1.6 Error Control Strategies

Size: px
Start display at page:

Download "1.6 Error Control Strategies"

Transcription

1 1.6 Error Control Strategies Introduction ARQ Data Source Encoder Binary Channel Decoder Data Sink {u} {v} {v'} {u'} encoder, decoder, error control; error control strategies: (simple) error detection; error correction: Forward Error Correction (FEC) at receiver only; FEC Automatic Repeat request (ARQ) error detection (receiver) + eroneous block retransmission (transmitter).

2 If the transmission system is an one-way system (the transmission is strictly in one direction, from transmitter to receiver), the error control must be accomplished using forward error correction (FEC), that is, by employing error-correcting codes that automatically correct errors detected at the receiver (ex. satellites and deep-space transmissions). These codes are used even the channel is not strictly one-way. When the transmission system is two-way, the error control can be accomplished using error detection and retransmission, called automatic repeat request (ARQ). In an ARQ system, when errors are detected at the receiver, a request is sent for transmitter to repeat the message. Note: For ARQ the block sequence numbering is needed each block is identified by a unique sequence number.

3 1.6.2 Error Causes and Consequences Types of errors in data communications (OSI layers 2, 3, 4): change in the packet content: extrinsic causes: noise, non-liniarity, crosstalk, etc; intrinsic causes: inter-symbol interferences, phase jitter in the clock; error occurrence: independent errors; burst errors. solution: encoding at transmitter and detection / correction in receiver. Blocks ordering alteration: loss, duplicate, order change; causes: congestion losses; content errors blocks rejection in network nodes; multiple retransmissions duplicates; connectionless (CL) forwarding order change. solution: data block sequence numbering at transmitter + order check in receiver.

4 1.6.3 Codes used in Data Communications Basics, information bits and control bits Parity check codes; longitudinal and transversal word parity; Block codes (n,k); Polynomial codes; Convolutional codes.

5 1.6.4 Data Sequence Numbering and Administration Goals: checking the data integrity at reception; retransmission; reordering the data sequence; resynchronization; flow control. Numbering types for different transmission data units: data blocks numbering LAPD, HDLC-LAPB, etc; byte numbering TCP, etc. Numbering field (in the block) K bits (=constant) finite set of sequence numbers N=2 K distinct sequence numbers modulo N arithmetic; Examples: HDLC: N=8 or 128 K=3 or 7; TCP: N=2 32.

6 1.6.4 Data Sequence Numbering and Administration (contin.) Data sequence administration variables for transmitter and receiver: Convention V = V mod N (finite set of sequence numbers); VA (at transm.) the number of the oldest transmitted and unconfirmed data unit; VS (at transm.) the number of the next data unit to be transmitted; VR (at rec.) the number of the next data unit to be received. Issue: finite set for N possible misinterpretations at receiver in case of retransmissions; Solution: the use of transmission windows, wt and wr: wt = numbers available for transmission without waiting for confirmation; wr = numbers allowed for reception; Necessary condition: wt + wr N, eliminates the misinterpretation at receiver retransmissions (usually, wt = wr = N / 2). in case of multiple

7 1.6.4 Data Sequence Numbering and Administration (contin.) Infinite numbered data sequence TRS Transm+conf. Transm.+unconf. Possible for transm. Not allowed n VA VS VA+N N REC Received+confirmed VR Allowed for reception Not allowed VR+N n N

8 1.6.5 ARQ Strategies In practice, the number of additional bits required to achieve reliable forward error control increases rapidly as the number of information bits increases. Hence, ARQ method is the predominant method used in data communication and networking systems. There are two basic types of ARQ: idle ARQ (or stop and wait ARQ, SW), which is used with character-oriented data transmission schemes wt = 1, wr = 1; continuous ARQ (wt > 1), which employs a retransmission strategy - go-back-n (GBN) wr = 1; retransmission resumed with VR; - selective repeat (SR) wr > 1; reception buffer for reordering. Note: Continuous ARQ is used primarily with bit-oriented transmission schemes.

