Physical and Data Link layers

Size: px
Start display at page:

Download "Physical and Data Link layers"

Transcription

1 Physical and Data Link layers Youki Kadobayashi Graduate School of Information Science Nara Institute of Science and Technology Physical Layer Copyright(C)204 Youki Kadobayashi. All rights reserved.

2 Types of transmission medium Cables Optical fiber Copper Wireless Source: siemon.com Source: blackbox.com Copyright(C)204 Youki Kadobayashi. All rights reserved. Cables and connectors Copper UTP STP Connectors RJ45 RJ Source: aisan Optical fibers Single mode fiber Multimode fiber Connectors LC, SC, FC, MT-RJ Source: aisan RJ45 connector. Source: flukenetworks.com Source: aisan.co.jp Copyright(C)204 Youki Kadobayashi. All rights reserved. 2

3 Cable speed, distance and cost Speed Medium Distance Cost 0Gbit/s Optical (SMF) 0 km $$$ 0Gbit/s Copper 0 m $$ Gbit/s Optical (MMF) 550 m $$ Gbit/s Copper 00 m $ Mbit/s Copper 4 km $ Source: cable360.net Copyright(C)204 Youki Kadobayashi. All rights reserved. Physical characteristics: a crude comparison Copper Fiber Wireless Attenuation XX XXXX Attenuation distortion X X XX Noise XX X XXXX Bend XX Chromatic dispersion X XXXX Crosstalk XX XXXX EM interference XX XXXX Echo XX XXXX 54Mbit/s in wireless cannot be delivered as advertised, whereas Gbit/s in optical fiber can be delivered as advertised. Copyright(C)204 Youki Kadobayashi. All rights reserved. 3

4 Basics of protocol Copyright(C)204 Youki Kadobayashi. All rights reserved. Computer and network Computer Network interface Protocol start bit pattern end bit pattern Copyright(C)204 Youki Kadobayashi. All rights reserved. 4

5 Fundamental aspect of network: Protocol 3 major elements of protocol Finite State Machine Message Timer a α b δ ε β c γ d Copyright(C)204 Youki Kadobayashi. All rights reserved. Basic constructs of protocol Main goal Transmission, recovery from errors Message Header, trailer Error detection Sequence number Acknowledgement State machine Negotiation Retransmission Error recovery Timer Timeout Sequence number Header Acknowledgement Data Error detection Trailer Copyright(C)204 Youki Kadobayashi. All rights reserved. 5

6 Ethernet frame Information Network / 204 Data Link Layer Copyright(C)204 Youki Kadobayashi. All rights reserved. 6

7 Data Link Layer Services overview Framing, link access: Encapsulate datagram into frame, adding header, trailer Channel access if shared medium MAC addresses used in frame headers to identify source & destination Flow Control: Pacing between adjacent sending and receiving nodes Error Detection: Errors caused by signal attenuation and noise Receiver detects presence of errors Error Correction: Receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex With half duplex, nodes at both ends of link can transmit, but not at same time Copyright(C)204 Youki Kadobayashi. All rights reserved. Frame Data link layer Protocol Data Unit (PDU) Defining the frame borders (delimiters) Can determine if any failures (bit errors) occured Adding error-detection / error-correction code to bit sequences in order to delimit the appropriate frame length Frame header error detection and flow control control information 00 address control data checksum 00 header payload Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. 7

8 Frame Synchronization Bit-sequence-based frame synchronization A special bit sequence is inserted to the data header and footer. synchronization Insertion of a bit sequence composed of the same bit bit stuffing special bit sequence only appears at the frame header and footer e.g. special bit sequence 00 if sender detects in data, it stuffs a 0 right after. if receiver detects in data, it deletes the following stuffed address control data checksum 00 Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. Errors in Physical Layer Noise Attenuation Distortion Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. 8

9 Error Control Goal Detecting and correcting transmission error in channel Was the frame correctly sent? Was the frame sequence order correct? Techniques Introducing the concept of frame (failure localization) Coding techniques Error Correction Code Error Detection Code Parity, CRC (Cyclic redundancy check) Protocol techniques Timer Retransmission Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. Basic idea of CRC Given: ( m Generator polynomial G(x), of degree r (r < Polynomial expression of m bit frame M(x) (degree m-) Compute: prepare x r M(x): frame with r zeros Compute modulo of x r M(x) divided by G(x): R(x) Frame for transmission: F(x) F(x) = x r M(x) + R(x) Successul transmission: F(x) / G(x) = 0 Nonzero otherwise. i.e., error detection. Consecutive errors less than r bits can be detected Copyright(C)204 Youki Kadobayashi. All rights reserved. 9

