DATA LINK LAYER UNIT 7.
|
|
- Mark Lane
- 5 years ago
- Views:
Transcription
1 DATA LINK LAYER UNIT 7 1
2 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission errors (ERROR CONTROL). 4. Regulating the flow of frames slow receivers are not swamped by fast senders (FLOW CONTROL). 2
3 1. Service provided to network layer: Unacknowledged connectionless service Acknowledged connectionless service Acknowledged connection oriented service 3
4 2. Framing: Break bit stream into frames. Check if frames arrived correctly. If not: Discards frame. In some cases also request retransmission. 4
5 Framing Methods: 1 Character count 2 Starting and ending characters, with character stuffing 3 Starting and ending flags, with bit stuffing 5
6 Character Counting If the frame slips resynchronization is a problem This method uses a field in the header to specify the number of character in the frame. 6
7 Starting and Ending Character Character stuffing Closely tied to 8-bit (ASCII) character Each frame start with character sequence DLE STX and end with DLE ETX Character stuffing is used when binary data,object program or floating point numbers are being transmitted. Where DLE : Data Link Escape STX: starting text 7 ETX : Ending Text
8 Starting and Ending flag Flag pattern : I0 Each frame begin and end with pattern After 5 consecutive 1 bits, stuff 0 bit in between At receiver end destuffs these 0 bit and get original 8 data
9 3. Error Control Duties of data link layer: deliver the frames in order without any error; how? Reliable delivery -Timers. -Retransmission. -Duplicate detection. Detecting errors. Detecting & Correcting errors. 4. Flow Control How to cope with fast sender and slow receiver? When the connection is established, receiver has to give feedback; grant permission to send data as e.g.: Receiver may say send n frames only to the sender. 9
10 Note Data can be corrupted during transmission. Some applications require that errors can be detected and corrected. 10
11 Error Detection and Correction Types of Errors Detection Correction
12 12
13 Single-bit error In a single-bit error, only 1 bit in the data unit has changed. 13
14 Multiple-bit error 14
15 Burst error A burst error means that 2 or more bits in the data unit have changed. 15
16 Redundancy To detect or correct errors, we need to send extra (redundant) bits with data. 16
17 Detection Methods VRC(Vertical Redundancy Check) LRC(Longitudinal Redundancy) CRC(Cyclic redundancy Check) Checksum 17
18 VRC(Vertical Redundancy Check) A parity bit is added to every data unit so that the total number of 1s(including the parity bit) becomes even for evenparity check or odd for odd-parity check. VRC can detect all single-bit errors. It can also detect multiple-bit or burst errors only if the total number of errors are odd. 18
19 Even parity VRC concept If total number of 1 bits are even than drop the parity bit and accept the data otherwise reject the data. 19
20 Example : Suppose a sender send a word world. Its ASCII value is : w o (119) (111) r (114) l (108) d (100) Forward it as even parity : Receiver received it and count the occurrence of 1 s as (6,6,4,4,4) If data is corrupted : Receiver received it and count the occurrence of 1 s as (7,6,5,4,4) Then it will discard and ask for retransmission. 20
21 LRC(Longitudinal Redundancy Check) Parity bits of all the positions are assembled into a new data unit, which is added to the end of the data block 21
22 LRC 22
23 Two Dimensional Parity Check In 2D Parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block. 23
24 Example: Calculate LRC and VRC for following bit pattern using even parity: Solution: VRC : Using Even Parity: VRC : 0010 LRC : So, exam data unit sent by the sender. 24
25 Calculate the VRC and LRC for the following bit pattern using even parity:? Solution: VRC : Using Even Parity: VRC : 1000 LRC : So, exam data unit sent by the sender. 25
26 CRC(Cyclic Redundancy Check) ~ is based on binary division. Most powerful technique among all 26
27 Rules of CRC Use ExOR for adding two bits : = 0 0 = 0 1 =1 0 =1 27
28 CRC generator ~ uses modular-2 division. Binary Division in a CRC Generator 28
29 Binary Division in a CRC Checker 29
30 Question 1. Frame Generator Ans - Remainder
31 Question 2. Frame Generator If the last bit of data is inverted during transmission as 0 to 1, Is this error detected at the receiver end? Ans - Remainder R
32 Polynomials CRC generator(divisor) is most often represented not as a string of 1s and 0s, but as an algebraic polynomial. The polynomial should have following properties: It should not be divisible by X It should be divisible by X+1. 32
33 A polynomial representing a divisor 33
34 International Standard polynomials 34
