Telematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments
|
|
- Phebe Berry
- 5 years ago
- Views:
Transcription
1 Telematics 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Matthias Wa hlisch Department of Mathematics and Computer Science Institute of Computer Science 19. November, 2009 Institute of Computer Science Telematics Tutorial 19. November,
2 Outline 1. LLC vs. MAC 2. Transmission with HDLC 3. Flow Control 4. Sliding Window 5. Sliding Window Mechanism 6. Transmission Capacity 7. The End to End Argument Institute of Computer Science Telematics Tutorial 19. November,
3 LLC vs. MAC Explain the difference between LLC and MAC. Background Problem Statement: Several data link layer protocols exist Data link layer provides different services to the network layer Consistent primitives to the network layer are desired Institute of Computer Science Telematics Tutorial 19. November,
4 Solution LLC vs. MAC (IEEE) Data link layer consists of two sublayers: LLC Logical Link Control MAC Media Access Control LLC Hides differences between various kinds of 802 networks Single format and interface to the network layer Manages error-control and flow-control LLC header and packet are payload of MAC frame, which is transmitted MAC Implements different transmission technologies Handles multi-access on medium Decoupling: frame transmission and error/flow-control Institute of Computer Science Telematics Tutorial 19. November,
5 Transmission with HDLC The High Level Data Link Protocol (HDLC) is a protocol of the Data Link Layer (DLL). One of its purposes is to protect the data communication of two adjacent hosts (A and B). Transmission errors are detected by checksums. Institute of Computer Science Telematics Tutorial 19. November,
6 Transmission with HDLC Consider the bit sequence This sequence is to be transmitted including its CRC checksum. Compute the checksum by using the following generator polynomial instead of CCITT CRC-16: G(x) = x 4 + x + 1 Institute of Computer Science Telematics Tutorial 19. November,
7 HDLC Solution : <- remainder Institute of Computer Science Telematics Tutorial 19. November,
8 Transmission with HDLC Create/sketch the HDLC frame that is used to transfer the data from host A to B. Assume that the sequence number counters have been initialized with the value of zero. The frame shall be used to signal host B that the first two frames were received successfully. The address of host B is The P/F bit shall be ignored and set to 0. Instead of the normal 16 bit HDLC checksum, the 4 bit checksum computed in part 1 shall be used. Institute of Computer Science Telematics Tutorial 19. November,
9 HDLC Solution Flag Addr Control Data CRC Flag Type: 0 (Information) Sequence No.: 011 = 3 P/F: 0 (ignored) Next: 010 = HDLC frame Institute of Computer Science Telematics Tutorial 19. November,
10 Transmission with HDLC The frame created in part 2 is now passed to the physical layer. Draw/sketch the data part of the HDLC frame using: 1. the Manchester Code 2. the Differential NRZ Code Institute of Computer Science Telematics Tutorial 19. November,
11 HDLC Solution Payload of the HDLC frame on the physical layer: Differential NRZ Manchester Institute of Computer Science Telematics Tutorial 19. November,
12 Flow Control You know the maximum processing and transmission time between sender and receiver. Choose and discuss a simple, adaptive flow control mechanism. Institute of Computer Science Telematics Tutorial 19. November,
13 Flow Control You know the maximum processing and transmission time between sender and receiver. Choose and discuss a simple, adaptive flow control mechanism. Stop-and-Wait protocol... is partially adaptive (e.g. RTT) Long idle times in the case of long link delays & short processing time No parallelization: Sender has to wait for an ACK before sending next frame Think about parallelization between sender and receiver... Institute of Computer Science Telematics Tutorial 19. November,
14 Solution Flow Control Sliding Window Allows continuous data transmission without waiting on each ACK Bound by window size Buffer required, volume depends on window size Problem: How to handle correct frames in case of errors (within window)? Receiving data link layer is obligated to hand packets to the network layer in sequence! Institute of Computer Science Telematics Tutorial 19. November,
15 Solution Flow Control Sliding Window Allows continuous data transmission without waiting on each ACK Bound by window size Buffer required, volume depends on window size Problem: How to handle correct frames in case of errors (within window)? Receiving data link layer is obligated to hand packets to the network layer in sequence! Go-back-N Implements a receive window of size 1 Disadvantage: Sender must repeat all frames starting from invalid frame Institute of Computer Science Telematics Tutorial 19. November,
16 Solution Flow Control Sliding Window Allows continuous data transmission without waiting on each ACK Bound by window size Buffer required, volume depends on window size Problem: How to handle correct frames in case of errors (within window)? Receiving data link layer is obligated to hand packets to the network layer in sequence! Go-back-N Implements a receive window of size 1 Disadvantage: Sender must repeat all frames starting from invalid frame Selective Repeat Buffer correctly received frames: increased buffer size at listeners Sender retransmits only selective packets Institute of Computer Science Telematics Tutorial 19. November,
