How to cope with last hop impairments? Part 2 ARQ #5. How to cope with last hop impairments?

Size: px
Start display at page:

Download "How to cope with last hop impairments? Part 2 ARQ #5. How to cope with last hop impairments?"

Transcription

1 How to cope with last hop impairments? Part 2 ARQ #5 Victor S. Frost Dan F. Servey Distinguished Proessor Electrical Engineering and Computer Science University o Kansas 2335 Irving Hill Dr. Lawrence, Kansas Phone: (785) FAX:(785) rost@eecs.ku.edu All material copyright 2006 Victor S. Frost, All Rights Reserved # 5 1 How to cope with last hop impairments? Techniques or coping with noise Forward error detection/correction coding Automatic Repeat request (ARQ) Co-existance or modiications to end-to-end protocols Techniques or coping with multipath ading ading mitigation techniques, e.g., Equalizers Diversity RAKE receivers OFDM # 5 2

2 ARQ ARQ is used or both Flow control Error control For access networks the main issue is error control # 5 3 Protocol 1: The Unrestricted Simplex Protocol Assumptions One directional inormation low Ininite buers No errors Network Layer always has a packet to send Network Layer Data Link Layer Data Link Layer Network Layer # 5 4

3 Protocol 2: The Simplex Stop & Wait Protocol: Assumptions One directional inormation low No errors Network Layer always has a packet to send Finite receive buers Finite buer means that there must be some way to stop the transmitter rom sending when the buer is ull # 5 5 Protocol 2: The Simplex Stop & Wait Protocol Assume Network Layer always has data to send Network Layer Data Link Layer ACK Channel Data Link Layer Network Layer # 5 6

4 Protocol 2: The Simplex Stop & Wait Protocol Assume Network Layer always has data to send Network Layer Data Link Layer ACK Channel Data Link Layer Network Layer # 5 7 Protocol 2: The Simplex Stop & Wait Protocol Assume Network Layer always has data to send Network Layer Data Link Layer ACK Channel Data Link Layer Network Layer # 5 8

5 Protocol 3: The Simplex Protocol or a Noisy Channel Assumptions One directional inormation low Network Layer always has a packet to send Finite receive buers Allow errors Data link protocols must address What to transmit (in access networks) When to retransmit What to retransmit # 5 9 Access Networks-What to Transmit Scheduling based on Requests or upstream transmission opportunities Channel conditions CoS QoS # 5 10

6 Protocol 3: The Simplex Protocol or a Noisy Channel Timeout to determine when to retransmitt Example: Assume a 1 ms propagation time Assume a.1 ms receiver packet processing time Timeout interval >2.1 ms I no acknowledgment received in 2.1 ms then, Packet in error Acknowledgment lost # 5 11 Protocol 3: The Simplex Protocol or a Noisy Channel Timeout interval too short Duplicate packets Timeout interval too long Reduced throughput # 5 12

7 Protocol 3: The Simplex Protocol or a Noisy Channel Sequence numbers are used to determine what to retransmitt Transmitter assigns a number to each rame Receiver keeps track o the expected rame number How to deal with out o sequence rames, i.e., i the received sequence number does not match what is expected, The rame is dumped (or some DLC protocols) Frame stored Again aced with the issue o how to schedule the retransmission wrt current state o buers and channels. # 5 13 Protocol 3: One Simplex Protocol or a Noisy Channel Event Transmitter Action Receiver Action Packet arrived to DLL rom NL Frame arrive at receiver Receive Acknolwedgement Store in Buer. Insert s.seq. Transmit Frame & start timer. Remove rom buer Get next packet rom NL Increment s.seq Store packet in Buer. Insert s.seq. Transmit Frame & start timer. Get rame rom physical layer. I in error then dump it. I out o sequence then dump it. I in-sequence and error ree then, send to NL, increment Frame Expected, Send Acknowledgement # 5 14