35 Example : A bit stream is transmitted using the standard CRC method described in the text. The generator polynomial is x Show the actual bit string transmitted. Suppose the third bit from the left is inverted during transmission. Show that this error is detected at the receiver's end. ANS: The frame is The generator is The message after appending three zeros is The remainder on dividing by 1001 is 100. So, the actual bit string transmitted is (Frame +Reminder) The received bit stream with an error in the third bit from the left is Dividing this by 1001 produces a remainder 100, which is different from zero. Thus, the receiver detects the error and can ask for a retransmission. 35
36 Exercise What is the remainder obtained by dividing x^7 + x^5 + 1 by the generator polynomial x^3 + 1? Ans:
37 Checksum ~ It is also based on the concept of redundancy(vrc, LRC, CRC, checksum.) 37
38 Checksum Generator n bits All 0 s 38
39 The sender follows these steps: The unit is divided into K sections, each of n bits. All sections are added using ones complement to get the sum. The sum is complemented and becomes the checksum. The checksum is sent with the data. The receiver follows these steps: The unit is divided into k sections, each of n bits. All sections are added using one s complement to get the sum with checksum bits. The sum is complemented. If the result is zero, the data are accepted: 39 otherwise, rejected
40 Data unit and Checksum 40
41 Example : ( at a sender) Original data : Sum Checksum
42 ( at a receiver) Received data : Sum Complement 42
43 Now suppose there are burst error that affects 4 bits so the receiving data Received data : carry Sum Complement 43
44 Example Calculate the checksum of two data by adding & using 1 s complement and verify it from sender side. 44
45 Error Correction ~ can be handled in two ways: sender retransmit the entire data unit. use an error-correcting code by receiver Single-Bit Error Correction parity bit The task of error correction is to locate the invalid bit or bits 45
46 Hamming Code ~ developed by R.W.Hamming Positions of redundancy bits Hamming code in 46
47 m is total number of bits in data and r is required redundancy bit. So, the total number of bits in a transmittable unit is m+r, Relationship between data and redundancy bits r 2 m+r+1 ex) For value of m is 7, the smallest r value that can satisfy this equation is >12 47
48 Each r bit is the VRC bit for one combination of data bits r1 r2 r4 r8 = = = = bits 1, 3, 5, 7, 9, 11 bits 2, 3, 6, 7, 10, 11 bits 4, 5, 6, 7 bits 8, 9, 10, 11 Position r1: check 1 bit, skip 1 bit, check 1 bit, skip 1 bit, etc. (1,3,5,7,9,11,13,15,...) Position r2: check 2 bits, skip 2 bits, check 2 bits, skip 2 bits, etc. (2,3,6,7,10,11,14,15,...) Position r4: check 4 bits, skip 4 bits, check 4 bits, skip 4 bits, etc. (4,5,6,7,12,13,14,15,20,21,22,23,...) Position r8: check 8 bits, skip 8 bits, check 8 bits, skip 8 bits, etc. (815,24-31,40-47,...) Position r16: check 16 bits, skip 16 bits, check 16 bits, skip 16 bits, etc. (16-31,48-63,80-95,...) Position r32: check 32 bits, skip 32 bits, check 32 bits, skip 32 bits, etc. (32-63,96-127, ,...) 48
49 Hamming Code 49
50 Hamming Code 50
51 Hamming Code 51
52 Example of Hamming Code 52
53 Single-bit error 53
54 Error Detection 54
55 Practice Question: Construct Hamming code for Construct the Hamming code for the bit sequence Sixteen-bit messages are transmitted using a Hamming code. How many check bits are needed to ensure that the receiver can detect and correct single bit errors? Show the bit pattern transmitted for the message Assume that even parity is used in the Hamming code. If there is an error at the 9th bit from the left at the receiver side then check whether at the receiver side it is identified or not. Receiver receive the code When it uses the Hamming encoding algorithm, the result is 0101.Which bit is in error? What is the correct code. 55
56 Flow Control Flow control is a set of procedures that tells the sender how much data it can transmit before it must wait for an acknowledgement from the receiver. Since the rate of processing is often slower than the rate of transmission, receiver has a block of memory (buffer) for storing incoming data until they are processed. 56
57 Error control: Error control in the data link layer is based on automatic repeat request (ARQ), whenever an error is detected, specified frames are retransmitted. Flow and Error control Methods: The process is called Automatic Repeat request (ARQ) Stop-and-Wait ARQ Sliding window schemes: Go-Back-N ARQ Selective Repeat ARQ 57
58 Stop-and-Wait In this the sender sends one frame and wait for an acknowledgement before sending the next frame. The sender set the timer for receiving the ack. Both data and ack are numbered alternatively 0 and 1. The receiver sends only positive ack, otherwise live silent. Sender has control variable 58 S and receiver has control variable R.
