Chapter 5 Peer-to-Peer Protocols. School of Info. Sci. & Eng. Shandong Univ..
|
|
- Edward Beasley
- 5 years ago
- Views:
Transcription
1 hapter 5 Peer-to-Peer Protocols School of Info. Sci. & Eng. Shandong Univ..
2 Outline 5. Peer-to-peer protocols and service models 5. RQ Protocols 5.3 Other daptation Functions Sliding Window Flow ontrol Synchronization 5.4 Data Link Layer HDL PPP 5.5 Statistical Multiplexing
3 n+ entity n+ entity SP n-sdu n-sdu SP n-sdu H n entity n entity H n-sdu n-pdu Figure 5.
4 Peer-to-peer protocol across a single hop. Packets Packets (a) Protocol stack view Data link Layer Physical Layer Frames Data link Layer Physical Layer B (b) Spatial view. 3 Medium B 3 Physical layer entity Data link layer entity 3 Network layer entity Figure 5.
5 Peer-to-peer protocols, end-to-end across a network Protocol stack view Messages Messages Transport Layer Segments Transport Layer Network Layer Network Layer Network Layer Network Layer End system α Data link Layer Physical Layer Data link Layer Physical Layer Data link Layer Physical Layer Data link Layer Physical Layer End system Β Network Figure 5.3
6 Peer-to-peer protocols end-to-end across a network. 3 Spatial view. End System α End System β Medium B Physical layer entity Network 3 Network layer entity Data link layer entity 3 Network layer entity 4 Transport layer entity Figure 5.4
7 Service Models Main division is between connection-oriented and connectionless models onnection-oriented (Similar to circuit-switched POTS). Need to first set up connection. Then conduct dialog. Packets take same route on virtual circuit Need to release connection for others to use onnectionless (Similar to old telegram system) No set up or take down required. Packets ( datagrams ) flow to destination independently. Might take different routes.
8 Other spects of Service Model cknowledged vs. unacknowledged service Packets organized into blocks or streams of bits or bytes onstant bit rate (attempt) or variable bit rate Quality of Service (QoS) probability of error probability of loss transfer delay Best Effort service -- no guarantees
9 Network service pplication Network pplication daptation Function daptation Function End-to-end application requirements Figure 5.5
10 End-to-End Requirements and daptation Functions The adaptation function that tries to overcome deficiencies in underlying network service daptation functions can help deal with: arbitrary message size reliability and sequencing pacing and flow control timing addressing privacy, integrity, and authentication
11 Messages of arbitrary size must be sent, but networks have a limit on block sizes. n adaptation function might change size of blocks. (a) call = message = entire sequence of speech samples voice conversation might be viewed as a humongous message or astream of bytes (b) call = sequence of -byte messages long message or more short messages (c) or more blocks block Figure 5.6
12 More on adaptation functions The next slide shows how adaptation functions can be applied end-to-end or on a hop-by-hop basis The example shows how error controls can be applied using RQ. That is, s or Ns are sent back to sender to report success of block reception. The end-to-end approach is simpler, but takes longer to respond to errors. Hybrids of both approaches are common. Both HDL at data link layer and TP at transport layer do error checking.
13 End-to-end /N Data Data Data Data Hop-by-hop Data Data Data Data / N / N / N / N Figure 5.7
14 5. RQ Protocols utomatic Repeat Request (RQ) can ensure that data is delivered accurately, despite occasional errors at lower layers. Stop and Wait Go-back-N Selective Repeat
15 Basic Elements of RQ Packet sequence Transmitter Information ames Receiver Error-ee packet sequence Station ontrol ames Station B R Information packet Header R Header ontrol ame Information Frame Figure 5.8
16 . Stop-and-wait RQ (a) Frame lost B ame Time-out ame ame ame time (b) lost B ame Time-out ame ame ame time In parts (a) and (b) transmitting station acts the same way, but part (b) receiving station B accepts ame twice. Figure 5.9
17 Possible ambiguities when s are not numbered B time-out ame ame ame ame time Transmitting station misinterprets duplicate s Protocol Failure Mode: () First an is delayed, so that Frame is sent twice, and ed twice. () Then an information ame is lost. The protocol thinks that the extra is for the lost ame and does not detect the lost ame. Figure 5.