9 Stop-and-wait ARQ ARQ Strategies (contin.) the transmitter sends a code word to the receiver and waits for a positive (AK) or negative (NAK) acknowledgement from the receiver. If AK is received (nor errors detected) the transmitter sends the next code word. If NAK is received (errors detected), it resends the preceding code word. Continuous ARQ the transmitter sends code words to the receiver continuously and receiver acknowledgements continuously. When a NAK is received, the transmitter begins a retransmission. Depending on the retransmission type there are two strategies: - Go-back-N ARQ: The code word in error and the words that follow it are retransmitted; - Selective-repeat ARQ: the transmitter may simply resend only those code words that are acknowledged negatively.

10 1.6.5 ARQ Strategies (contin.) Stop-and-wait ARQ (SW) T t T t Transmitter (T) I(N) I(N+1) I(N+1) AK(N+1) NAK(N+1) Time Receiver (R) t p t ie t r1 t ce t p t r2 I(N) I(N+1) I(N+1) t p propagation time; t ie information block emission time; t r1 time for information block processing at R station and for reversing the transmission way; t ce confirmation block emission time; t r2 time for confirmation block processing at primary station and for reversing the transmission way; T t total block transmission time; MSC diagrams (Message Sequence Chart)

11 Continuous ARQ ARQ Strategies (contin.) t ie t RTT Transmitter N N+1 N+m AK(N) Time Receiver N t p t ce t p t RTT = 2 t p + t ce ; condition: m t ie t RTT

12 1.6.5 ARQ Strategies (contin.) problem = the loss of AK / NAK acknowledgements (or only AKs are used) solution = using a timer at transmitter to limit the acknowledgement waiting time. The timer is fixed to a value (at least the = round trip time - RTT) and is started when each new block is transmitted (countdown). When the time expires (timer to 0) the last block is retransmitted automatically. Example: SW Timer expired T t T t RTT Transmitter I(N) I(N+1) I(N+1) AK(N+1) Time Receiver I(N) I(N+1)

13 1.6.5 ARQ Strategies (contin.) Exercise ARQ error control example Let s consider: A communication between 2 stations A B, using modulo-16 numbering, error control with AKs and NAKs, the receiver buffer size B r =1. At the moment t 0 the system state is defined by: VS=3 VA=14. At the moment t 0 there is 1 unsent data block. VR=0 Requirements: a. Draw the transmission MSC assuming no errors, pointing out the moments t 0 and t 1, where t 1 is fixed immediately after the transmission of the positive confirmation for the unsent block at moment t 0 ; b. Draw and explain the circular diagram at moments t 0 and t 1 for no errors; c. Draw the MSC at moment t 1 for the case when the last block being transmitted at moment t 0 is lost; d. Draw and explain the circular diagram at moment t 1 for the case when the last block being transmitted at moment t 0 is lost.

14 1.6.5 ARQ Strategies (contin.) Exercise ARQ error control example (contin.) Comments: B r =1 means that the receiver cannot save more than one block (1 buffer location) reordering the data sequence is not possible no selective retransmissions (SREJ) are possible only GBN can be used. For the MSC drawing the blocks being on the way at initial moment have to be identified: VS=3, VR=0 means that I(3) is the next to be sent and I(15) is the last received block, thus the blocks being on the way are I(0), I(1) si I(2). VA=14 means that the transmitter received the confirmation AK(14); VR=0 means that the receiver sent AK(0), thus the confirmations being on the way are AK(0) and AK(15). The MSC is drawn such that the moment t 0 overlaps with the blocks being on the way.

15 Exercise ARQ error control example (contin.) Solution: a. the MSC for the no errors case A N = 16 VS= 3 VA=14 VS= 4 VA=2 VS= 4 VA=4 I(13) I(14) I(15) I(0) I(1) I(2) I(3) t B AK(14) AK(15) AK(0) AK(1) AK(2) AK(3) AK(4) t 0 t 1 VR=0 VR=4 VR=4 t

16 Exercise ARQ error control example (contin.) Solution: b. the circular diagram at moment t 0 for the no errors case Transm. Rec. VA=14 VR= VS= t 0 Note: The arrow inside the transmitter diagram covers the current transmission window size (which is the number of transmitted and unconfirmed data blocks), while the arrow inside the receiver diagram represents the receiver buffer size.