8 Sliding Window Protocols: Assumptions Two directional inormation low Network Layer always has a packet to send Finite receive buers Finite number o bits/sequence number Piggybacking Put Acknowledgments in reverse traic low Increases protocol eiciency Reduces interrupts # 5 15 Sliding Window Protocols: Advantage pipeline Why called sliding window Assume 2 bits/sequence number Possible rame numbers 0, 1, 2, 3 0, 1, 2, 3, 0, 1, 2, 3, 0, 1, 2, 3, 0, 1, 2, 3, 0, 1, 2, 3, 0, 1, 2, 3 Receive ack and advance window # 5 16

9 Sliding Window Protocols: A A to B Data Traic B to A Ack Traic B to A Data Traic A to B Ack Traic B # 5 17 Sliding Window Protocols Transmitter keeps a list o sequence # s it can use Sending window Receiver keeps a list o sequence # s it will accept Receiving window n = # bits/(sequence number) # 5 18

10 Sliding Window Protocols Sequence numbers in range n -1 This allows N=2 n -1 packets to be sent beore getting and acknowledgment Requires N=2 n -1 packets buers # 5 19 Sliding Window Protocols: How many rames can be pipelined: Problem i max # rames in pipeline = 2 n Assume that # rames in pipeline 2 n Assume n = 3, Node A sends (8 rames) Node B receives ok and sends Ack First Ack gets lost Packet 0 o Node A times out Node B receives another packet 0, expects a packet 0, but this is a duplicate Thus: # rames in pipline <= 2 n -1 # 5 20

11 Sliding Window Protocols: How many rames can be pipelined (1) Now with # rames in pipline = N= 2 n (7 rames) Node A sends Node B receives ok Node B sends Ack Ackgets lost # 5 21 Sliding Window Protocols: How many rames can be pipelined (2) Node A times out Node A retransmitts But Node B is expecting rame #7 Node ignores (oten will send a RR rame explicitly telling Node A it is expecting Frame #7) # 5 22

12 Focus on which rames to retransmit Pipeline: send up to N rames beore receiving an acknowledgment # 5 23 Example Distance between nodes = 1 km Frame length = 1000 bits Capacity = 150 Mb/s No errors Delay-bandwidth product Assume ree space τ =1000m/c = 3.33 us 2 τr= 1000 bits # 5 24

13 Example Case 1: Stop and Wait (N=1) Frame transmission time = 6.66us Propagation time = 3.33us Transmit rame at t=0, At 6.66 us us rame received At 6.66us us the acknowledgment is received, thereore transmitted 1000 bits in 6.66us us Eective transmission rate is 1000/13.3us ~ 75Mb/s Eiciency: (75Mb/s)/(150Mb/s) ~ 50.0% eicient # 5 25 Example Case 2: Stop and Wait (N=1) Reduce capacity to 1.5 Mb/s (like a 3G rate) Frame transmission time = 666us Propagation time = 3.33us Transmit rame at t=0, At 666 us us rame received At 666us us the acknowledgment is received, thereore transmitted 1000 bits in 666us us Eective transmission rate is 1000/672us ~ Mb/s Eiciency: (1.488Mb/s)/(1.50Mb/s) ~ 99.2% eicient # 5 26

14 Example Case 3: Stop and Wait (N=1) Capacity to 150 Mb/s Frame transmission time = 6.66us WAN: D=1000km Propagation time = 3333us Transmit rame at t=0, At 6.66 us us rame received At 6.66us us the acknowledgment is received, thereore transmitted 1000 bits in 6.66us us Eective transmission rate is 1000/6672us ~.149Mb/s Eiciency: (.149Mb/s)/(150Mb/s) ~ 0.1% eicient # 5 27 Example Case 4: Sliding window (N=1023) Capacity to 150 Mb/s Frame transmission time = 6.66us WAN: D=1000km Propagation time = 3333us Transmit rame at t=0, Note 2 τr = 999,900 bits or in rames rames Since time to transmit 1023 rames > Always have a sequence number to use Never have to wait or ACK Eiciency 100% # 5 28