18 Solution: number both info ames and s. one-bit field will do for both. S last Timer R next Transmitter S last Receiver Station R next Station B Global State: (S last, R next ) (,) Error-ee ame (,) arrives at receiver for ame arrives at transmitter Error-ee ame (,) arrives at receiver (,) for ame arrives at transmitter Figure 5.
19 Stop-and-wait can be improved by use of additional control ames. Here an enquiry ENQ ame is sent when a timer goes off. B replies by sending last again. (a) Frame lost B ame Time-out ame ENQ ame time (b) for ame lost B ame Time-out ame ENQ ame time Speeds recovery if I-ames are very long. Figure 5.
20 Stop-and-Wait Features completely reliable protocol with one-bit sequence numbers for I-ames and s The timer can be adjusted to tradeoff false alarms with fast response to errors If the propagation delay is large, Stop-and- Wait can be very inefficient, since the systems spends most of its time waiting for an How can we speed this up?
21 Go-back-N improvement of Stop-and-Wait Timeout Go-Back-4: 4 ames are outstanding; so go back time B 3 error Out-of-sequence ames This Go-back-4 system allows pipelining of 4 I-ames. If an error is detected, the sender repeats the last 4 I-ames. It can be nearly 4 times faster, if propagation delay dominates, and error rate is small. Figure 5.3
22 Stop-and-Wait omparison of approaches Time-out expires time B error Go-Back-N 4 ames are outstanding; so go back time B error Out-of-sequence ames Figure 5.4
23 Transmitter Receiver Send Window... Receive Window Frames transmitted and ed Timer S last S recent S last +W s - Buffers S last ames received R next Timer Timer S last +... S recent... S last +W s - The receiver will only accept a ame that is error-ee and that has sequence number R next Figure 5.5
24 M = = 4, Go-Back - 4: Transmitter goes back time B M= =4, Go-Back-3: 3 4 Transmitter goes back 3 Receiver has R next =, but it does not know whether its for ame was received, so it does not know whether this is the old ame or a new ame time B 3 Receiver has R next =3, so it rejects the old ame Figure 5.6
25 B time error Out-of-sequence ames Go-Back-7: N Transmitter goes back to ame Figure 5.7
26 Full Duplex Go-Back-N Sliding Window Protocol Station Transmitter Receiver S recent R next S B recent RB next Station B Receiver Transmitter s are piggybacked in headers Receive Window B Receive Window R next Send Window... R B next B Send Window... S last S last +W s - S B last S B last +WB s - Buffers Buffers Timer S last Timer S B last Timer Timer S last +... S recent... Timer Timer S B last +... S B recent... Timer S last +W s - Timer S B last +WB s - Figure 5.8
27 T out T proc T prop T f T f T prop Figure 5.9
28 Frames transmitted and ed Transmitter Send Window... S last S recent S last +W s - Buffers Receiver Receive Window Frames received R next +W r - R next Buffers Timer Timer Timer S last S last +... S recent... S last +W s - R next + R next +... R next +W r - Figure 5.
29 B time error N Figure 5. Selective Repeat Error Recovery
30 M= =4, Selective Repeat: Send Window = Receive Window = 3 Frame resent time B 3 Receive Window {3,,} Send Window = Receive Window = Frame resent time B ame rejected Receive Window {,3} Figure 5.