10 Standardized CRC polynomials Commonly known standards CRC-2 x 2 +x +x 3 +x 2 +x+ CRC-6 x 6 +x 5 +x 2 + CRC-32 x 32 +x 26 +x 23 +x 22 +x 6 +x 2 + x +x 0 +x 8 +x 7 + x 5 +x 4 +x 2 +x+ CRC-CCITT x 6 +x 2 +x 5 + There are many other error detection codes. Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. Questions? Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. 0

11 Flow Control Flow Control Protocols deal with how to send sequences of frames They have two goals: Recover from lost frames Prevent buffer overflows Network Layer may want to receive same set of frames in the same order they were sent Automatic Repeat Request (ARQ) Stop-and-wait Go-back-N Selective-repeat Copyright(C)204 Youki Kadobayashi. All rights reserved. Information Network / 204 Stop-and-wait ARQ () Sender t t 5 t 4 t t 2 t : Round Trip Time t 2 : Frame Transmission Time t 3 : Frame Processing Time t 4 : ACK Transmission Time t 5 : ACK Processing Time t 3 Receiver Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved.

12 Stop-and-wait ARQ (2) Procedure Waiting to receive ACK on each frame transmission Setting a sender timer greater than 2t +t 2 +t 3 +t 4 Retransmission when sender timer times out. Characteristics Simple The buffer never contains more than one frame for the receiver and the sender Very low utilization of channel capacity Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. Go-back-N ARQ Time out for Frame !! ACK ACK ACK ACK ACK ACK Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. 2

13 Selective-Repeat ARQ Time out for Frame !! ACK ACK ACK ACK ACK ACK ACK ACK Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. ARQ: simplicity vs efficiency, adaptability Stop-and-Wait Simple No large buffer required in both ends Go-back-N Still simple, but buffer management has to be done at SENDER. N means the buffer size There is no large buffer required at RECEIVER side. Selected Repeat Complicated scheme that requires buffer, timer, and ACK managements. Buffers are required in both ends. Window Flow Control is needed for buffer management. Copyright(C)204 Youki Kadobayashi. All rights reserved. Information Network / 204 3

14 Window Flow Control for selective-repeat ARQ Sender sent frame keep frame until ACK is received sendable frame maximum size W) already received ACK last sent frame if sent move to right If ACK is received move to right Receiver received frame receivable frame maximum size W) already transmitted ACK if received if ACK is sent last received Copyright(C)204 frame move Youki to Kadobayashi. right All rights move reserved. to right Burden sharing among layers Assignment of function depends on communication system designs Various solutions exist Transport Network Data Link sequence assurance flow control retransmission interconnection of network error detection and correction frame boundary Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. 4

15 Questions? Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. Sublayers of the Data Link Layer Network Layer Data link Layer Logical Link Control Sublayer Media Access Control Sublayer ISO/OSI Local Area Network Definitions (8802) 8802/2 LLC 8802/3 CSMA/ CD 8802/4 Token Bus 8802/5 Token Ring CCITT Data link Layer Definition CCITT X.25 (HDLC/LAPB) Physical Layer Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. 5

16 Media Access Control (MAC) () Data link layer provides packet send/ receive service to network layer Physical Layer provides binary send/receive to data link layer Different media have different constraints about multiple nodes accessing the medium Copyright(C)204 Youki Kadobayashi. All rights reserved. Media Access Control (MAC) (2) MAC layer provides medium access service to the data link layer A separate protocol is needed to implement the service for each different transmission medium Subsequent slides: learn about channel allocation (multiplexing) Copyright(C)204 Youki Kadobayashi. All rights reserved. 6