15 Example 6.66us 3333us Frame # 1,000 Ack or Frame 1 # 5 29 Go-Back-N Protocol (1) Problem: I there is an error or lost rame then what rules are used to determine the rames to retransmit. Go-back-N Retransmit all rames transmitted ater the erred rame The receiver ignores all out-o sequence rames # 5 30

16 Go-Back-N Protocol (2) Example: Transmit 1,2,3,4,5 and rame 2 is in error then 3, 4, and 5 are received out o sequence and retransmit 2,3,4,5 # 5 31 Selective Repeat Receiver accepts out o sequence rames Requires buers in receiver and transmitter Requires extra processing to deliver packets in order to the Network Layer # 5 32

17 Other Enhancements Negative Acknowledgment When an out-o-sequence rame is received the receiver sends a NAK rame to the transmitter, the NAK rame contains the sequence number o the expected data rame. NAK enables aster error recovery, without a NAK time-out must be used to learn about errors. # 5 33 Sliding Window Protocols: Piggyback ACKS Reverse traic is used to Piggyback ACKS A A to B Data Traic B to A Ack Traic B to A Data Traic A to B Ack Traic B # 5 34

18 Other Enhancements: Acknowledgment timer I there is light (or no) reverse traic then ACKS may not be sent. An acknowledgment timer is used to insure ACKS are sent. Upon receipt o a rame an AckTimer is started. I reverse traic arrives beore the AckTimer ires then piggyback the ACK. I the AckTimer ires then send a supervisory ACK rame. # 5 35 Perormance Deinition or eective rate R e = Time to # Bits Delivered transer Bits given the protocol # 5 36

19 Perormance Length o data packet (bits) = D Number o overhead bits/packet = n o Link Rate(b/s) = R Length o Ack Packet (bits)= n a Frame size = n = D+ n o One-way propagation delay = τ Processing time (in receiver and transmitter) = t proc # 5 37 Perormance-Stop & Wait Eective rate and eiciency or simplex stop-and-wait protocol t ack = n a /R t = n /R Time to transmit one rame = t o t o = 2 τ + t + t ack + 2 t proc = 2(τ + t proc ) + (n a + n )/R # 5 38

20 Perormance-Stop & Wait R e = (n - n o )/ t o Eiciency = R e /R = ηo = 1+ n n a no 1 n 2R( τ + t + n proc ) # 5 39 Perormance-Stop & Wait: Limiting Case Assuming 1) n 2) t a proc 3) n n o then n 1 ηo = 2τ R 1+ n τ so t n so n a proc n so n o 0 + τ τ 0 Deine 2tR = Delay-Bandwidth Product For ixed DLL parameters As Delay-Bandwidth Product Eiciency # 5 40

21 Perormance-Stop & Wait Example Frame size = 1024 bytes Overhead = Ack= 8 bytes τ = 50 ms Case 1: R=30 Kb/s Eiciency = 73% Case 2: R=1.5 Mb/s Eiciency = 5% # 5 41 Perormance-Sliding Window Protocol Case 1: Large window Window Size = N Transmit N packet and wait or Ack Making the same assumption as beore First Ack arrives at sender at: 2τ + n R # 5 42

22 Perormance-Sliding Window Protocol Case 1: Large window I time to transmit N packets > time to get irst ack Or Nn / R > 2τ + n / R Then channel is always busy sending packets Eiciency = (n -n o )/ n # 5 43 Perormance-Sliding Window Protocol Case 2: Small Window I time to transmit N packets < time to get irst ack Or Nn / R < 2τ + n / R Then channel is Not always busy sending packets: Time is wasted waiting or an Ack # 5 44

23 Perormance-Sliding Window Protocol Time to send one window = Nn / R Number o bits sent = Nn Time to send Nn bits = 2τ + n / R Eective rate = Nn /(2τ + n / R ) Eiciency = Nn /(2τR + n ) = N /(2τR/ n + 1) # 5 45 Perormance-Sliding Window Protocol Example: Frame size = 1024 bytes Overhead = Ack= 0 bytes τ = 1 ms Rate = 40 Mb/s Case 1: N = 12 Eiciency = 100% 40 Mb/s Case 2: N = 8 Eiciency = ~75% 30 Mb/s Case 3: N = 4 Eiciency = ~ 37% 15 Mb/s Note you can control the rate by changing N # 5 46

