer Networks Computer Engineering Dept. Chapter 2 Chapter 2: Getting Connected 1. Explain Manchester Encoding. Manchester Encoding
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationShared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...
Media Access Protocols Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Shared Access Networks More than two nodes are attached to the same physical medium Normally span a small geographical
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms
More informationCOMPUTER NETWORKS CS CS 55201
COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 2 Data Link Networks P. Farrell / H. Peyravi Department of Computer Science Kent State University Kent, Ohio 44242 farrell@cs.kent.edu http://www.cs.kent.edu/
More informationCOMPUTER NETWORKS CS CS 55201
Contents COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 2 Data Link Networks Hardware Building Blocks Encoding Coding Design Framing Error Detection Reliable Transmission Ethernet FDDI Network Adaptors P.
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationECSE 414 Fall 2014 Final Exam Solutions
ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:
More informationEECS 122, Lecture 7. Kevin Fall Jean Walrand
EECS 122, Lecture 7 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu : Outline Typical Setup Names Physical Layer Frame Fast Ethernet; Gigabit Ethernet 10Base5 Efficiency of CSMA/CD
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationCommunication (III) Kai Huang
Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationModule 10 Data Link Layer CS655! 10-1!
Module 10 Data Link Layer CS655! 10-1! Please note: Most of these slides come from this book. Note their copyright notice below! A note on the use of these ppt slides: We re making these slides freely
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More informationCPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448
Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted
More informationCMPE 344 Computer Networks Spring Getting Connected. Reading: Peterson and Davie, 2.1,
CMPE 344 Computer Networks Spring 2017 Getting Connected Reading: Peterson and Davie, 2.1, 2.5-2.7 Sources of slides: Computer networks: A systems Approach by Peterson and Davie, Morgan Kaufmann, 2010
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationMore on LANS. LAN Wiring, Interface
More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network
More information