17 Sliding Window Why do we need preferably a full-duplex connection for sliding window protocols? Institute of Computer Science Telematics Tutorial 19. November,
18 Solution Sliding Window Without a full-duplex connection, there is only limited parallelization. Remember, parallelization was a motivation for designing sliding window protocols. Institute of Computer Science Telematics Tutorial 19. November,
19 Sliding Window Mechanism HDLC uses the sliding window mechanism for flow control. Each frame contains a sequence number N(S) as well as an acknowledgement number N(R). The acknowledgement number acknowledges all frames up to R 1. Thus, frame R is expected to be received as next. To avoid an overflow of the counter, the value is calulated modulo M. Institute of Computer Science Telematics Tutorial 19. November,
20 Sliding Window Mechanism How many frames is a sender allowed to send without getting an acknowledgement? Institute of Computer Science Telematics Tutorial 19. November,
21 Sliding Window Solution The maximum window size is M 1. With a window size of M the following two situations could not be distinguished by host A for W = M = 4: A 0 B A 0 B ACK ACK Timeout 0 ACK 1 ACK 1 0 Institute of Computer Science Telematics Tutorial 19. November,
22 Sliding Window Mechanism Consider an example with M = 8 and window size W = 7. The frames with N(S) = 5, 6, 7, 0, 1 have been sent. No acknowledgement has been received yet. List the remaining sequence numbers that may be used by the sender. Institute of Computer Science Telematics Tutorial 19. November,
23 Sliding Window Solution The frames with sequence numbers 2 and 3 can be sent without getting an acknowledgement: M 1 = 7 5 frames have been sent last used sequence number + {1,2} Institute of Computer Science Telematics Tutorial 19. November,
24 Sliding Window Mechanism How does the situation in part 2 change if a frame with the following acknowledgement number is received: 1. N(R) = 2 2. N(R) = 6 3. N(R) = 5 List the acknowledged sequence numbers and the window of remaining sequence numbers. Institute of Computer Science Telematics Tutorial 19. November,
25 Sliding Window Solution N(R) = 2 acknowledged: 5, 6, 7, 0, 1 window: 2, 3, 4, 5, 6, 7, Institute of Computer Science Telematics Tutorial 19. November,
26 Sliding Window Solution N(R) = 6 acknowledged: 5 window: 2, 3, Institute of Computer Science Telematics Tutorial 19. November,
27 Sliding Window Solution N(R) = 5 acknowledged: 4 window: 2, If a frame with sequence number 4 has been sent, the ACK=5 acknowledges this frame. The window doesn t change because sequence number 4 cannot be used. Alternatively, an error could have happened: The frame with sequence number 5 was lost or corrupted. The frame has to be retransmitted. Institute of Computer Science Telematics Tutorial 19. November,
28 Transmission Capacity Consider a host-to-network technology with a sliding window mechanism and a window size of W = 7. The frames are up to 1,500 bytes long and the round trip time is given with 50 ms. Calculate the maximum data rate that can be achieved with these parameters when sending frames from host A to B. Institute of Computer Science Telematics Tutorial 19. November,
29 Transmission Capacity Solution A host can send 7 1, 500 = 10, 500 bytes without getting an acknowledgement. Institute of Computer Science Telematics Tutorial 19. November,
30 Transmission Capacity Solution A host can send 7 1, 500 = 10, 500 bytes without getting an acknowledgement. Let us assume that the sending and receiving of frames can be done in zero-time. Institute of Computer Science Telematics Tutorial 19. November,
31 Transmission Capacity Solution A host can send 7 1, 500 = 10, 500 bytes without getting an acknowledgement. Let us assume that the sending and receiving of frames can be done in zero-time. Thus, a frame that is received by host B at time 25 ms will be acknowledged 25 ms later. Institute of Computer Science Telematics Tutorial 19. November,
32 Transmission Capacity Solution A host can send 7 1, 500 = 10, 500 bytes without getting an acknowledgement. Let us assume that the sending and receiving of frames can be done in zero-time. Thus, a frame that is received by host B at time 25 ms will be acknowledged 25 ms later. Host A receives the acknowledgement at time 50 ms; RTT=50 ms Institute of Computer Science Telematics Tutorial 19. November,
33 Transmission Capacity Solution A host can send 7 1, 500 = 10, 500 bytes without getting an acknowledgement. Let us assume that the sending and receiving of frames can be done in zero-time. Thus, a frame that is received by host B at time 25 ms will be acknowledged 25 ms later. Host A receives the acknowledgement at time 50 ms; RTT=50 ms The window is shifted and the next frame can be sent. Institute of Computer Science Telematics Tutorial 19. November,
34 Transmission Capacity Solution A host can send 7 1, 500 = 10, 500 bytes without getting an acknowledgement. Let us assume that the sending and receiving of frames can be done in zero-time. Thus, a frame that is received by host B at time 25 ms will be acknowledged 25 ms later. Host A receives the acknowledgement at time 50 ms; RTT=50 ms The window is shifted and the next frame can be sent. Ignoring the processing times, 10,500 byte can be sent in 50 ms. Institute of Computer Science Telematics Tutorial 19. November,