31 Delay omponents in Stop-nd-Wait t t proc B t prop ame t f time t proc t ack t prop See Table 5. for Efficiencies, Blackboard for aluulations of Efficiencies When Fraction of P Frames are Received in Error Figure 5.3
32 η Selective Repeat Go-Back-N. Stop & Wait.E- 5.E-.E- 5.E-3.E-3 5.E-4.E-4 5.E-5.E-5 5.E-6.E-6 5.E-7.E-7 p Figure 5.4
33 Now pick optimum ame size η.9.8 Selective Repeat.7.6 Go-Back-N Stop &Wait n f Figure 5.5
34 transmit transmit time on off off on B time T prop Figure 5.6
35 return of permits t cycle time B time Figure 5.7
36 Synchronous source sends periodic information blocks Network output not periodic Network Figure 5.8
37 time arrival times send times playout times Receiver too slow buffer overflow T playout time time Receiver too fast buffer starvation time Receiver speed just right Many late packets T playout time T playout time Figure 5.9
38 Buffer for information blocks t 4 t 3 t t Timestamps + - dd Error signal Smoothing filter djust equency Playout command Recovered clock ounter Figure 5.3
39 Transmitter Receiver f s f Network f f r f n Network clock Figure 5.3
40 pplication byte stream pplication byte stream Segments Transmitter Send buffer Receive buffer Receiver s Intro to TP Reliable Byte Stream. hapter 8 Figure 5.3
41 HDL Example Network Layer NLPDU packet Network Layer DLSDU DLSP DLSP DLSDU Data Link Layer DLPDU ame Data Link Layer Physical Layer Physical Layer Figure 5.3
42 HDL Modes: Unbalanced Point-to-point link Primary ommands Responses Secondary Unbalanced Multipoint link Primary ommands Responses Secondary Secondary Secondary Balanced Point-to-point link between ombined Stations Primary ommands Responses Secondary Secondary Responses ommands Primary Figure 5.33
43 HDL Frame Format Flag ddress ontrol Information FS Flag Flag. Bit stuffing used to avoid in data Only one address field for secondary host 6 or 3 bit R (FS) ontrol Field: Several types. 6 or 3 bits info ame, control ame, unumbered ame Figure 5.35
44 The 3 types of HDL ames Information Frame N(S) N(R) P/F Supervisory Frame S S P/F N(R) Unnumbered Frame M M P/F M M M Figure 5.36
45 SBM U Data transfer DIS U Figure 5.37
46 Primary B, RR,, P B, SREJ,, RR,, P B, SREJ,,P B, I,, 5 X Secondaries B, B, I,, B, I,, B, I,,,F, RR,, F B, I,, B, I, 3, B, I, 4,, F Figure 5.38
47 ombined Station ombined Station B B, I,,, I,, B, I,, B, I,, B, I, 3, B, I, 4, 3 B, I,, 3 B, I,, 4 B, I, 3, 4 X, I,,, I,, B, REJ,, I, 3, B, RR, B, RR, 3 Figure 5.39
48 Flag ddress ontrol Protocol Information flag R ll stations are to accept the ame Unnumbered ame Specifies what kind of packet is contained in the payload, e.g., LP, NP, IP, OSI LNP, IPX Figure 5.4
49 Typical Scenario 7. arrier Dropped Terminate 6. Done 5. Open 4. NP onfiguration Dead failed failed Network. arrier Detected Establish. Options Negotiated uthenticate 3. uthentication ompleted Home P to Internet Service Provider. P calls router via modem.. P and router exchange LP packets to negotiate PPP parameters. 3. heck on identities. 4. NP packets exchanged to configure the network layer, e.g., TP/IP ( requires IP address assignment). 5. Data transport, e.g. send/receive IP packets. 6. NP used to tear down the network layer connection (ee up IP address); LP used to shut down data link layer connection. 7. Modem hangs up. Figure 5.4
50 Input lines Output line B Buffer Header Data payload Figure 5.4
51 (a) Dedicated Lines B B (b) Shared Line B B Figure 5.43
52 (a) Dedicated Lines B B (b) Shared Line B B (c) N(t) Figure 5.44
53 Probability density λe -λt t Figure 5.45
54 Finite buffer multiplexer Normalizedaveragedelay Load Figure 5.46
55 Loss probability Load Figure 5.47
56 9 8 Normalized average delay M/M/ M/D/ Load Figure 5.48
57 verage Delay (seconds) L= L=8 L=4 L= Goodput(bits/second) Figure 5.49
58 Many Voice alls Fewer Trunks Part of this burst is lost Figure 5.5
59 Trunks Speech loss # connections Figure 5.5
60 Many voice terminals generating voice packets 3 B 3 B B 3 Buffer B 3 3 D B D D 3 D D B buffer overflow Figure 5.5
61 Sent Received 3 3 t t Figure 5.53
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PRT I: Peer-to-Peer Protocols Peer-to-Peer Protocols and Service Models RQ Protocols and Reliable Data Transfer Flow Control Timing Recovery TCP Reliable
More informationINF4/MSc Computer Networking. Lectures 3-4 Transport layer protocols TCP/UDP automatic repeat request
INF4/MSc omputer Networking Lectures 3-4 Transport layer protocols TP/UDP automatic repeat request Transport services and protocols provide logical communication between app processes running on different
More informationCSE3213 Computer Network I
SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h. 5. 5.3. and 5.7.) ourse page: http://www.cse.yorku.ca/course/33 Slides modiied om lberto Leon-Garcia and Indra Widjaja
More informationFlow control: Ensuring the source sending frames does not overflow the receiver
Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis
More informationData Link Control Protocols
Data Link Control Protocols need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error control addressing control and data link management Flow Control
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More information3. Data Link Layer 3-2
3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationData Link Control. Claude Rigault ENST Claude Rigault, ENST 11/3/2002. Data Link control 1
Data Link Control Claude Rigault ENST claude.rigault@enst.fr Data Link control Data Link Control Outline General principles of Data Link Control HDLC Data Link control 2 General principles of Data Link
More informationThis Lecture. BUS Computer Facilities Network Management. Line Discipline. Data Link Layer
