Telecommunication Protocols Laboratory Course

Size: px
Start display at page:

Download "Telecommunication Protocols Laboratory Course"

Transcription

1 Telecommunication Protocols Laboratory Course G721 Lecture 1

2 Behind the name Telecommunication: the science and technology of transmitting information (words, sounds, images) over great distances, in the form of electromagnetic signals (telegraph, telephone, radio, TV) In short: communication at a distance Protocol: a set of conventions for the treatment and formatting of data in an electronic communications system Underlying framework : COMPUTER NETWORKS March 22,

3 Communication Application Application Network March 22,

4 Practicalities Schedule: Wednesdays Components Lectures (10h), project work (weeks 12-21) 2 credits, no examination Registration Students should register to the course via Webpage March 22,

5 The book We use as textbook Computer Networks, 4th edition, by Andrew Tanenbaum, Prentice Hall, March 22,

6 Project work During the lectures we study various network protocols Students group into teams (2-4 members) Each team chooses 3 protocols to simulate The programming environment is chosen by the team The work of the team is documented using a given format as well as a log The programs have to work There are deadlines March 22,

7 Networks Definition: autonomous computing systems (NODES) are interconnected Advantage resources are accessible independently of their physical location resource sharing and redundancy parallel processing improved reliability, availability, and performance Tradeoff: increased complexity March 22,

8 Network applications Business applications Resource sharing (e.g. printers, data), communication medium (interoffice and internet, online collaboration, videoconferencing), e-commerce Home applications Access to remote information (e.g. newspapers, online libraries, weather, internet radio) Person-to-person communication ( , instant messaging, chat rooms, newsgroups, peer-to-peer communication, telephony, tele-learning) Interactive entertainment (video-on-demand, games) E-commerce March 22,

9 Network applications 2 Wireless and mobile users Portable office: conference sites, campuses Trucks, taxis, delivery vehicles, repair persons Military March 22,

10 Network taxonomy Criterion: transmission technology Broadcast links Point-to-point links Criterion: scale (geographical extent) Very local area networks (personal area network) Local area networks LAN Metropolitan area networks MAN Wide area networks WAN Inter-networks Criterion: organization Private networks Public networks Other criterions Wireless networks Home networks March 22,

11 Networks for Communication Basic form of communications shared memory message exchange Networks are loosely coupled, they are links without memory there is no shared memory applications residing on different nodes cooperate ONLY by passing messages to each other March 22,

12 Network Layers Networks organized as stacks of layers Each layer is built upon the one below it offers certain services to the higher layers shields higher layers from the implementation of the services The number, contents, functions and names of layers depends on the network Layer n on one machine communicates with layer n on another machine Rules and conventions used in this: layer n protocol Entities comprising the corresponding layers on different machines: peers (processes, hardware devices, humans) March 22,

13 Interfaces Between each pair of adjacent layers The primitive operations and services the lower layer makes available to the upper one Clean and clear-cut interfaces Each layer performs a specific collection of wellunderstood functions Simplify the replacement of a layer implementation with a completely different implementation Minimize the amount of information that must be passed between layers March 22,

14 Layers, protocols, and interfaces March 22,

15 Network architecture Is a set of layers and protocols The specification of the architecture should contain enough information for building layers that obey the protocols Interfaces and details of implementation are not part of the architecture Protocol stack list of protocols, one per layer, used by a certain system March 22,

16 Protocol Stack 1 Location A Location B 3 I like rabbits Message Philosopher J'aime bien les lapins 3 2 L: Dutch Ik vind konijnen leuk Information for the remote translator Translator L: Dutch Ik vind konijnen leuk 2 1 Fax #--- L: Dutch Ik vind konijnen leuk Information for the remote secretary Secretary Fax #--- L: Dutch Ik vind konijnen leuk 1 The philosopher-translator-secretary architecture.