59 Stop and Wait ARQ Advantage: It is simple. Each frame is checked and acknowledged before next frame is sent. 59
60 Stop-and-Wait ARQ, Damaged frame When a receiver receives a damaged frame, it discards it, sit silent and keeps its value of R. After the timer at the sender expires, another copy of frame 1 is sent. 60
61 Stop-and-Wait, lost ACK frame If the sender receives a damaged ACK, it discards it. When the timer of the sender expires, the sender retransmits frame 1. Receiver has already received frame 1 and expecting to receive frame 0 (R=0). Therefore it discards the second copy of frame 1. 61
62 Stop-and-Wait, delayed ACK frame The ACK can be delayed at the receiver due to some problem It is received after the timer for frame 0 has expired. Sender retransmitted a copy of frame 0. However, R =1 means receiver expects to see frame 1. Receiver discards the duplicate frame 0. Sender receives 2 ACKs, it discards the second ACK. Numbering is required for each frame. 62
63 Piggybacking A method to combine a data frame with ACK. Station A and B both have data to send. Instead of sending separately, station A sends a data frame that includes an ACK. Station B does the same thing. Piggybacking saves bandwidth. 63
64 Sliding Window: Basics Allows multiple frames to be in transit at the same time before needing an ACK. Receiver allocates buffer space for n frames. The sliding window is a imaginary box at both the sender and receiver end. Transmitter is allowed to send n (window size) frames without receiving ACK. 64
65 Sequence Numbers Frames from a sender are numbered sequentially. Setting of a limit is needed to include the sequence number of each frame in the header. If the header of the frame allows m bits for sequence number, the sequence numbers range from 0 to 2 m 1. for m = 3, sequence numbers are: 0,1, 2, 3, 4, 5, 6, 7. The window size will be 2 m 1 We can repeat the sequence number. 0, 1, 2, 3, 4, 5, 6, 7, 0, 1, 2, 3, 4, 5, 6, 7, 0,
66 Sliding Window: Receiver Receiver ack s frame by including sequence number of next expected frame. Cumulative ACK: ack s multiple frames. Example: if receiver receives frames 2,3, and 4, it sends an ACK with sequence number 5, which ack s receipt of 2, 3, and 4. 66
67 Transmission window shrinks each time as frame is sent, and grows each time an ACK is received. The receiver window shrinks when data are received and expands when ACK are sent. Example-1:If the sequence of transmission for 7 bit frame is as follow : window size 7 ->data0 ->data1 <-ack2 ->data2 <-ack3 ->data3 ->data4 ->data5 <-ack6 67
68 Sliding Window Example 68
69 Sliding Window Example 69
70 Sender Sliding Window At the sending site, to hold the outstanding frames until they are acknowledged, we use the concept of a window. The size of the window is at most 2m -1 where m is the number of bits for the sequence number. Size of the window can be variable, e.g. TCP. The window slides to include new unsent frames when the correct ACKs are received 70
71 Receiver Sliding Window Size of the window at the receiving site is always 1 in this protocol. Receiver is always looking for a specific frame to arrive in a specific order. Any frame arriving out of order is discarded and needs to be resent. Receiver window slides as shown in fig. Receiver is waiting for frame 0 in part a. 71
72 Control Variables Sender has 3 variables: S, SF, and SL S holds the sequence number of recently sent frame SF holds the sequence number of the first frame SL holds the sequence number of the last frame Receiver only has the one variable, R, that holds the sequence number of the frame it expects to receive. If the seq. no. is the same as the value of R, the frame is accepted, otherwise rejected. 72
73 Go Back N- ARQ Receiver sends positive ACK if a frame arrived safe and in order. If the frames are damaged/out of order, receiver is silent and discard all subsequent frames until it receives the one it is expecting. The silence of the receiver causes the timer of the unacknowledged frame to expire. Then the sender resends all frames, beginning with the one with the expired timer. For example, suppose the sender has sent frame 6, but the timer for frame 3 expires (i.e. frame 3 has not been acknowledged), then the sender goes back and sends frames 3, 4, 5, 6 again. Thus it is called Go-Back-N-ARQ The receiver does not have to acknowledge each frame received, it can send one cumulative ACK for several frames. Sender can send up to W frames before worrying about ACKs. 73