This Lecture US35 - Computer Facilities Network Management Synchronisation and interfacing insufficient by themselves. Need to provide: Flow control - allow the receiver to regulate the flow of data. Error
More informationCS422 Computer Networks
CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service
More informationPeer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja
Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For
More informationINTERNET ARCHITECTURE & PROTOCOLS
INTERNET ARCHITECTURE & PROTOCOLS Set # 02 Delivered By: Engr Tahir Niazi Need for Data Link Layer possibility of transmission errors receiver need to regulate the rate at which data arrive that's why
More informationChapter 7: Data Link Control. Data Link Control Protocols
Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error
More informationChapter 7: Data Link Control. CS420/520 Axel Krings Page 1
Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More informationData Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.
Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT
More information(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.
Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL
More informationData link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection
2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow
More informationCS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request
S4/MSc omputer Networking Lectures 4-5 Transport layer protocols TP/UDP automatic repeat request omputer Networking, opyright University o Edinburgh 005 Transport services and protocols provide logical
More informationData and Computer Communications
Data and Computer Communications Chapter 7 Data Link Control Protocols Eighth Edition by William Stallings Lecture slides by Lawrie Brown Data Link Control Protocols "Great and enlightened one," said Ten-teh,
More informationET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February
More informationChapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.
hapter 5 Link Layer and LNs omputer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 2009. hapter 5: The Data Link Layer Our goals: understand principles behind data
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each
More informationWilliam Stallings Data and Computer Communications. Chapter 7 Data Link Control
William Stallings Data and Computer Communications Chapter 7 Data Link Control Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time
More informationData Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking
Data Link Layer Bharati Vidyapeeth s Institute of Computer Applications and Management,New Delhi-63 by Vishal Jain U2. 1 Learning Objectives To introduce the design issues of data link layer. To discuss
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Link Layer Fundamentals of Communication Networks Data Link layer o It is the first logical layer in the protocol stack o Functions
More informationData Link Layer (part 2)
Data Link Layer (part 2)! Question - What is a major disadvantage of asynchronous transmission? Reference: Chapters 6 and 7 Stallings Study Guide 6! Question - What is a major disadvantage of asynchronous
More information16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols
16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use
More informationData Link Layer. Indian Institute of Technology Madras
Data Link Layer Study of algorithms for achieving reliable, efficient communication between two adjacent machines at DLL. adjacent - two machines physically connected using a communication channel that
More informationInstitute of Computer Technology - Vienna University of Technology. L02 - Protocol Principles
Protocol Principles Layering, CL versus CO Service, ARQ Techniques, Sequence umbers, Windowing, Flow Control Agenda Introduction 3 Layer Model and Service Types ARQ Techniques Introduction Idle RQ Continuous
More informationAgenda. Protocol Principles
Agenda Protocol Principles Layering, CL vs. CO Protocols, Best-Effort vs. Reliable Services ARQ Techniques, Sequence umbers, Windowing, Bandwidth-Delay Product, Flow Control, HDLC Introduction ARQ Techniques
More informationC08a: Data Link Protocols
CISC 7332X T6 C08a: Data Link Protocols Hui Chen Department of Computer & Information Science CUNY Brooklyn College 10/16/2018 CUNY Brooklyn College 1 Data Link Layer Responsible for delivering frames
More informationHDLC (High level Data Link Control)
High-level Data Link Control HDLC (High level Data Link Control) Modem, EIA-232, HDLC Framing and Procedures Agenda Line Management, Modems Introduction HDLC Station Types, Modes of Operation Frame Format,
More informationLine Protocol Basics. HDLC (High level Data Link Control) Agenda. Additional Issues
Line Protocol Basics High-level Data Link Control HDLC (High level Data Link Control), EIA-232, HDLC Framing and Procedures line protocol basics already explained serial transmission techniques bit-synchronization
More informationData Link layer (CN chap 3.1, 3.4, 3.6)
Data Link layer (CN chap 3.1, 3.4, 3.6) The OSI model an old friend... Application Presentation Session Transport Network Data link Physical F.eks. ftp, mail, http,... handles data structures and conversion
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationInternetworking Models The OSI Reference Model
Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationData Link Layer. Overview. Links. Shivkumar Kalyanaraman
Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain
ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important
More informationTYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.