24 With bit errors Let p = Probability o a bit error Assume bits errors are random Let P = Probability o a rame error P = 1 - (1-p) n I p << 1 then P = pn # 5 47 Stop and Wait Perormance The Probability that it takes 1 transmission to send a rame = 1- P The Probability that it takes 2 transmission to send a rame = P (1- P ) The Probability that it takes 3 transmission to send a rame = P P (1- P ) Average number o transmissions = kp k= 1 k-1 1 (1 P ) = (1 P ) # 5 48

25 Stop and Wait Perormance Without errors t o = 2 τ + t + t ack + 2 t proc = 2(τ + t proc ) + (n a + n )/R ~ 2 τ + n /R With Errors t o = (2 τ + n /R)/ (1- P ) η with errors = (1- P )η without errors # 5 49 Stop and Wait Perormance Stop and wait Capacity = 2 Mb/s Frame size= 512 bits Propagation time = 10us Eiciency without errors = 0.92 Eiciency Perormance o Stop and Wait with Errors Bit error rate # 5 50

26 Perormance o Sliding Window Assume Go-Back-N (GBN) Assume large window case with W s = window size Assume P rame loss probability, then time to deliver a rame is: t i irst rame transmission succeeds (1 P ) t + W s t /(1-P ) i the irst transmission does not succeed P t η GBN GBN = t (1 P ) + P { t = n n t R GBN o no 1 n = 1+ ( N 1) P Nt + } = t 1 P (1 P ) Nt + P 1 P and Modiied rom: Leon-Garcia & Widjaja: Communication Networks # 5 51 Perormance o Sliding Window Assume Selective repeat Assume P rame loss probability, then number o transmissions required to deliver a rame is: t / (1-P ) n n η SR = t o /(1 P R ) no = (1 n )(1 P ) Modiied rom: Leon-Garcia & Widjaja: Communication Networks # 5 52

27 With Errors Eiciency ARQ Eiciency Com parison Selective Repeat LOG(p) p Delay-Bandwidth product = 10, 100 Go Back N 10 Stop and Wait 100 Go Back N 100 Stop and Wait 10 Modiied rom: Leon-Garcia & Widjaja: Communication Networks # 5 53 Impact o ARQ Increase delay wait or successul retransmission Increase the delay variation Reduce the eective throughput Signiicantly reduces the probability o an errored packet reaching upper layers especially when combined with FEC. Practical issue: The link layer will only try to send a packet or so long, eventually it will time out and let high layers deal with the problem; thereore higher layers can still see losses # 5 54

28 Other actions to cope with errors Adaptive power control In CDMA system this increases the intererence to other users Used in ixed wireless deployments Adaptive bit rate: via measurements the system knows to reduce its transmission rate to keep BER (PER) constant, e.g., adapt the modulation scheme With constant PER the time in ARQ retransmissions is ~constant Combine FEC with ARQ: Save the errored packet and ask or retransmission # 5 55 Adaptive Bit Rate Rate vs S/N 800 Date Rate (kb S/N (db) + S/N obtained via measurements + Measurement called channel state inormation + Rate change by: - Modulation - Number codes assigned - Number o time slots assigned # 5 56

29 Rate adaptation techniques Basic idea: change the modulation and coding scheme during the communication to adapt to the changing link conditions, e.g., radio environment * GPRS=General Packet Radio Service GSM=Global System or Mobile Communications EDGE= Enhanced date rates or GSM Evolution CS=Coding Scheme MCS=Modulation and Coding Scheme Mode IEEE b Mb/s IEEE a Mb/s *From: Dealing with the EDGE Evolution, Terry Locke, Si Nguyen, and Dominique Moreuil, Nortel Networks CommsDesign.com Sep 24, 2002 # 5 57 Hybrid ARQ: Incremental Redundancy Goal: transmit a packet o J inormation bits Add c error detection bits to the J inormation bits to create a J + c packet Use a convolutional code with 1/K redundancy ratio Use a 1/K convolution code get K(J+c) bits Puncture the 1/K convolutional code* to get a rate 1 code and save all K(J+c) bits Send the J+c bits *Need to use special Convolutional codes: Rate Compatible Codes (RCPC) # 5 58