17 Access Channel Two types of links : Point-to-point PPP for dial-up access Point-to-point link between Ethernet switch and host Broadcast (shared wire or medium) Traditional Ethernet 802. wireless LAN Copyright(C)204 Youki Kadobayashi. All rights reserved. Information Network / 204 MAC Protocols () Single shared broadcast channel Two or more simultaneous transmissions can interfere with each other Collision will be observed whenever node receives two or more signals at the same time Ideal Media Access Protocol When one node wants to transmit, it can send at rate R When M nodes want to transmit, each can send at average rate R/M Fully decentralized: No special node to coordinate transmissions No synchronization of clocks, slots Simple Copyright(C)204 Youki Kadobayashi. All rights reserved. Information Network / 204 7

18 MAC Protocols (2) Three techniques: Channel Partitioning Divide channel into smaller pieces (time slots, frequency, code) Allocate piece to node for exclusive use Random Access Channel not divided, allow collisions Recover from collisions Taking turns Nodes take turns Nodes with more to send can take longer turns Copyright(C)204 Youki Kadobayashi. All rights reserved. Information Network / 204 Controlled or Contention? Controlled assignment of partitioned channel is for higher efficient channel occupying (high throughput) TDMA (time), FDMA (frequency), WDM (wave length) Code Divided Multiple Access (CDMA) Contention type (random access) has its long history, but CSMA/CD with binary back-off is the final answer. Pure ALOHA, Slotted ALOHA classic & primitive form of random access CSMA, CSMA/CD, CSMA/CD with binary back-off (Ethernet) More complicated form for avoiding unnecessary collisions. Carrier Sense is pre-action, Collision Detection is post-action. CSMA/CA (Collision Avoidance) More aggressive way to manage channels, WiFi. Copyright(C)204 Youki Kadobayashi. All rights reserved. Information Network / 204 8

19 MAC Throughput Performance Copyright(C)204 Youki Kadobayashi. All rights reserved. Information Network / 204 Questions? Copyright(C)204 Youki Kadobayashi. All rights reserved. 9

20 Evolution of data link technologies Wide bandwidth Large scale Virtualization Coverage expansion Switched media Bridges VLAN Broadband wireless, residential access, etc. Copyright(C)204 Youki Kadobayashi. All rights reserved. LAN performance secrets: shared media switched media High-bandwidth and commodity LAN Effectively a channel partitioning scheme medium access Non-blocking crossbar switch Copyright(C)204 Youki Kadobayashi. All rights reserved. 20

21 Wireless LAN performance secrets Wireless LAN performance will lag behind forever Wireless LAN remains to be shared media Significantly slower, error prone crowded cocktail party -- Don t expect same performance Shared media Wireless LAN Voice Video (MPEG2) Video (MotionJPEG) Switched media Ethernet Voice Video (MPEG2) Video (MotionJPEG) Video (D) Video (HD D) Copyright(C)204 Youki Kadobayashi. All rights reserved. Large scale Bridges Compatibility between physical limitations and LAN convenience Coverage, capacity Wiring in floor coax 00m Wiring between buildings optical fiber 5km Copyright(C)204 Youki Kadobayashi. All rights reserved. 2

22 Bridge basics: Transparent bridge Host is not aware of the bridge Transparent bridge No modification of MAC frame Promiscuous: capture all flowing packets Administrator builds the bridge forwarding table A C Transparent bridge E G B D 2 F H Fwd to Fwd to 2 A, B, C, D E, F, G, H Copyright(C)204 Youki Kadobayashi. All rights reserved. Learning Bridge Dynamic adaptation for topology changes & traffic loop avoidance. Frame forwarding tables in bridges are maintained for optimizing the flow: Any frame to unknown MAC addresses is forwarded, and the table is updated for unknown MAC. Any frame to known MAC addresses is forwarded if necessary. Spanning Tree Protocol (STP) is now very common for families to avoid traffic loop. Exchanging data between bridges to form a singe spanning tree as their forwarding route. Today: improved protocol called RSTP (Rapid STP). Copyright(C)204 Youki Kadobayashi. All rights reserved. 22

23 Questions? Copyright(C)204 Information Youki Kadobayashi. Network / 204 All rights reserved. Summary Basic ideas of Data Link Layer Many simple but effective scheme to obtain good performance Error control, flow control Media access control (MAC) Switched media & learning bridge Ethernet families How can we bind Datalink layer & network layer? Address mapping ARP and ND Multiplexing & demultiplexing protocol architecture in OS Copyright(C)204 Youki Kadobayashi. All rights reserved. Information Network /