17 Protocol Stack 2 Example information flow supporting virtual communication in layer 5.

18 Design Issues for the Layers Addressing Layers need to identify senders and receivers Data Transfer Rules Directions of data travel, logical channels Error Control Many error-detecting and error-controlling codes exist The peers have to agree on which ones are used The receiver has to inform the sender about correctly received messages Flow Control Keep a faster sender from swamping a slow receiver Arbitrarily long messages Multiplexing and de-multiplexing Using the same connection for multiple, unrelated communications Routing If multiple paths between source and destination exist, a route must be chosen

19 Types of services Layers offer 2 types of services to the layers above them Connection-oriented Connectionless Connection-oriented network service Service user establishes connection, uses it, then releases it Connection tube Negotiation between sender, receiver, subnet on parameters such as: maximum message size, quality of service, etc Connectionless network service Each message carries the full destination address and is routed through the system independently of all the others March 22,

20 Quality of service Usually refers to reliability of services (not losing data) implemented by having the receiver acknowledge the receipt of each message so the sender is sure it arrived acknowledgement process introduces overhead and delays March 22,

21 Reference models Network architectures OSI reference model Open System Interconnection TCP/IP reference model Transmission Control Protocol/Internet Protocol OSI The associated protocols are not really used The model is quite general and still valid Features discussed at each layer are still important TCP/IP The model is not of much use The protocols are widely used March 22,

22 OSI/ISO reference model Based on a proposal of ISO (International Standards Organization) Intended as a first step toward international standardization of protocols used in the various layers (1983, revised 1995) It deals with connecting open systems (systems open for communication with other systems) March 22,

23 OSI model

24 Physical layer Concerned with transmitting raw bits over a communication channel When a 1-bit is sent, a 1-bit has to be received, not a 0-bit Typical questions How many volts used to represent a 1, how many for a 0 How many ns a bit lasts Whether transmission can proceed simultaneously in both directions How the initial connection is established and how is it then torn down How many pins the network connector has and what are their uses Design issues Mechanical, electrical and timing interfaces Physical transmission medium March 22,

25 Data Link Layer Transforms a raw transmission facility into a line that appears free of undetected transmission errors to the above network layer Obliges the sender to break up input data into data frames (few hundred or thousands bytes each) and transmit frames sequentially If service reliable => receiver confirms correct receipt of each frame by sending back an acknowledgement frame Flow control regulations and error handling are integrated Medium access control sub-layer Controls access to a shared channel (for broadcast networks) March 22,

26 Network layer Controls the operation of a subnet Key design issue: how are packets routed from source to destination Routes: static / determined at initialization / highly dynamic Controls the bottlenecks in the subnet Handles quality of service issues: delay, transit time, jitter, etc Compatibility among different networks (addressing, max message sizes, different protocols) Broadcast networks: this layer is very thin March 22,

27 Transport layer Accepts data from the above layers and manipulates it, ensuring that it arrives correctly at the destination Efficiency is important Hiding the hardware from the above layers also important When a connection is established, the type of service is determined, e.g. Error-free, point-to-point channel Transporting isolated messages Broadcasting True end-to-end layer a program on the source machine carries on a conversation with a similar program on the destination machine using message headers and control messages In contrast, layers 1-3 are chained

28 Session layer Allows users on different machines to establish sessions between them Session services Dialog control: keeping track of whose turn it is to transmit Token management: preventing 2 parties from attempting the same critical operation at the same time Synchronization: check-pointing long transmissions to allow them to continue from where they were after a crash March 22,

29 Presentation layer Concerned with the syntax and semantics of the transmitted information Data structures to be exchanged can be defined in an abstract way, along with a standard encoding to be used on the wire Useful for computers with different data representation Manages these abstract data structures and allows higher-level data structures to be defined and exchanged E.g. banking records March 22,

30 Application layer Contains a variety of protocols commonly needed by users E.g. HTTP basis for WWW File transfer Electronic mail Network news March 22,

31 TCP/IP reference model US Department of Defense sponsored a research network called ARPANET (1960s) that needed ultimately to interconnect with satellites and radio networks a reference architecture was needed Major goal: the ability to connect multiple networks in a seamless way Another major goal: the ability to survive loss of subnet hardware with existing conversations not being broken off Also: flexible architecture a packet-switching network, based on a connectionless inter-network layer was conceived March 22,