30 Hybrid ARQ: Incremental Redundancy At receiver recive only J+C bits Pad J+C bits with random bits to get the K(J+c) bits Use Viterbi decoding Check CRC I checks then accept packet and send ACK done Else save received bits and send NACK The sender now sends transmitters next J+c bits At receiver now have higher rate code 1/2 Use Viterbi decoding Check CRC I checks then accept packet and send ACK Else save received bits and send NACK Continue until sent all K(J+c) bits # 5 59 Hybrid ARQ: Incremental Redundancy Each retransmission adds redundancy that will improve the probability o correct reception Modiied From: Incremental Redundancy in EGPRS, Feb, # 5 60

31 Hybrid ARQ: Incremental Redundancy Rate 1/3 means 3 coded bits or each inormation bit Modiied From: Incremental Redundancy in EGPRS, Feb, # 5 61 Hybrid ARQ: Incremental Redundancy Advantage: I mobile is close to BS then lots o power and only irst packet (rate =1) will be needed As the mobile moves away rom the BS there is less power and this scheme automatically compensates by sending additional redundancy bits. Process automatically matches coding rate to the channel S/N without explicit measurement o CSI # 5 62

32 Reerences Leon-Garcia & Widjaja: Communication Networks, McGraw Hill, 2004 Dealing with the EDGE Evolution, Terry Locke, Si Nguyen, and Dominique Moreuil, Nortel Networks CommsDesign.com Sep 24, 2002 Cianca, E., et al., Channel-adaptive techniques in wireless communications: an overview. Wireless Communications and Mobile Computing, (8): p Falahati, S., et al., Convolutional Coding in Hybrid Type-II ARQ Schemes on Wireless Channels, in Proceedings Radiovetenskap och Kommunikations. 1999: Karlskrona, Sweden. Langton, C., Coding adn decoding with convolutional codes. p Mercy, P., Incremental Redundancy in EGPRS. Wireless Design & Development, 2005 p Mukhtar, R., et al., A model or the perormance evaluation o packet transmissions using type-ii hybrid ARQ over a correlated error channel Wirel. Netw., (1): p Nanda, S., K. Balachandran, and S. Kumar, Adaptation techniques in wireless packet data services. Communications Magazine, IEEE, (1): p Porat, D., Incremental Redundancy. 2002, Communication & Signal Processing Ltd. p # 5 63

Data Link Control. Outline. DLC functions

Data Link Control. Outline. DLC functions Data Link Control #8 1 Outline functions Framing Error and flow control Performance of Example of a standard protocol- >H Open loop flow control 2 Data Link Layer Functions Data Link layer provides a error

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

CSE3213 Computer Network I

CSE3213 Computer Network I SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h. 5. 5.3. and 5.7.) ourse page: http://www.cse.yorku.ca/course/33 Slides modiied om lberto Leon-Garcia and Indra Widjaja

More information

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For

More information

CS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request

CS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request S4/MSc omputer Networking Lectures 4-5 Transport layer protocols TP/UDP automatic repeat request omputer Networking, opyright University o Edinburgh 005 Transport services and protocols provide logical

More information

Lecture 7: Flow Control"

Lecture 7: Flow Control Lecture 7: Flow Control" CSE 123: Computer Networks Alex C. Snoeren No class Monday! Lecture 7 Overview" Flow control Go-back-N Sliding window 2 Stop-and-Wait Performance" Lousy performance if xmit 1 pkt

More information

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure Computer Networking Reliable Transport Prof. Andrzej Duda duda@imag.fr Reliable Transport Reliable data transfer Data are received ordered and error-free Elements of procedure usually means the set of