17 Exercise ARQ error control example (contin.) Solution: b. the circular diagram at moment t 1 for the no errors case Transm. Rec. VA= VS= VR=4 t 1

18 Exercise ARQ error control example (contin.) Solution: c. the MSC for the case when the last block being transmitted at moment t 0 is lost N = 16 VS= 3 VA=14 VS= 4 VA=2 VS= 4 VA= 4 A t I(14) I(0) I(2) AK(1) AK(2) NAK(2) I(2) I(3) AK(4) B t t 0 t 1 VR=0 VR=4 VR=4

19 Exercise ARQ error control example (contin.) Solution: d. the circular diagram at moment t 1 for the case when the last block being transmitted at moment t 0 is lost Transm. Rec. VA= VS= VR=4 t 1

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure Computer Networking Reliable Transport Prof. Andrzej Duda duda@imag.fr Reliable Transport Reliable data transfer Data are received ordered and error-free Elements of procedure usually means the set of

More information

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols 16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies ARQ Schemes, March 26 24 ARQ Schemes, March 26 24 2 Outline Classification of error control strategies S-7263 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 24

More information

S Capacity enhancement methods for radio interface ARQ Schemes

S Capacity enhancement methods for radio interface ARQ Schemes ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control

More information

COMPUTER NETWORKS - Window protocols

COMPUTER NETWORKS - Window protocols ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere

More information

COMPUTER NETWORKS - Window protocols

COMPUTER NETWORKS - Window protocols ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Window protocols - 1 Copyright Quest opera è protetta dalla licenza Creative

More information

Flow control: Ensuring the source sending frames does not overflow the receiver

Flow control: Ensuring the source sending frames does not overflow the receiver Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis

More information

DATA LINK LAYER UNIT 7.

DATA LINK LAYER UNIT 7. DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important

More information

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) Data Link Control Contents Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) 2 Flow Control Flow control is a technique for assuring that a transmitting entity

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

Agenda. Protocol Principles

Agenda. Protocol Principles Agenda Protocol Principles Layering, CL vs. CO Protocols, Best-Effort vs. Reliable Services ARQ Techniques, Sequence umbers, Windowing, Bandwidth-Delay Product, Flow Control, HDLC Introduction ARQ Techniques

More information

10.1 REVIEW QUESTIONS

10.1 REVIEW QUESTIONS CHAPTER 10 Data Link Control 10.1 REVIEW QUESTIONS 1. Transmission means to put a signal on a line. Communication is a meaningful and orderly relationship between devices that send and receive data. 3.

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

INF Data Communication Data Link Layer

INF Data Communication Data Link Layer INF3190 - Data Communication Data Link Layer Carsten Griwodz Email: griff@ifi.uio.no most slides from: Ralf Steinmetz, TU Darmstadt and a few from Olav Lysne, J. K. Kurose og K. W. Ross Function, Services

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving

More information

CSE 123: Computer Networks

CSE 123: Computer Networks Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:

More information

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002 EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise

More information

Institute of Computer Technology - Vienna University of Technology. L02 - Protocol Principles

Institute of Computer Technology - Vienna University of Technology. L02 - Protocol Principles Protocol Principles Layering, CL versus CO Service, ARQ Techniques, Sequence umbers, Windowing, Flow Control Agenda Introduction 3 Layer Model and Service Types ARQ Techniques Introduction Idle RQ Continuous

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448 Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted

More information

TCP/IP-2. Transmission control protocol:

TCP/IP-2. Transmission control protocol: TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

Lecture 7: Flow Control"

Lecture 7: Flow Control Lecture 7: Flow Control" CSE 123: Computer Networks Alex C. Snoeren No class Monday! Lecture 7 Overview" Flow control Go-back-N Sliding window 2 Stop-and-Wait Performance" Lousy performance if xmit 1 pkt

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames. Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept

More information

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check. Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced

More information

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Link Layer Fundamentals of Communication Networks Data Link layer o It is the first logical layer in the protocol stack o Functions