32 TCP/IP model March 22,

33 Internet layer Connectionless inter-network layer that holds TCP/IP architecture together It permits hosts to inject packets into any network and have them travel independently to the destination (in possibly another network) Defines an official packet format and protocol called IP (internet protocol) It delivers IP packets to their destination Major issues: packet routing and avoiding congestion Similar in functionality to OSI network layer March 22,

34 Transport layer Allows peer entities on the source and destination hosts to carry on a conversation Similar to the OSI transport layer 2 end-to-end transport protocols are defined here: TCP (transmission control protocol) UDP (user datagram protocol) March 22,

35 Hybrid Model March 22,

36 Layers we will cover Application Layer Transport Layer Network Layer Medium Access Control Sub-layer Logical Link Sub-layer March 22,

37 The Logical Link sub-layer Studies algorithms for achieving reliable and efficient communication between 2 adjacent machines at DLL Adjacent machines: connected by a wirelike communication channel Bits delivered in exactly the same order in which they are sent Problems to be handled Errors made by communication circuits Finite data rate of communication circuits Non-zero propagation delay

38 Functions of the Logical Link Layer Interface function: provides service interface to the network layer Error control function: deals with transmission errors Framing Error detection and retransmission Flow control function: regulates data flow, so that slow receivers are not swamped by fast senders

39 Services Provided to Network Layer (a) Virtual communication. (b) Actual communication.

40 LLC services Unacknowledged connectionless service Acknowledged connectionless service Acknowledged connection-oriented service March 22,

41 Unacknowledged connectionless service Source sends independent frames to destination Destination does not acknowledge the frames No logical connection is used If a frame is lost, this is not detected and the frame is not recovered Appropriate when error rate is very low, recovery left to upper layers for real-time traffic (voice) where late data is worse than bad data Most LANs use unacknowledged connectionless service

42 Acknowledged connectionless service Each frame sent is individually acknowledged The sender knows whether a frame has arrived correctly If an acknowledgement has not arrived within a specified time, frame can be sent again No logical connection is used Appropriate in unreliable channels (e.g., wireless systems) Acknowledgements in LLC: optimization, not requirement

43 Acknowledged connection-oriented service Source and destination establish a connection before any data is transmitted Frames are numbered LLC guarantees that each frame sent is indeed received each frame sent is received only once all frames are received in the right order Connection-oriented service provides a reliable bit stream 3 phases: establish connection, send, release connection

44 Framing idea To provide service to NL, LLC uses service of PhL PhL accepts a bit stream and delivers it to destination Bit stream not guaranteed to be error-free It is up to LLC to detect and, if necessary, to correct errors LLC breaks the bit stream into discrete frames and computes some checksum C for each frame At destination the checksum of the received frames recomputed in C If C C DLL knows an error occurred Framing = breaking the bit stream into frames

45 Frames Relationship between packets and frames. March 22,

46 Framing methods Character count Flag bytes with byte stuffing Starting and ending flags with bit stuffing PhL coding violations Many LLC protocols use a combination of character count with one of the other methods, for extra safety March 22,

47 Character count framing A character stream. (a) Without errors. (b) With one error. March 22,

48 Flag bytes with byte stuffing (a) A frame delimited by flag bytes. (b) Four examples of byte sequences before and after stuffing.

49 Starting and ending flags, with bit stuffing Bit stuffing also prescribes as starting and ending flag (a) The original data. (b) The data as they appear on the line. (c) The data as they are stored in receiver s memory after de-stuffing.

50 PhL coding violations Applicable in networks where encoding in PhL contains some redundancy 1 bit of data encoded with two physical bits: a 1-bit encoded as a high-low pair, a 0-bit encoded as a low-high pair Every data bit has a transition in the middle, so receiver can easily locate bit boundaries Combinations high-high and low-low are used for delimiting frames in some protocols March 22,

51 Error Detection and Correction Errors are common on twisted copper pairs and in wireless communication On reliable channels Error-Detecting Codes On prone-to-error channels Error-Correcting Codes March 22,