More information

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review. EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

Data Link Layer, Part 5 Sliding Window Protocols. Preface

Data Link Layer, Part 5 Sliding Window Protocols. Preface Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture) Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

S Capacity enhancement methods for radio interface ARQ Schemes

S Capacity enhancement methods for radio interface ARQ Schemes ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control

More information

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

CHANNEL CODING 1. Introduction

CHANNEL CODING 1. Introduction CHANNEL CODING 1. Introduction The fundamental resources at the disposal of a communications engineer are signal power, time and bandwidth. For a given communications environment, these three resources

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

Lecture 7: Flow & Media Access Control"

Lecture 7: Flow & Media Access Control Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into

More information

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Link Layer Fundamentals of Communication Networks Data Link layer o It is the first logical layer in the protocol stack o Functions

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies ARQ Schemes, March 26 24 ARQ Schemes, March 26 24 2 Outline Classification of error control strategies S-7263 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 24

More information

Communication Networks

Communication Networks Communication Networks Prof. Laurent Vanbever Exercises week 4 Reliable Transport Reliable versus Unreliable Transport In the lecture, you have learned how a reliable transport protocol can be built on

More information

The Transport Layer Reliability

The Transport Layer Reliability The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication

More information

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols 16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use

More information

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) Data Link Control Contents Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) 2 Flow Control Flow control is a technique for assuring that a transmitting entity

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each

More information

Principles of Reliable Data Transfer

Principles of Reliable Data Transfer Principles of Reliable Data Transfer 1 Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver amid network errors, i.e., corrupted/lost packets

More information

Inst: Chris Davison

Inst: Chris Davison ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of

More information

Data Link Control Layer, Error Detection, Error Correction, and Framing

Data Link Control Layer, Error Detection, Error Correction, and Framing Data Link Control Layer, Error Detection, Error Correction, and Framing EEE 538, WEEK 2 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Error Detection Techniques Used

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Administrivia. FEC vs. ARQ. Reliable Transmission FEC. Last time: Framing Error detection. FEC provides constant throughput and predictable delay

Administrivia. FEC vs. ARQ. Reliable Transmission FEC. Last time: Framing Error detection. FEC provides constant throughput and predictable delay FEC vs. ARQ Administrivia FEC provides constant throughput and predictable delay If high error rate, need long codes/complex circuitry Does not protect against all errors, or packet loss Last time: Framing

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that

More information

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

DLL: Flow Control DLL. Simplex. Fast sender / slow receiver scenario. Various protocols used. Simplified examples implemented in C.

DLL: Flow Control DLL. Simplex. Fast sender / slow receiver scenario. Various protocols used. Simplified examples implemented in C. DLL: Flow Control Fast sender / slow receiver scenario Feedback mechanism reqd. Various protocols used Stop and Wait Sliding window protocols Hugh Melvin, Dept. of IT, NUI,G 1 DLL Simplified examples implemented

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW! CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy

More information

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Flow control: Ensuring the source sending frames does not overflow the receiver

Flow control: Ensuring the source sending frames does not overflow the receiver Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis

More information

The flow of data must not be allowed to overwhelm the receiver

The flow of data must not be allowed to overwhelm the receiver Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before

More information

INF Data Communication Data Link Layer

INF Data Communication Data Link Layer INF3190 - Data Communication Data Link Layer Carsten Griwodz Email: griff@ifi.uio.no most slides from: Ralf Steinmetz, TU Darmstadt and a few from Olav Lysne, J. K. Kurose og K. W. Ross Function, Services

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

1.6 Error Control Strategies

1.6 Error Control Strategies 1.6 Error Control Strategies 1.6.1 Introduction ARQ Data Source Encoder Binary Channel Decoder Data Sink {u} {v} {v'} {u'} encoder, decoder, error control; error control strategies: (simple) error detection;

More information

Solutions for Chapter similar to 1 and 3

Solutions for Chapter similar to 1 and 3 Solutions for Chapter 2 1. 2. similar to 1 and 3 3. 4. In a 5-bit sequence with 32 codes, there are 8 codes that start with 00 and there are 8 codes that ends with 00. Between them 00100 and 00000 are