35 Transmission Capacity Solution A host can send 7 1, 500 = 10, 500 bytes without getting an acknowledgement. Let us assume that the sending and receiving of frames can be done in zero-time. Thus, a frame that is received by host B at time 25 ms will be acknowledged 25 ms later. Host A receives the acknowledgement at time 50 ms; RTT=50 ms The window is shifted and the next frame can be sent. Ignoring the processing times, 10,500 byte can be sent in 50 ms. In 1 s host A can receive 20 acknowledgements. Institute of Computer Science Telematics Tutorial 19. November,
36 Transmission Capacity Solution A host can send 7 1, 500 = 10, 500 bytes without getting an acknowledgement. Let us assume that the sending and receiving of frames can be done in zero-time. Thus, a frame that is received by host B at time 25 ms will be acknowledged 25 ms later. Host A receives the acknowledgement at time 50 ms; RTT=50 ms The window is shifted and the next frame can be sent. Ignoring the processing times, 10,500 byte can be sent in 50 ms. In 1 s host A can receive 20 acknowledgements. Thus, 20 10, 500 byte can be sent 210, 000 byte/s 1.6 Mbps. Institute of Computer Science Telematics Tutorial 19. November,
37 Transmission Capacity Solution Of course, in reality you have to consider the processing times of both hosts. To sent a frame of 1,500 byte = 12,000 bit with Fast Ethernet (100 MBit/s) about 120µs are required to set the frame on the wire. The first frame is received by host B after 25.12ms. The ACK is sent immediately. ACK frames without data are less than 100 bit long. About 1µs is required to sent the frame. Thus, after ms host A can move the window by one position and sent the next frame. Institute of Computer Science Telematics Tutorial 19. November,
38 The End to End Argument Please explain the ideas of the end to end arguments. Are the arguments only valid for networking systems? Read the article End To End Arguments in System Design by Saltzer et al., Institute of Computer Science Telematics Tutorial 19. November,
39 Solution End to End Argument Motivation: Context: Protocol design Distributed system with different layers Functions that might be implemented in any of several ways Key question: Where to place which function? End to End (E2) Argument: Implementing these functions at low level may be redundant or provides little usefulness Functions in question should be implemented at the endpoints of the communication system Discussion: E2E-Argument does not tell at which layer to place the functions Consider a trade-off between costs and performance Institute of Computer Science Telematics Tutorial 19. November,
40 The Last Slide TM Thank you for your attention. Questions? Institute of Computer Science Telematics Tutorial 19. November,
Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments
19531 - Telematics 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 18. November, 2010 Institute
More informationData Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow
More informationOverview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer
Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology
More informationComputer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1
Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter
More information3. Data Link Layer 3-2
3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link
More informationCS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16
Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control
More informationError Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.
Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced
More informationCSE 123: Computer Networks
Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:
More information(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.
Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL
More informationLecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission
1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission
More informationPoint-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1
Point-to-Point Links Outline Encoding Framing Error Detection Sliding Window Algorithm Fall 2004 CS 691 1 Encoding Signals propagate over a physical medium modulate electromagnetic waves e.g., vary voltage
More informationFlow control: Ensuring the source sending frames does not overflow the receiver
Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis
More informationCPE 548 Exam #1 (50 pts) February 17, 2016
Name Class: 548 All answers must have supporting work. Any answer without support will receive no credit 1) (4 pts) Answer the following short answer questions. a) Explain the stop and wait ARQ (automatic
More informationData link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection
2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow
More informationLecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn
Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More informationSRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of
More informationIslamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.
Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 2 Getting Connected Eng. Haneen El-Masry March, 2014 2.2 ENCODING Encoding the
More informationData Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.
Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT
More informationCS422 Computer Networks
CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:
More informationInst: Chris Davison
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of
More informationHousekeeping. Fall /5 CptS/EE 555 1
Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section
More informationCSE 461: Framing, Error Detection and Correction
CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages
More informationData Link Control. Claude Rigault ENST Claude Rigault, ENST 11/3/2002. Data Link control 1
Data Link Control Claude Rigault ENST claude.rigault@enst.fr Data Link control Data Link Control Outline General principles of Data Link Control HDLC Data Link control 2 General principles of Data Link
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationfile:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...
1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:
More informationNetworking Link Layer
Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding
More informationProtocol Principles. Framing, FCS and ARQ 2005/03/11. (C) Herbert Haas
Protocol Principles Framing, FCS and ARQ (C) Herbert Haas 2005/03/11 Link Layer Tasks Framing Frame Protection Optional Addressing Optional Error Recovery Connection-oriented or connectionless mode Optional
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More informationCSCI-1680 Link Layer Reliability John Jannotti
CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today
More informationIntroduction to Computer Networks. 03 Data Link Layer Introduction
Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple
More informationCSCI-1680 Link Layer Reliability Rodrigo Fonseca
CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting
More information16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols
16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationOutline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.
EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error
More informationCOMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?
Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability
More informationData Link Layer, Part 4. Exemplary Protocols
CS 455 Examplary DLL Protocols, Page 1 Data Link Layer, Part 4 Exemplary Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationEE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002
EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationData Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination
Data Link Protocols Data Link Services Connection-less services Functions of a Data Link Protocol Framing PDUs ing Destination Error Detection / Error Recovery Link Management Ethernet (covered elsewhere)
More informationWilliam Stallings Data and Computer Communications. Chapter 7 Data Link Control
William Stallings Data and Computer Communications Chapter 7 Data Link Control Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time
More informationPhysical and Data Link layers
Physical and Data Link layers Youki Kadobayashi Graduate School of Science Nara Institute of Science and Technology Physical Layer All rights reserved. 2 Types of transmission medium! Cables Optical fiber
More informationFaculty of Science Final Examination. Computer Science B Basics of Computer Networks
Student Name: Student Number: Faculty of Science Final Examination Computer Science 308-435B Basics of Computer Networks Examiner: Prof. Hans Vangheluwe Friday, April 27 th, 2001 Associate Examiner: Prof.
More informationCRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors
CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length
More informationData Link Layer. Overview. Links. Shivkumar Kalyanaraman
Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction
More informationDLL: Flow Control DLL. Simplex. Fast sender / slow receiver scenario. Various protocols used. Simplified examples implemented in C.
DLL: Flow Control Fast sender / slow receiver scenario Feedback mechanism reqd. Various protocols used Stop and Wait Sliding window protocols Hugh Melvin, Dept. of IT, NUI,G 1 DLL Simplified examples implemented
More informationTransport Layer Marcos Vieira
Transport Layer 2014 Marcos Vieira Transport Layer Transport protocols sit on top of network layer and provide Application-level multiplexing ( ports ) Error detection, reliability, etc. UDP User Datagram
More informationLecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1
Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationDirect Link Networks (II)
Direct Link Networks (II) Computer Networking Lecture 03 HKU SPACE Community College January 30, 2012 HKU SPACE CC CN Lecture 03 1/25 Outline Reliable Link Service Stop-and-Wait Sliding Window Media Access
More informationOverview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.
Overview Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.3 Performance Metrics Bandwidth Amount of data that can
More information2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not
CS475 Networks Lecture 5 Chapter 2: Direct Link Networks Assignments Reading for Lecture 6: Sections 2.6 2.8 Homework 2: 2.1, 2.4, 2.6, 2.14, 2.18, 2.31, 2.35. Due Thursday, Sept. 15 2.4 Error Detection
More informationLecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of
More informationSession Exam 1. EG/ES 3567 Worked Solutions. (revised)
Session 003-00 Exam 1 EG/ES 3567 Worked Solutions. (revised) Please note that both exams have identical solutions, however the level of detail expected in ES is less, and the questions are phrased to provide
More informationTYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.
Data can be corrupted during transmission. Some applications require that errors be detected and corrected. TYPES OF ERRORS There are two types of errors, 1. Single Bit Error The term single-bit error
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationThe Link Layer II: Ethernet
Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:
More informationChapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control
Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside
More informationHigh Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection
High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationMobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods
Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where
More informationCS519: Computer Networks. Lecture 5, Part 1: Mar 3, 2004 Transport: UDP/TCP demux and flow control / sequencing
: Computer Networks Lecture 5, Part 1: Mar 3, 2004 Transport: UDP/TCP demux and flow control / sequencing Recall our protocol layers... ... and our protocol graph IP gets the packet to the host Really
More informationComputer Network (2012 Spring) Homework Answer. Chapter2
Computer Network (2012 Spring) Homework Answer Chapter2 Question 6 Suppose the following sequence of bits arrives over a link: 1101011111010111110010111110110 Show the resulting frame after any stuffed
More informationToday. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?