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1, CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet

More information

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1. Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL

More information

CPE 548 Exam #1 (50 pts) February 17, 2016

CPE 548 Exam #1 (50 pts) February 17, 2016 Name Class: 548 All answers must have supporting work. Any answer without support will receive no credit 1) (4 pts) Answer the following short answer questions. a) Explain the stop and wait ARQ (automatic

More information

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16 Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error

More information

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of

More information

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1. Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT

More information

SONY S QOS TECHNOLOGY

SONY S QOS TECHNOLOGY SONY S QOS TECHNOLOGY ACHIEVE LOW-DELAY, HIGH-QUALITY STREAMING OVER MOBILE NETWORKS SONY CORPORATION PROFESSIONAL SOLUTION GROUP The use of high-speed mobile networks including LTE (Long Term Evolution)

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For

More information

Lecture 7: Flow & Media Access Control"

Lecture 7: Flow & Media Access Control Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple

More information

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. TYPES OF ERRORS There are two types of errors, 1. Single Bit Error The term single-bit error

More information

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H... 1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:

More information

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

Chapter 6 Digital Data Communications Techniques

Chapter 6 Digital Data Communications Techniques Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit

More information

ELEN Network Fundamentals Lecture 15

ELEN Network Fundamentals Lecture 15 ELEN 4017 Network Fundamentals Lecture 15 Purpose of lecture Chapter 3: Transport Layer Reliable data transfer Developing a reliable protocol Reliability implies: No data is corrupted (flipped bits) Data

More information

ET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code

More information

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple

More information

COM-208: Computer Networks - Homework 3

COM-208: Computer Networks - Homework 3 COM-208: Computer Networks - Homework 3 1 Application Layer 1. (P22) Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of u s = 30 Mbps, and each peer has a download

More information

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

Quality of Service (QoS) Whitepaper

Quality of Service (QoS) Whitepaper Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing

More information

r=0.1 r=0.5 r=1 Figure 2.3: Throughput of ABP vs. PER

r=0.1 r=0.5 r=1 Figure 2.3: Throughput of ABP vs. PER Problem 19 1 0.9 r=0.1 r=0.5 r=1 0.8 Throughput 0.7 0.6 0.5 0.4 0.3 0.2 10 3 10 2 10 1 10 0 PER Figure 2.3: Throughput of ABP vs. PER Figure above shows the throughput of SRP as it varies with the packet

More information

Chapter 3: Transport Layer Part A

Chapter 3: Transport Layer Part A Chapter 3: Transport Layer Part A Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook 3: Transport

More information

Chapter 5 Peer-to-Peer Protocols and Data Link Layer

Chapter 5 Peer-to-Peer Protocols and Data Link Layer Chapter 5 Peer-to-Peer Protocols and Data Link Layer PRT I: Peer-to-Peer Protocols Peer-to-Peer Protocols and Service Models RQ Protocols and Reliable Data Transfer Flow Control Timing Recovery TCP Reliable

More information

Data Link Control Protocols

Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error control addressing control and data link management Flow Control

More information

CS 421: Computer Networks SPRING MIDTERM I April 7, minutes

CS 421: Computer Networks SPRING MIDTERM I April 7, minutes CS 421: Computer Networks SPRING 24 MIDTERM I April 7, 24 12 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 1 msec one-way propagation delay. We want to transfer a file of size 8

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Homework 1 Solutions Total points = 44 Problems 1. Modified HDLC Framing [6 points] Assume we are following the protocol described in the textbook except our modified HDLC frames

More information

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer: Comparison of ISO-OSI and TCP/IP Suit Functions of Data Link Layer: 1. Frame generation ( Character Count, Character Stuffing, Bit Stuffing) 2. Error Processing (Parity(EVEN or ODD), Block Parity, Hamming

More information

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

Solutions for Chapter similar to 1 and 3

Solutions for Chapter similar to 1 and 3 Solutions for Chapter 2 1. 2. similar to 1 and 3 3. 4. In a 5-bit sequence with 32 codes, there are 8 codes that start with 00 and there are 8 codes that ends with 00. Between them 00100 and 00000 are