52 How to detect errors?

53 Types of redundancy March 22,

54 Vertical Redundancy Check Called also parity check A redundant bit (the parity bit) is appended to every data unit so that the total number of 1s in the unit (including the parity bit) is even March 22,

55 Illustration of VRC March 22,

56 Longitudinal Redundancy Check

57 Cyclic Redundancy Check Most powerful, based on binary reduction Predefined binary unit called the divisor The data unit (DU) is appended with a sequence of redundant bits (CRC remainder) so that the resulted DU is exactly divisible by the divisor At destination, the received DU is divided by the divisor If remainder is zero, ok March 22,

58 More on CRC Required qualities of a CRC To have exactly one bit less than the divisor Appending it to the DU must make the resulting bit sequence divisible by divisor Theory and application of CRC: straightforward The complication: deriving the CRC March 22,

59 Deriving the CRC March 22,

60 CRC generator Uses modulo-2 division

61 CRC checker Uses modulo-2 division in the same way

62 Polynomials CRC generator typically represented as an algebraic polynomial This is useful Short Proves the concept mathematically

63 Standard polynomials 12,16, 32 size of CRC remainders CRC divisor s size is hence 13, 17, bit CRC used in Ethernet, Token Ring March 22,

64 Error control LLC has to ensure that all frames are correctly delivered to NL at destination in right order and only once Implemented at LLC and at higher layers Tools Acknowledgements Timers Sequence numbers March 22,

65 Why flow control? Needed because Receivers have limited memory (called buffer) to store incoming data frames Receivers have limited speed at which to process incoming data Receivers must inform senders before these limits are reached March 22,

66 Flow control Occurs in LLC and at higher layers Implemented at LLC sub-layer What to do with fast senders that eventually swamp slow receivers 2 methods Feedback-based flow control Set of procedures telling the sender how much data it can send before it must wait for an acknowledgement (ack) Rate-based flow control (never used at DLL, but at NL) March 22,

67 Types of flow control Upon getting an ack, the sender can Send fewer frames Stop temporarily

68 Stop-and-Wait Sender waits for an ack after every frame sent

69 Pros and cons for Stop-and-Wait Advantage: simplicity and safety Disadvantage: inefficiency Each frame is alone on the line If distance between devices is big => transmission time much increased March 22,

70 Sliding window Sender transmits several frames before needing an ack Hence, receiver acknowledges only some frames An ack confirms receipt of multiple frames Frames can be sent one after another Link efficiently carries several frames at once March 22,

71 The window Refers to imaginary boxes at both sender and receiver At sender it holds frames Provides the upper limit on the number of frames to be transmitted before ack needed At receiver it holds placeholders for frames Provides the number of frames that may still be received before an ack must be sent March 22,

72 More on the window Has a predefined length n Identification scheme for frames (sequential numbers) Used to keep track of which frames have been transmitted and which received Frames numbered modulo n+1: 0 n When receiver sends an ack Includes the number of next expected frame Window has dimension n at both ends

73 Illustration of the window March 22,

74 Sender window March 22,

75 Receiver window March 22,

76 An example

77 How does the window increase? When ack i is sent, the receiver (or ack i is received, the sender) Increases its window by i positions if this is the first ack Increases its window by i-j positions if the previous ack was j, j<i Increases its window by i+n+1-j positions if the previous ack was j, j>i Note that j=i, if the previous ack was j, is NOT POSSIBLE: window size is n, we have n+1 frame numbers (0 -- n) so j=i => we sent n+1 frames without ack (contradiction) March 22,

78 Error control In LLC, it refers to methods for error retransmission Automatic Repeat request (ARQ) allows Detection of an error in an exchange => a NAK (negative ack) is returned and the specified frames are retransmitted Existence of lost frames and their retransmission A lost frame is so damaged by noise that is beyond recognition as a frame at all (data or ACK/NAK frame) March 22,

79 ARQ Implemented as an adjunct to flow control March 22,

80 Stop-and-Wait ARQ Based on stop-and-wait flow control Extended to handle retransmission of data in case of lost/damaged frames Added features 1. Sender keeps copy of last sent frame 2. Data and ACK frames are numbered with 0/1 3. Receiver finds error => sends NAK 4. Sender has timer March 22,