Embedded networks Characteristics Requirements Simple embedded LANs Bit banged SPI I2C LIN Ethernet Last Time CAN Bus Intro Low-level stuff Frame types Arbitration Filtering Higher-level protocols Today
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!
CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy
More informationOSI Reference Model. Application Layer. Presentation Layer. Session Layer. Chapter 4: Application Protocols. Transport Layer.
Chapter 2: Computer Networks 2.1: Physical Layer: representation of digital signals 2.2: Data Link Layer: error protection and access control 2.3: Network infrastructure 2.4 2.5: Local Area Network examples
More informationChapter 5 Data-Link Layer: Wired Networks
Sungkyunkwan University Chapter 5 Data-Link Layer: Wired Networks Prepared by Syed M. Raza and H. Choo 2018-Fall Computer Networks Copyright 2000-2018 Networking Laboratory Chapter 5 Outline 5.1 Introduction
More informationCourse Introduction. Purpose. Objectives. Content. Learning Time
Course Introduction Purpose This training course provides an overview of Message Frames and hardware issues of the Controller Area Network (CAN) technology used to build networked, multiprocessor embedded
More informationProblem 7. Problem 8. Problem 9
Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationPage 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11
Goals for Today" CS162 Operating Systems and Systems Programming Lecture 11 Reliability, Transport Protocols" Finish e2e argument & fate sharing Transport: TCP/UDP Reliability Flow control October 5, 2011
More informationTCP and Congestion Control (Day 1) Yoshifumi Nishida Sony Computer Science Labs, Inc. Today's Lecture
TCP and Congestion Control (Day 1) Yoshifumi Nishida nishida@csl.sony.co.jp Sony Computer Science Labs, Inc 1 Today's Lecture Part1: TCP concept Part2: TCP detailed mechanisms Part3: Tools for TCP 2 1
More informationThe Transmission Control Protocol (TCP)
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals
More informationCSE123A discussion session
CSE23A discussion session 27/2/9 Ryo Sugihara Review Data Link Layer (3): Error detection sublayer CRC Polynomial representation Implementation using LFSR Data Link Layer (4): Error recovery sublayer Protocol
More informationLecture 7: Flow Control"
Lecture 7: Flow Control" CSE 123: Computer Networks Alex C. Snoeren No class Monday! Lecture 7 Overview" Flow control Go-back-N Sliding window 2 Stop-and-Wait Performance" Lousy performance if xmit 1 pkt
More informationTelecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)
Data Link Control Contents Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) 2 Flow Control Flow control is a technique for assuring that a transmitting entity
More informationYour favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY
VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th
More informationDirect Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems
Areas for Discussion Direct Link s Joseph Spring School of Computer Science 3COM0088 Computer Protocols & Architecture s Based on Chapter 2, Peterson & Davie, Computer s: A Systems Approach, 3 rd Ed Problems
More informationSequence Number. Acknowledgment Number. Data
CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 14: TCP Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern
More informationCS 43: Computer Networks. 16: Reliable Data Transfer October 8, 2018
CS 43: Computer Networks 16: Reliable Data Transfer October 8, 2018 Reading Quiz Lecture 16 - Slide 2 Last class We are at the transport-layer protocol! provide services to the application layer interact
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationJaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles
Jaringan Komputer The Data Link Layer Data Link Layer Study the design principles Algorithms for achieving reliable, efficient communication between two adjacent machines at the data link layer Adjacent
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You
More informationSolutions for Chapter similar to 1 and 3
Solutions for Chapter 2 1. 2. similar to 1 and 3 3. 4. In a 5-bit sequence with 32 codes, there are 8 codes that start with 00 and there are 8 codes that ends with 00. Between them 00100 and 00000 are
More informationReliable Transmission
Reliable Transmission How to fix corrupted frames. Error correcting codes too expensive Should discard frames (retransmission) Recover from Corrupt s should be done in the Link Level Data Link Networks
More informationLecture 11 Overview. Last Lecture. This Lecture. Next Lecture. Medium Access Control. Flow and error control Source: Sections , 23.
Last Lecture Lecture 11 Overview Medium Access Control This Lecture Flow and error control Source: Sections 11.1-11.2, 23.2 Next Lecture Local Area Networks 1 Source: Sections 13 Data link layer Logical
More informationChapter 7: Data Link Control. Data Link Control Protocols
Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error
More information