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1. Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT

More information

A study of Skype over IEEE networks: voice quality and bandwidth usage

A study of Skype over IEEE networks: voice quality and bandwidth usage Graduate Theses and Dissertations Graduate College 2011 A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Kuan-yu Chen Iowa State University Follow this and additional works

More information

An Efficient Selective-Repeat ARQ Scheme for Half-duplex Infrared Links under High Bit Error Rate Conditions

An Efficient Selective-Repeat ARQ Scheme for Half-duplex Infrared Links under High Bit Error Rate Conditions This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 26 proceedings. An Efficient Selective-Repeat ARQ Scheme for

More information

Answers to Sample Questions on Transport Layer

Answers to Sample Questions on Transport Layer Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen CRISTAL Laboratory, Tunisia Email: Raja.Abdelmoumen@ensi.rnu.tn Chadi Barakat Projet Planète, INRIA-Sophia

More information

The GBN sender must respond to three types of events:

The GBN sender must respond to three types of events: Go-Back-N (GBN) In a Go-Back-N (GBN) protocol, the sender is allowed to transmit several packets (when available) without waiting for an acknowledgment, but is constrained to have no more than some maximum

More information

Lecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday

Lecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Lecture 10: Link layer multicast Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Unicast and broadcast Usually, link layer is used to send data over a single hop between source and destination. This

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1. Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL

More information

06/05/2008. Chapter 3. The Data Link Layer. Data Link Layer Design Issues. Services Provided to the Network Layer. Error Control Flow Control

06/05/2008. Chapter 3. The Data Link Layer. Data Link Layer Design Issues. Services Provided to the Network Layer. Error Control Flow Control Chapter 3 The Data Link Layer Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 1 Functions of the Data Link Layer Provide service interface to the

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

10.1 REVIEW QUESTIONS

10.1 REVIEW QUESTIONS CHAPTER 10 Data Link Control 10.1 REVIEW QUESTIONS 1. Transmission means to put a signal on a line. Communication is a meaningful and orderly relationship between devices that send and receive data. 3.

More information

EECS 563 Fall Review Test 2. Review Test 2

EECS 563 Fall Review Test 2. Review Test 2 EECS 563 Fall 2013 1 Network traffic Request for resources Rate of requests= λ Average resource hold time = T h Common Assumptions Time between arrivals ~ exponentially Holding time ~ exponentially Voice

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Performance of Hybrid ARQ Techniques for WCDMA High Data Rates

Performance of Hybrid ARQ Techniques for WCDMA High Data Rates Performance of Hybrid ARQ Techniques for WCDMA High Data Rates Esa Malkamalu, Deepak Mathew, Seppo Hamalainen Nokia Research Center P.O. Box 47, FN-45 Nokia Group, Finland esa.malkamaki @nokia.com Abstract

More information

ELEN Network Fundamentals Lecture 15

ELEN Network Fundamentals Lecture 15 ELEN 4017 Network Fundamentals Lecture 15 Purpose of lecture Chapter 3: Transport Layer Reliable data transfer Developing a reliable protocol Reliability implies: No data is corrupted (flipped bits) Data

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

TCP over wireless links

TCP over wireless links CSc 450/550 Computer Communications & Networks TCP over wireless links Jianping Pan (stand-in for Dr. Wu) 1/31/06 CSc 450/550 1 TCP over wireless links TCP a quick review on how TCP works Wireless links

More information

COMPUTER NETWORKS - Window protocols

COMPUTER NETWORKS - Window protocols ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere

More information

COMPUTER NETWORKS - Window protocols

COMPUTER NETWORKS - Window protocols ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Window protocols - 1 Copyright Quest opera è protetta dalla licenza Creative

More information

Lecture 11 Overview. Last Lecture. This Lecture. Next Lecture. Medium Access Control. Flow and error control Source: Sections , 23.