74 Go-Back-N ARQ, normal operation The sender keeps track of the outstanding frames and updates the variables and windows as the ACKs arrive. 74
75 Go-Back-N ARQ, lost frame Frame 2 is lost When the receiver receives frame 3, it discards frame 3 as it is expecting frame 2 (according to window). After the timer for frame 2 expires at the sender site, the sender sends frame 2 and 3. (go back to 2) 75
76 Go-Back-N ARQ, damaged/lost/delayed ACK If an ACK is damaged/lost, we can have two situations: If the next ACK arrives before the expiration of any timer, there is no need for retransmission of frames because ACKs are cumulative in this protocol. Example ACK1, ACK2, and ACk3 are lost, ACK4 covers them if it arrives before the timer expires. If ACK4 arrives after time-out, the last frame and all the frames after that are resent. A delayed ACK also triggers the resending of frames 76
77 Go-Back-N ARQ, sender window size Size of the sender window must be less than 2 m. Size of the receiver is always 1. If m = 2, window size = 2 m 1 = 3. Fig compares a window size of 3 and 4. Accepts as the 1st frame in the next cycle-an 77 error
78 Selective Repeat ARQ, sender and receiver windows Go-Back-N ARQ simplifies the process at the receiver site. Receiver only keeps track of only one variable, and there is no need to buffer out-of-order frames, they are simply discarded. However, Go-Back-N ARQ protocol is inefficient for noisy link. It s bandwidth is inefficient and slows down the transmission. In Selective Repeat ARQ, the size of window of sender and receiver is almost same. only the damaged frame is resent. More bandwidth efficient but more complex processing at receiver. It defines a negative ACK (NAK) to report the sequence number of a damaged frame before the timer expires. 78
79 Selective Repeat ARQ, lost frame Frames 0 and 1 are accepted when received because they are in the range specified by the receiver window. Same for frame 3. Receiver sends a NAK2 to show that frame 2 has not been received and then sender resends only frame 2 and it is accepted as it is in the range of the window. 79
80 Selective Repeat ARQ, sender window size Size of the sender and receiver windows must be at most one-half of 2 m. If m = 2, window size should be 2 m /2 = 2m-1 = 2. Fig compares a window size of 2 with a window size of 3. Window size is 3 and all ACKs are lost, sender sends duplicate of frame 0, window of the receiver expect to receive frame 0 (part of the window), so accepts frame 0, as the 1st frame of the next cycle an error. 80
81 THANK YOU
ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain
ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important
More informationThe data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.
Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationSRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February
More informationPART III. Data Link Layer MGH T MGH C I 204
PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control
More informationCOMPUTER NETWORKS UNIT-3
COMPUTER NETWORKS UNIT-3 Syllabus: The Data Link Layer - Data Link Layer Design Issues, Services Provided to the Network Layer Framing Error Control Flow Control, Error Detection and Correction Error-Correcting
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each
More information4. Error correction and link control. Contents
//2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More informationCS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16
Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error
More informationInst: Chris Davison
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationEITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst
EITF25 Internet Techniques and Applications L3: Data Link layer Stefan Höst Communication on physical layer To transmit on the physical medium use signals At each computer it can be seen as transmitting
More informationThe flow of data must not be allowed to overwhelm the receiver
Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More informationCS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos
CS254 Network Technologies Lecture 2: Network Models & Error Detection and Correction Dr Nikos Antonopoulos Department of Computing University of Surrey Autumn 2006 2.1 Layered Tasks Sender, Receiver,
More informationData link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection
2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow
More informationTYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.