Data can be corrupted during transmission. Some applications require that errors be detected and corrected. TYPES OF ERRORS There are two types of errors, 1. Single Bit Error The term single-bit error
More informationOther Data Link Protocols: Computer Networks by Prof Kamal K Mehta Associate Professor Dept of Computer Science & Engineering
Other Data Link Protocols: Data Link Protocol ategories A protocol in data communications is the set of rules or specifications used to implement partially a layer or one or more layers of the OSI model.
More informationAutomatic Repeat Request Data Link Layer Traffic Management
Automatic Repeat Request Data Link Layer Traffic Management Reliable Communications with Retransmission How to transport data units over an unreliable data link in a reliable way? End to End E.g.. TCP
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used
More informationES623 Networked Embedded Systems
ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationCS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16
Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error
More informationDATA LINK CONTROL PROTOCOLS
7 CHPTER DT LINK CONTROL PROTOCOLS 7.1 Flow Control 7.2 Error Control 7.3 High-Level Data Link Control (HDLC) 7.4 Recommended Reading 7.5 Key Terms, Review Questions, and Problems ppendix 7 Performance
More informationData Link Control. Outline. DLC functions
Data Link Control #8 1 Outline functions Framing Error and flow control Performance of Example of a standard protocol- >H Open loop flow control 2 Data Link Layer Functions Data Link layer provides a error
More informationInternet Architecture and Protocol
Internet Architecture and Protocol Set# 04 Wide Area Networks Delivered By: Engr Tahir Niazi Wide Area Network Basics Cover large geographical area Network of Networks WANs used to be characterized with
More informationConnectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)
Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames
More informationTCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture
TCP and Congestion Control (Day 1) Yoshifumi Nishida nishida@csl.sony.co.jp Sony Computer Science Labs, Inc 1 Today's Lecture Part1: TCP concept Part2: TCP detailed mechanisms Part3: Tools for TCP 2 1
More informationComputer Networks. Chapter 1 - Fundamentals. CEN 5501C - Computer Networks - Spring UF/CISE - Newman 1
Computer Networks Chapter 1 - Fundamentals CEN 5501C - Computer Networks - Spring 2007 - UF/CISE - Newman 1 Computer Networks Need to share Information Resources Communication vs. Storage Transmission
More informationData Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow
More informationLecture (11) OSI layer 4 protocols TCP/UDP protocols
Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:
More informationCommunication Networks. Part I
Communication Networks Part I Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What are the main uses of computer networks?» What are the common architectures of network applications?»
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data
More informationGoals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks
Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.