Lecture 11 Overview. Last Lecture. This Lecture. Next Lecture. Medium Access Control. Flow and error control Source: Sections , 23. Last Lecture Lecture 11 Overview Medium Access Control This Lecture Flow and error control Source: Sections 11.1-11.2, 23.2 Next Lecture Local Area Networks 1 Source: Sections 13 Data link layer Logical

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

Layered Network Architecture. CSC358 - Introduction to Computer Networks

Layered Network Architecture. CSC358 - Introduction to Computer Networks Layered Network Architecture Layered Network Architecture Question: How can we provide a reliable service on the top of a unreliable service? ARQ: Automatic Repeat Request Can be used in every layer TCP

More information

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Scalable Video Transport over Wireless IP Networks. Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering

Scalable Video Transport over Wireless IP Networks. Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering Scalable Video Transport over Wireless IP Networks Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering Bandwidth Fluctuations Access SW Domain B Domain A Source Access

More information

CPE 548 Exam #1 (50 pts) February 17, 2016

CPE 548 Exam #1 (50 pts) February 17, 2016 Name Class: 548 All answers must have supporting work. Any answer without support will receive no credit 1) (4 pts) Answer the following short answer questions. a) Explain the stop and wait ARQ (automatic

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 2 Functions of the Data Link Layer Provide service interface to the

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

MILCOM October 2002 (Anaheim, California) Subject

MILCOM October 2002 (Anaheim, California) Subject MILCOM 2002 7-10 October 2002 (Anaheim, California) Subject PERFORMANCE ANALYSIS OF A NEW HEADER COMPRESSION SCHEME FOR TCP STREAMS IN IP BASED WIRELESS NETWORKS Authors: Prof. Pietro Camarda, Ing.. Sandro

More information

TCP in Asymmetric Environments

TCP in Asymmetric Environments TCP in Asymmetric Environments KReSIT, IIT Bombay Vijay T. Raisinghani TCP in Asymmetric Environments 1 TCP Overview Four congestion control algorithms Slow start Congestion avoidance Fast retransmit Fast

More information

Data Communications. Automatic Repeat Request Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements

More information

Reliable File Transfer in the Multicast Domain

Reliable File Transfer in the Multicast Domain Reliable File Transfer in the Multicast Domain Winston Dang August 1993 Abstract This paper describes a broadcast file transfer protocol that is suitable for widespread distribution of files from several

More information

Data Link Layer (1) Networked Systems 3 Lecture 6

Data Link Layer (1) Networked Systems 3 Lecture 6 Data Link Layer (1) Networked Systems 3 Lecture 6 Purpose of Data Link Layer Arbitrate access to the physical layer Structure and frame the raw bits Provide flow control Detect and correct bit errors Perform

More information

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:

More information

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not CS475 Networks Lecture 5 Chapter 2: Direct Link Networks Assignments Reading for Lecture 6: Sections 2.6 2.8 Homework 2: 2.1, 2.4, 2.6, 2.14, 2.18, 2.31, 2.35. Due Thursday, Sept. 15 2.4 Error Detection

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

TDTS06: Computer Networks

TDTS06: Computer Networks TDTS06: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides

More information

Makidis Michael.

Makidis Michael. Makidis Michael mmakidis05@aueb.gr RLC protocol overview procedures Simulation setup Performance of applications without contention Performance of applications with contention Performance of CBR Media

More information

Lecture 26: Data Link Layer

Lecture 26: Data Link Layer Introduction We have seen in previous lectures that the physical layer is responsible for the transmission of row bits (Ones and Zeros) over the channel. It is responsible for issues related to the line

More information

Data Link Control. Surasak Sanguanpong Last updated: 11 July 2000

Data Link Control. Surasak Sanguanpong  Last updated: 11 July 2000 1/14 Data Link Control Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 11 July 2000 Flow Control 2/14 technique for controlling the data transmission so that s have sufficient

More information

Reliable Transport : Fundamentals of Computer Networks Bill Nace

Reliable Transport : Fundamentals of Computer Networks Bill Nace Reliable Transport 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administration Stuff is due HW #1

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information