Data can be corrupted during transmission. Some applications require that errors be detected and corrected. TYPES OF ERRORS There are two types of errors, 1. Single Bit Error The term single-bit error
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationAnalyzation of Automatic Repeat Request (ARQ) Protocols
RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore
More informationCS422 Computer Networks
CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service
More informationLECTURE #34. Data Communication (CS601)
LECTURE #34 Error Detection And Correction Methods Longitudinal Red Check(LRC) o In LRC, a block of bits is organized in a table (rows and columns) o For example instead of sending 32 bits, we organize
More informationUNIT-II 1. Discuss the issues in the data link layer. Answer:
UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control
More informationComparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:
Comparison of ISO-OSI and TCP/IP Suit Functions of Data Link Layer: 1. Frame generation ( Character Count, Character Stuffing, Bit Stuffing) 2. Error Processing (Parity(EVEN or ODD), Block Parity, Hamming
More informationData Link Control. Surasak Sanguanpong Last updated: 11 July 2000
1/14 Data Link Control Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 11 July 2000 Flow Control 2/14 technique for controlling the data transmission so that s have sufficient
More informationCSE 123: Computer Networks
Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data
More informationCh. 7 Error Detection and Correction
Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us
More informationCS 4453 Computer Networks Winter
CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationTelecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)
Data Link Control Contents Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) 2 Flow Control Flow control is a technique for assuring that a transmitting entity
More informationCHANNEL CODING 1. Introduction
CHANNEL CODING 1. Introduction The fundamental resources at the disposal of a communications engineer are signal power, time and bandwidth. For a given communications environment, these three resources
More informationNetworking Link Layer
Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding
More information10.1 REVIEW QUESTIONS
CHAPTER 10 Data Link Control 10.1 REVIEW QUESTIONS 1. Transmission means to put a signal on a line. Communication is a meaningful and orderly relationship between devices that send and receive data. 3.
More informationCOMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?
Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability
More informationLecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1
Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationOutline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.
EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error
More informationData Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow
More information2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not
CS475 Networks Lecture 5 Chapter 2: Direct Link Networks Assignments Reading for Lecture 6: Sections 2.6 2.8 Homework 2: 2.1, 2.4, 2.6, 2.14, 2.18, 2.31, 2.35. Due Thursday, Sept. 15 2.4 Error Detection
More informationIntroduction to Data Communications & Networking
Introduction to Data Communications & Networking Data Link Layer (Set 5) Chapter 10 and Chapter 11 Dr. Ali Maqousi, Dr. Tatiana Balikhina amaqousi@uop.edu.jo, tbalikhina@uop.edu.jo Department of Computer
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More informationLecture 2 Error Detection & Correction. Types of Errors Detection Correction
Lecture 2 Error Detection & Correction Types of Errors Detection Correction Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted
More informationChapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences
More informationLecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission
1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission
More informationOverview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer
Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology
More informationLecture / The Data Link Layer: Framing and Error Detection
Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start
More informationTransmission SIGNALs
Chapter 6 Digital Communications Basics 6.1 Introduction 6.2 Transmission media 6.3 Source of signal impairment 6.4 Asynchronous Transmission 6.5 Synchronous Transmission 6.6 Error Detection Methods 6.7
More informationLecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of
More informationJaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles
Jaringan Komputer The Data Link Layer Data Link Layer Study the design principles Algorithms for achieving reliable, efficient communication between two adjacent machines at the data link layer Adjacent
More informationTCP: Flow and Error Control
1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol
More informationData Link Layer. Overview. Links. Shivkumar Kalyanaraman
Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction
More informationEE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002
EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise
More informationChapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify
More informationMYcsvtu Notes DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes
DATA REPRESENTATION Data Types Complements Fixed Point Representations Floating Point Representations Other Binary Codes Error Detection Codes Hamming Codes 1. DATA REPRESENTATION Information that a Computer
More informationCSE 461: Framing, Error Detection and Correction
CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages
More information16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols
16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use
More informationHigh Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection
High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationData Link Layer. Srinidhi Varadarajan
Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request