More informationWilliam Stallings Data and Computer Communications 7 th Edition. Chapter 10 Circuit Switching and Packet Switching
William Stallings Data and Computer Communications 7 th Edition Chapter 10 Circuit Switching and Packet Switching Switching Networks Long distance transmission is typically done over a network of switched
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationCEG3185 TUT6. Prepared by Zhenxia Zhang Revisited by Jiying Zhao
CEG3185 TUT6 Prepared by Zhenxia Zhang Revisited by Jiying Zhao HDLC High Level Data Link Control (HDLC) is a bit oriented synchronous data link layer protocol developed by the International Organization
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationTransport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)
Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote
More informationOutline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP
Outline Connecting to the access network: DHCP and mobile IP, LTE Transport layer: UDP and TCP IETF TCP/IP protocol suite User application, e.g., http with Mozilla Communication for each process on computer
More informationThe Data Link Layer. Data Link Layer Design Issues
The Data Link Layer Chapter 3 Data Link Layer Design Issues Network layer services Framing Error control Flow control 1 Packets and Frames Relationship between packets and frames. Network Layer Services
More informationCSCD 330 Network Programming Winter 2015
CSCD 330 Network Programming Winter 2015 Lecture 11a Transport Layer Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Chapter 3 Sections
More informationThe data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.
Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept
More informationNetworked Systems and Services, Fall 2018 Chapter 3
Networked Systems and Services, Fall 2018 Chapter 3 Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transport Layer Reliability with TCP Transmission Control Protocol (TCP) RFC 793 + more than hundred other
More informationInternetwork Protocols
Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications
More informationTCP/IP-2. Transmission control protocol:
TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP
More informationLecture 6. TCP services. Internet Transport Layer: introduction to the Transport Control Protocol (TCP) A MUCH more complex transport
Lecture 6. Internet Transport Layer: introduction to the Transport ontrol Protocol (TP) RF 793 (estensioni RF 1122,1323,2018,2581,working group tsvwg) A MUH more complex transport for three main reasons
More informationAugust AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links
Network Working Group Request for Comments: 1504 A. Oppenheimer Apple Computer August 1993 Status of This Memo Appletalk Update-Based Routing Protocol: Enhanced Appletalk Routing This memo provides information
More informationChapter 2 Layer Architecture of Network Protocols. School of Info. Sci. & Eng. Shandong Univ.
Chapter 2 Architecture of Network Protocols School of Info. Sci. & Eng. Shandong Univ. Outline 2.1 Examples of ing 2.2 OSI Reference Model (Continued from last time) 2.3. TCP/IP Architecture 2.4 Berkeley
More informationHDLC. King of the Link 2005/03/11. (C) Herbert Haas
HDLC King of the Link (C) Herbert Haas 2005/03/11 What is HDLC? High-Level Data Link Control Early link layer protocol Based on SDLC (Synchronous-DLC, IBM) Access control on half-duplex modem-lines Connectionoriented
More informationTransport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures.
Transport Protocols! Type A: ISO Defined Types of Network Service: Network connection with acceptable residual error rate and acceptable rate of signaled failures. - Reliable, sequencing network service
More informationAnalyzation of Automatic Repeat Request (ARQ) Protocols
RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More informationData Link Layer, Part 4. Exemplary Protocols
CS 455 Examplary DLL Protocols, Page 1 Data Link Layer, Part 4 Exemplary Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationTelematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments
19531 - Telematics 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 18. November, 2010 Institute
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationCSCI Topics: Internet Programming Fall 2008
CSCI 491-01 Topics: Internet Programming Fall 2008 Transport Layer Derek Leonard Hendrix College October 15, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 3: Roadmap 3.1 Transport-layer
More informationOutline. CS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,
More informationNetworked Systems and Services, Fall 2017 Reliability with TCP
Networked Systems and Services, Fall 2017 Reliability with TCP Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transmission Control Protocol (TCP) RFC 793 + more than hundred other RFCs TCP Loss Recovery
More informationNWEN 243. Networked Applications. Layer 4 TCP and UDP
NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols
More informationLixia Zhang M. I. T. Laboratory for Computer Science December 1985
Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol
More informationThe SpaceWire Transport Protocol. Stuart Mills, Steve Parkes University of Dundee. International SpaceWire Seminar 5 th November 2003
The SpaceWire Transport Protocol Stuart Mills, Steve Parkes University of Dundee International SpaceWire Seminar 5 th November 2003 Introduction Background The Protocol Stack, TCP/IP, SCPS CCSDS and SOIF
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 2 Functions of the Data Link Layer Provide service interface to the
More information