81 Damaged frames illustration

82 Lost data frame illustration March 22,

83 Lost acknowledgement illustration March 22,

84 Feature 1 Sender keeps a copy of the last frame transmitted and not acknowledged yet Allows the sender to retransmit all lost or damaged frames until received correctly March 22,

85 Feature 2 For identification, both data and ACK frames are alternatively numbered with 0 and 1 A data 0 frame is acknowledged by ACK 1 and a data 1 frame is acknowledged by ACK 0 Allows for identification of data frames if duplicate transmission occurs When acknowledgements are lost March 22,

86 Feature 3 If a data frame is corrupted in transit, receiver classifies it as error and sends back a NAK NAKs are unnumbered When sender gets a NAK, it retransmits the last frame sent Frame transmitted after the last ack, regardless of number March 22,

87 Feature 4 Sender has a timer If ACK/NAK does not arrive in a preestablished time period, sender assumes the data frame was lost and retransmits it March 22,

88 Lost ACK/NAK For a retransmitted frame that arrived at receiver before, but its ACK/NAK was lost If the lost frame was a NAK the receiver accepts new copy, returns ACK (if all OK this time) If the lost frame was an ACK the receiver recognizes the new copy as duplicate (it waits for a 1 frame and gets a 0 frame) returns ACK discards the new copy March 22,

89 Sliding window ARQ Based on sliding window flow control Extended to handle retransmission of data in case of lost/damaged frames 2 popular protocols Go-back-n ARQ Selective-reject ARQ Added features 1. Sender keeps copies of transmitted frames 2. NAK frames also, in addition to ACK 3. Sender has timer March 22,

90 Feature 1 All transmitted and yet unacknowledged frames have a copy at sender If frames 0 -- n have been sent and last ACK was for frame n-3, then copies of frames n-3, n-2, n-2, n are kept until an ACK arrives for them Assume here n>3 March 22,

91 Feature 2 If receiver gets damaged data, it then sends back NAK NAKs are numbered NAK n indicates that frames up to n arrived fine and frame n has to be retransmitted Data frames received well do not need each a separate ACK Damaged data frames need each a NAK March 22,

92 Feature 3 Sender has timer If n frames have been sent and are not yet acknowledged, then timer is started When timer goes off, frames are retransmitted (all or not all, depends on protocol) Lost data frames and lost NAK are thus solved If the lost frame is an ACK, then receiver recognizes the duplicates March 22,

93 Go-back-n ARQ When one frame is lost/damaged, all frames sent since the last acknowledged frame are retransmitted Specific features for Damaged frame Lost data frame Lost ACK/NAK March 22,

94 Go-back-n, damaged frame

95 Go-back-n, lost data frame

96 Go-back-n, lost ACK/NAK

97 Go-back-n, more This protocol requires frames to arrive sequentially When one is damaged/lost, sequence is broken and all subsequent frames, even if correctly arrived, are discarded Technically achieved with frame numbers When the sender s timer times out All frames are retransmitted This avoids deadlock March 22,

98 Selective-reject ARQ Only the specific damaged/lost frame is retransmitted Retransmission is typically out-of-sequence Receiver must know how to sort the frames it has in order to insert the retransmitted one March 22,

99 Differences compared to go-back-n Receiver Must have some form of sorting logic to reorder out-of-sequence received frames Must have some big-enough buffer Sender keeps all previously received frames on hold, until all retransmissions have been sorted and duplications identified and discarded Must have some sorting mechanism to find and select only the requested frame to retransmit ACK numbers refer to respective frames, not expected ones Sliding window: <= (n+2)/2, if it was n for go-back-n The complexity of this algorithm requires smaller window

100 Selective-reject, damaged frame

101 On acknowledgements ACK i implies the successful receipt of frame i and all frames from j+1 to i, if j is the last acknowledged frame, j<i Frames received after a damaged/lost frame cannot be acknowledged until that frame arrived correctly Lost ACK/NAK is likewise in go-back-n March 22,

102 Bidirectional transmission Data frames are sent by both sender and receiver For sending acknowledgements, piggybacking is used When receiver gets a data frame from sender, it does not acknowledge it immediately Receiver waits until its NL passes to it the next packet It then sends this packet as a data frame to sender and also embeds the acknowledgement for the previously received data frame Question: how long to wait for a new data frame, in order to piggyback the acknowledgement on it? Not too much: receiver also gets a timer

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Nguyễn Đức Thái

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Nguyễn Đức Thái Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Nguyễn Đức Thái Course details Number of credits: 4 Study time allocation per week: 3 lecture hours for theory 2 lecture hours for exercises and lab work

More information

DATA LINK LAYER UNIT 7.