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat

More information

)454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU

)454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU INTERNATIONAL TELECOMMUNICATION UNION )454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.%47/2+ #/$%).$%0%.$%.4 %22/2#/.42/, 3934%- )454 Recommendation 6 (Extract

More information

Communication Networks

Communication Networks Communication Networks Prof. Laurent Vanbever Exercises week 4 Reliable Transport Reliable versus Unreliable Transport In the lecture, you have learned how a reliable transport protocol can be built on

More information

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture) Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout

More information

COP Operating Systems Design Principles (Spring 2012)

COP Operating Systems Design Principles (Spring 2012) Problem 1: COP 5611 - Operating Systems Design Principles (Spring 2012) Homework 2 1.1.a. Number of paths to reach the global state : Number of paths = Number of ways to reach the global state (sum of

More information

Networking Link Layer

Networking Link Layer Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

Computer Networking : Principles, Protocols and Practice

Computer Networking : Principles, Protocols and Practice Computer Networking : Principles, Protocols and Practice Part 3 : Transport Layer Olivier Bonaventure http://inl.info.ucl.ac.be/ O. Bonaventure 2008 Basics Module 3 : Transport Layer Building a reliable

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW! CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy

More information

TCP: Flow and Error Control

TCP: Flow and Error Control 1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol

More information

Principles of Reliable Data Transfer

Principles of Reliable Data Transfer Principles of Reliable Data Transfer 1 Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver amid network errors, i.e., corrupted/lost packets

More information

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen CRISTAL Laboratory, Tunisia Email: Raja.Abdelmoumen@ensi.rnu.tn Chadi Barakat Projet Planète, INRIA-Sophia

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1 Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter

More information

CS/ECpE 5516, Spring 1998, Midterm Exam 75 minutes, 120 points Prof. Abrams

CS/ECpE 5516, Spring 1998, Midterm Exam 75 minutes, 120 points Prof. Abrams CS/ECpE 5516, Spring 1998, Midterm Exam 75 minutes, 120 points Prof. Abrams Write your answers on your own paper; a stapler and scrap paper are available at the front of the room. Arrange the answer pages

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

CHANNEL CODING 1. Introduction

CHANNEL CODING 1. Introduction CHANNEL CODING 1. Introduction The fundamental resources at the disposal of a communications engineer are signal power, time and bandwidth. For a given communications environment, these three resources

More information

The GBN sender must respond to three types of events:

The GBN sender must respond to three types of events: Go-Back-N (GBN) In a Go-Back-N (GBN) protocol, the sender is allowed to transmit several packets (when available) without waiting for an acknowledgment, but is constrained to have no more than some maximum

More information

The flow of data must not be allowed to overwhelm the receiver

The flow of data must not be allowed to overwhelm the receiver Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Data Link Layer (part 2)

Data Link Layer (part 2) Data Link Layer (part 2)! Question - What is a major disadvantage of asynchronous transmission? Reference: Chapters 6 and 7 Stallings Study Guide 6! Question - What is a major disadvantage of asynchronous

More information

The Transport Layer Reliability

The Transport Layer Reliability The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication

More information

Data Link Layer (1) Networked Systems 3 Lecture 6

Data Link Layer (1) Networked Systems 3 Lecture 6 Data Link Layer (1) Networked Systems 3 Lecture 6 Purpose of Data Link Layer Arbitrate access to the physical layer Structure and frame the raw bits Provide flow control Detect and correct bit errors Perform

More information

Exercises TCP/IP Networking With Solutions

Exercises TCP/IP Networking With Solutions Exercises TCP/IP Networking With Solutions Jean-Yves Le Boudec Fall 2009 3 Module 3: Congestion Control Exercise 3.2 1. Assume that a TCP sender, called S, does not implement fast retransmit, but does

More information

ECE697AA Lecture 3. Today s lecture

ECE697AA Lecture 3. Today s lecture ECE697AA Lecture 3 Transport Layer: TCP and UDP Tilman Wolf Department of Electrical and Computer Engineering 09/09/08 Today s lecture Transport layer User datagram protocol (UDP) Reliable data transfer

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each

More information