More informationComputer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1
Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter
More informationIntroduction to Computer Networks. 03 Data Link Layer Introduction
Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple
More informationLecture 7: Flow Control"
Lecture 7: Flow Control" CSE 123: Computer Networks Alex C. Snoeren No class Monday! Lecture 7 Overview" Flow control Go-back-N Sliding window 2 Stop-and-Wait Performance" Lousy performance if xmit 1 pkt
More informationC08a: Data Link Protocols
CISC 7332X T6 C08a: Data Link Protocols Hui Chen Department of Computer & Information Science CUNY Brooklyn College 10/16/2018 CUNY Brooklyn College 1 Data Link Layer Responsible for delivering frames
More informationLecture 5: Data Link Layer Basics
Lecture 5: Data Link Layer Basics Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Layer 2 PDU: Frame 2 1 Bit-oriented vs. Byte-oriented Layer 2 protocols
More informationTelecommunication Protocols Laboratory Course
Telecommunication Protocols Laboratory Course G721 Lecture 1 Behind the name Telecommunication: the science and technology of transmitting information (words, sounds, images) over great distances, in the
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport
More information06/05/2008. Chapter 3. The Data Link Layer. Data Link Layer Design Issues. Services Provided to the Network Layer. Error Control Flow Control
Chapter 3 The Data Link Layer Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 1 Functions of the Data Link Layer Provide service interface to the
More informationWilliam Stallings Data and Computer Communications. Chapter 7 Data Link Control
William Stallings Data and Computer Communications Chapter 7 Data Link Control Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time
More informationData Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class
Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different
More informationData Link Layer (1) Networked Systems 3 Lecture 6
Data Link Layer (1) Networked Systems 3 Lecture 6 Purpose of Data Link Layer Arbitrate access to the physical layer Structure and frame the raw bits Provide flow control Detect and correct bit errors Perform
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationCMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd.
Parity Even parity: Odd parity: Add a bit to make the number of ones (1s) transmitted even. Add a bit to make the number of ones (1s) transmitted odd. Example and ASCII A is coded 100 0001 Parity ASCII
More informationData Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking
Data Link Layer Bharati Vidyapeeth s Institute of Computer Applications and Management,New Delhi-63 by Vishal Jain U2. 1 Learning Objectives To introduce the design issues of data link layer. To discuss
More informationLecture 11 Overview. Last Lecture. This Lecture. Next Lecture. Medium Access Control. Flow and error control Source: Sections , 23.
Last Lecture Lecture 11 Overview Medium Access Control This Lecture Flow and error control Source: Sections 11.1-11.2, 23.2 Next Lecture Local Area Networks 1 Source: Sections 13 Data link layer Logical
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP
More informationPoint-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1
Point-to-Point Links Outline Encoding Framing Error Detection Sliding Window Algorithm Fall 2004 CS 691 1 Encoding Signals propagate over a physical medium modulate electromagnetic waves e.g., vary voltage
More informationChapter 10 Error Detection and Correction 10.1
Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used
More informationTransport Protocols & TCP TCP
Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC
More informationData Link Layer, Part 5 Sliding Window Protocols. Preface
Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationOutline. CS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,
More informationData Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1
Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation
More informationIslamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.
Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 2 Getting Connected Eng. Haneen El-Masry March, 2014 2.2 ENCODING Encoding the
More informationComputer Networking : Principles, Protocols and Practice
Computer Networking : Principles, Protocols and Practice Part 3 : Transport Layer Olivier Bonaventure http://inl.info.ucl.ac.be/ O. Bonaventure 2008 Basics Module 3 : Transport Layer Building a reliable
More information(Refer Slide Time: 2:20)
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-15 Error Detection and Correction Hello viewers welcome to today s lecture
More information23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22
23-3 TCP 23.22 TCP is a connection-oriented protocol; it creates a virtual connection between two TCPs to send data. In addition, TCP uses flow and error control mechanisms at the transport level. Topics
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 2 Functions of the Data Link Layer Provide service interface to the
More informationET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code
More informationINF Data Communication Data Link Layer
INF3190 - Data Communication Data Link Layer Carsten Griwodz Email: griff@ifi.uio.no most slides from: Ralf Steinmetz, TU Darmstadt and a few from Olav Lysne, J. K. Kurose og K. W. Ross Function, Services
More informationData Link Layer. Indian Institute of Technology Madras
Data Link Layer Study of algorithms for achieving reliable, efficient communication between two adjacent machines at DLL. adjacent - two machines physically connected using a communication channel that
More informationCSCI-1680 Link Layer Reliability Rodrigo Fonseca
CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More informationData Link Layer (part 2)
Data Link Layer (part 2)! Question - What is a major disadvantage of asynchronous transmission? Reference: Chapters 6 and 7 Stallings Study Guide 6! Question - What is a major disadvantage of asynchronous
More information