DATA LINK LAYER UNIT 7. DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

The flow of data must not be allowed to overwhelm the receiver

The flow of data must not be allowed to overwhelm the receiver Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before

More information

Review of Lecture 1. EEC-484/584 Computer Networks. Network Hardware. Outline. Lecture 2. Wenbing Zhao

Review of Lecture 1. EEC-484/584 Computer Networks. Network Hardware. Outline. Lecture 2. Wenbing Zhao EEC-484/584 Computer Networks Lecture 2 Review of Lecture 1 Uses of computer networks Network Hardware 3 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and

More information

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames. Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

Outline. EEC-682/782 Computer Networks I. Course Objectives. Outline of Lectures

Outline. EEC-682/782 Computer Networks I. Course Objectives. Outline of Lectures Outline EEC-682/782 Computer Networks I Lecture 1 Wenbing Zhao w.zhao1@csuohio.edu (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Syllabus Introduction to

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

Networking Link Layer

Networking Link Layer Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding

More information

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review. EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection 2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Peer entities. Protocol Layering. Protocols. Example

Peer entities. Protocol Layering. Protocols. Example Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction Computer Networks The old model of a single computer serving all of the organization s computational needs has been replace by one in which a large number of separate but interconnected

More information

Jaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles

Jaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles Jaringan Komputer The Data Link Layer Data Link Layer Study the design principles Algorithms for achieving reliable, efficient communication between two adjacent machines at the data link layer Adjacent

More information

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Text Books. What is a network? Classification of Networks. Computer Communication and Networks 9/1/2014

Text Books. What is a network? Classification of Networks. Computer Communication and Networks 9/1/2014 Computer Communication and Networks Text Books 1. Computer Networks, Andrew S Tanenbaum, Fifth edition. 2. Data Communications and Networking, B Forouzan, 3rd edition. 3. Data and Computer Communications,

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

UNIT 1. Advantages of Computer Networks

UNIT 1. Advantages of Computer Networks UNIT 1 COMPUTER NETWORKS :- A Network is a set of devices or nodes connected by media links.a node can be a computer, printer,scanner,voip phone etc.computer network means an interconnected collection

More information

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

William Stallings Data and Computer Communications. Chapter 7 Data Link Control William Stallings Data and Computer Communications Chapter 7 Data Link Control Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time

More information

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Network Model: Each layer has a specific function.

Network Model: Each layer has a specific function. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays.

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays. Chapter2: analog and digital signals can take one of two forms: 1. periodic 2. nonperiodic Periodic analog signals can be classified as: 1. simple 2. composite A sine wave is represented by three parameters:

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP) Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames

More information

Chapter -4 OSI Reference Model

Chapter -4 OSI Reference Model Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

ET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code

More information

Chapter 1 : Introduction to Computer Networks

Chapter 1 : Introduction to Computer Networks Topic List: A. Need to Share Resources B. Layering Concept and Example C. TCP/IP and OSI Layering Models D. Connection Oriented vs. Connectionless Transfer E. Top-Down and Bottom Up Approaches to study

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

King Fahd University of Petroleum & Minerals Computer Engineering g Dept King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 540 Computer Networks Term 121 Dr. Ashraf S. Hasan Mahmoud Rm 22-420 Ext. 1724 Email: ashraf@kfupm.edu.sa 9/1/2012 Dr. Ashraf

More information

3. Data Link Layer 3-2

3. Data Link Layer 3-2 3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

UNIT I FUNDAMENTALS & LINK LAYER

UNIT I FUNDAMENTALS & LINK LAYER UNIT I FUNDAMENTALS & LINK LAYER Building a network Requirements - Layering and protocols - Internet Architecture Network software Performance ; Link layer Services - Framing - Error Detection Flow control.