24 Hands-On Activity Information Network / 204 Objectives Part Learn basic use of VMWare and Wireshark Understand the TCP/IP Model via packet inspection using Wireshark Part 2 Familiarize with the protocol stack Understand the data link layer thru Wireshark 24

25 Part : Protocol Architecture mabricksmumblings.files. wordpress.com/204/0/ osi_model_lan.jpg Recall: The OSI Model 25

26 Review: Glossary of Layer Protocols WWW - World Wide Web DNS - Domain Name System P2P - Peer to Peer FTP - File Transfer Protocol SMTP - Simple Mail Transfer Protocol SIP - Session Initiation Protocol RTP - Real-time Transport Protocol JPEG - Joint Photographic Experts Group MP3 - Moving Picture Experts Group Layer-3 Audio HTML - Hyper Text Markup Language TCP - Transmission Control Protocol UDP - User Datagram Protocol ICMP - Internet Control Message Protocol IP - Internet Protocol IPsec - Security Architecture for Internet Protocol Ethernet PPP - Point to Point Protocol ARP - Address Resolution Protocol RJ-45 - Registered Jack 45 Recall: OSI Model vs. TCP/IP Information Network /

27 Virtual Machine (VM) Virtual Machine allows you to run another OS on your PC o e.g, run a Linux OS on a Windows/Mac host OS Virtual Machine players o Oracle VirtualBox, VMware, etc. Let s parallely run a Linux OS in your PC!!! Information Network / 204 Running VM and Logging in VM player VM user: information-network204 pwd: network204 Information Network /

28 command menus Wireshark Listing of captured packets Details of selected packet headers Packet contents in hexadecimal and in ASCII Perfect Encapsulation 28

29 Physical Layer ethernet, IP, TCP, and http are coming! Information Network / 204 Data Link 29

30 Network Transport 30

31 Application Information Network / 204 Part 2: Data Link 3

32 Indications Turn off your wireless connection Wireshark: start the live capture Turn on your wireless connection Wireshark: stop the live capture Filtering 32

33 Filtering Ethernet Frame: Exploring bytes 33

34 Ethernet Address: Src & Dst Hexadecimal value of the field Type Address Resolution Protocol: ARP (RFC 826) 34

35 ARP cache arp -a ARP cache: Multiple Network interfaces ARP cache of interface ARP cache of interface 2 ARP cache of interface 3 35

36 Wireshark ARP packets ARP request 36

37 ARP reply ARP Gratuitous 37

38 Assignment 2 () Using wireshark, observe traffic generated by other applications and depict protocol stack, according to wireshark output. Indicate which protocol belongs to which OSI-7 layer in an illustration. Copyright(C)204 Youki Kadobayashi. All rights reserved. Assignment 2 (2) A frame: ff ff ff ff ff ff 84 2b 2b b 2b a3 dd 34 5e a3 dd 34 5e Inspect the above frame and look for error(s). Then, explain the root cause of the error(s). Copyright(C)204 Youki Kadobayashi. All rights reserved. 38

39 Assignments: Miscellaneous Deadline: 204/05/ at 23:59 Submit to: network-204 _at_ is.naist.jp File nomenclature: Name_StudentID.pdf Assignment 2: at most 4 pages. Language: Japanese or English Copyright(C)204 Youki Kadobayashi. All rights reserved. 39

Physical and Data Link layers

Physical and Data Link layers Physical and Data Link layers Youki Kadobayashi Graduate School of Science Nara Institute of Science and Technology Physical Layer All rights reserved. 2 Types of transmission medium! Cables Optical fiber

More information

Physical and Data Link layers. Youki Kadobayashi Graduate School of Information Science Nara Institute of Science and Technology

Physical and Data Link layers. Youki Kadobayashi Graduate School of Information Science Nara Institute of Science and Technology Physical and Data Link layers Youki Kadobayashi Graduate School of Information Science Nara Institute of Science and Technology Physical Layer Copyright(C)2016 Youki Kadobayashi. All rights reserved. 2

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Chapter 6 The Link Layer and LANs

Chapter 6 The Link Layer and LANs Chapter 6 The Link Layer and LANs A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind

More information

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Outline. A variety of datalinks. The Origins X.25. Origins of the WAN type datalink. X.25 Network Model. Outline of HDLC (1)

Outline. A variety of datalinks. The Origins X.25. Origins of the WAN type datalink. X.25 Network Model. Outline of HDLC (1) Outline A variety of datalinks Suguru Yamaguchi Nara Institute of Science and Technology Graduate School of Information Science A variety of datalinks WANX.25 LANMedia Access Control (MAC) Evolution of

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

Link Layer and LANs. CMPS 4750/6750: Computer Networks

Link Layer and LANs. CMPS 4750/6750: Computer Networks Link Layer and LANs CMPS 4750/6750: Computer Networks 1 Outline overview (6.1) multiple access (6.3) link addressing: ARP (6.4.1) a day in the life of a web request (6.7) 2 Link layer: introduction terminology:

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? CCNA 1 Chapter 4 v5.0 Exam Answers 2015 (100%) 1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? application transport data link physical

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

Module 10 Data Link Layer CS655! 10-1!

Module 10 Data Link Layer CS655! 10-1! Module 10 Data Link Layer CS655! 10-1! Please note: Most of these slides come from this book. Note their copyright notice below! A note on the use of these ppt slides: We re making these slides freely

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Principles behind data link layer services:

Principles behind data link layer services: Data Link Layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

CC451 Computer Networks

CC451 Computer Networks CC451 Computer Networks Lecture 9 Link Layer 5: DataLink Layer 5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students,

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

Raj Jain. The Ohio State University Columbus, OH

Raj Jain. The Ohio State University Columbus, OH Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Data Link Technology (3) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology (3) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology (3) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Media Access Control (MAC) Information Network 1 / 2012 2 Access Channel Two types of

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing. /9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Lecture 8 Link Layer: functionality, error detection, media access algorithm Lecture 8 Link Layer: functionality, error detection, media access algorithm From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright

More information

Chapter V: Link Layer

Chapter V: Link Layer Chapter V: Link Layer UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross Link layer services framing, link access: encapsulate datagram

More information

Hands-On Network Security: Practical Tools & Methods

Hands-On Network Security: Practical Tools & Methods Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network

More information

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta)

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta) 70-742 Number: 70-742 Passing Score: 750 Time Limit: 120 min File Version: 1.0 Microsoft 70-742 Exam Name: Identity with Windows Server 2016 (beta) Sections 1. Understanding Local Area Networks 2. Defining

More information

The MAC Address Format

The MAC Address Format Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number

More information

CS1302 / Computer Networks

CS1302 / Computer Networks CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

1. Data Link Layer (Layer 2)

1. Data Link Layer (Layer 2) 1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

Network Architecture Models

Network Architecture Models School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Dr. Nils

More information

Lecture 6 Datalink Framing, Switching. From Signals to Packets

Lecture 6 Datalink Framing, Switching. From Signals to Packets Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to

More information

NETWORK SECURITY ITEC 435

NETWORK SECURITY ITEC 435 NETWORK SECURITY ITEC 435 Agenda Chapter 2: Introduction to Networking Introduction to Networking Networking Fundamentals Reasons to Network Getting the Message Across Analog Information on an Analog Medium

More information

Lecture 3 Protocol Stacks and Layering

Lecture 3 Protocol Stacks and Layering Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Communication Networks

Communication Networks Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture

More information

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack Data Link Protocols TCP/IP Suite and OSI Reference Model The TCP/IP protocol stack does not define the lower layers of a complete protocol stack In this lecture, we will address how the TCP/IP protocol

More information

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key COMP 361 Computer Communications Networks all Semester 2003 inal Examination: Solution key Date: Dec 15, 2003, ime 8:30am - 11:30am, venue Rm 3007 Name: Student ID: Email: Instructions: 1. his examination

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components

More information

Informal Quiz #01: SOLUTIONS

Informal Quiz #01: SOLUTIONS ECSE-6600: Internet Protocols Informal Quiz #01: SOLUTIONS : GOOGLE: Shiv RPI shivkuma@ecse.rpi.edu 1 Review of Networking Concepts (I): Informal Quiz SOLUTIONS For each T/F question: Replace the appropriate

More information

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1 Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information