More information

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Local Area Networks and the Network Protocol Stack

Local Area Networks and the Network Protocol Stack Local Area Networks and the CSC362, Information Security Introduction problems inherent in transmitting packets network topologies network protocol stack Packet Switching Problems packet switching can

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Chapter 1: OSI Model

Chapter 1: OSI Model Chapter 1: OSI Model Abdullah Konak School of Information Sciences and Technology Penn State Berks Learning Objectives Define the term protocol architecture and explain the need and benefits of a communication

More information

This Lecture. BUS Computer Facilities Network Management. Line Discipline. Data Link Layer

This Lecture. BUS Computer Facilities Network Management. Line Discipline. Data Link Layer This Lecture US35 - Computer Facilities Network Management Synchronisation and interfacing insufficient by themselves. Need to provide: Flow control - allow the receiver to regulate the flow of data. Error

More information

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

Lecture (11) OSI layer 4 protocols TCP/UDP protocols Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:

More information

Session 1. Introduction to Computer Communications and Networking. Communication Network. A communication network consists of a set

Session 1. Introduction to Computer Communications and Networking. Communication Network. A communication network consists of a set Session 1 Introduction to Computer Communications and Networking Communication Network A communication network consists of a set of equipment and facilities that provides a service. Same as any utility

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Data Transport over IP Networks

Data Transport over IP Networks Data Transport over IP Networks Derek Konigsberg octo@logicprobe.org AITP University of Central Florida Data Transport over IP Networks p.1/24 Introduction The TCP/IP protocol suite was created by DARPA

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,

More information

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer Science Chapter - 2 Switching and Network Architecture

More information

CS-461 Internetworking. Dr. Mohamed Aboutabl

CS-461 Internetworking. Dr. Mohamed Aboutabl CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network

More information

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

ELC 537 Communication Networks

ELC 537 Communication Networks Modern Academy for Engineering and Technology Electronics Engineering and Communication Technology Dpt. ELC 537 Communication Networks Prepared by: Dr. Nelly Muhammad Hussein Sections & Objectives Principles

More information

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction

More information

August AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links

August AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links Network Working Group Request for Comments: 1504 A. Oppenheimer Apple Computer August 1993 Status of This Memo Appletalk Update-Based Routing Protocol: Enhanced Appletalk Routing This memo provides information

More information

Introduction to Data Communications & Networking

Introduction to Data Communications & Networking Introduction to Data Communications & Networking Data Link Layer (Set 5) Chapter 10 and Chapter 11 Dr. Ali Maqousi, Dr. Tatiana Balikhina amaqousi@uop.edu.jo, tbalikhina@uop.edu.jo Department of Computer

More information

Computer Communication and Networks

Computer Communication and Networks Computer Communication and Networks Text Books 1. Computer Networks, Andrew S Tanenbaum, Fifth edition. 2. Data Communications and Networking, B Forouzan, 3rd edition. 3. Data and Computer Communications,

More information

PART III. Data Link Layer MGH T MGH C I 204

PART III. Data Link Layer MGH T MGH C I 204 PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control

More information

Data Link layer (CN chap 3.1, 3.4, 3.6)

Data Link layer (CN chap 3.1, 3.4, 3.6) Data Link layer (CN chap 3.1, 3.4, 3.6) The OSI model an old friend... Application Presentation Session Transport Network Data link Physical F.eks. ftp, mail, http,... handles data structures and conversion

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

UNIT-II 1. Discuss the issues in the data link layer. Answer:

UNIT-II 1. Discuss the issues in the data link layer. Answer: UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

THE TRANSPORT LAYER UNIT IV

THE TRANSPORT LAYER UNIT IV THE TRANSPORT LAYER UNIT IV The Transport Layer: The Transport Service, Elements of Transport Protocols, Congestion Control,The internet transport protocols: UDP, TCP, Performance problems in computer

More information

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1 Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information