2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
|
|
- Roland Short
- 5 years ago
- Views:
Transcription
1 UNIT CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Pure ALOHA Slotted ALOHA Carrier Sense Multiple Access CSMA with Collision Detection Collision Free Protocols A Bit Map Protocol Binary Countdown 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING Character Count Character Stuffing Bit Stuffing Physical layer coding violations 2.6 ELEMENTARY DATA LINK PROTOCOL Unrestricted Simplex Protocol Simplex stop-and-wait Protocol A simplex protocol for a noisy channel 2.7 SLIDING WINDOW PROTOCOL (Windowing) bit Sliding Window Go back N Protocol Selective repeat Protocol 2.8 ERROR DETECTION Simple Parity check 28.2 Two-dimensional Parity check Checksum Cyclic redundancy check 2.9 ERROR CORRECTION (Single Bit)
2 2.1 CHANNEL ALLOCATION: It means how to allocate a multi access channel among competing users. In other words, we need a set of rules (i.e. a protocol) to allow each user to communicate and avoid interference. A central controller interrogates each host and allocates channel capacity to those who need it called polling. With a static channel allocation approach, the channel's capacity is essentially divided into fixed portions; each user is then allocated a portion for all time. If the user has no traffic to use in its portion, then it goes unused. A static allocation performs better when the traffic is predictable With a dynamic channel allocation approach the allocation of the channel changes based on the traffic generated by the users. A dynamic channel allocation tries to get better utilization and lower delay on a channel when the traffic is unpredictable. Dynamic Channel Allocation in LANs and MANs 1. Station Model: N stations. 2. Single Channel Assumption: all stations can transmit on it and all can receive from it; 3. Collision Assumption: two frames simultaneously sent in overlapped time. 4. (a) Continuous Time. (b) Slotted Time. 5. (a) Carrier Sense. (b) No Carrier Sense 2.2 MULTIPLE ACCESS PROTOCOLS: Pure ALOHA: a) Whenever a user has a frame to send, it simply transmits the frame. b) If collision occurs, it waits for a random period of time and re-sends it again. c) effective maximum channel utilization is 18% Slotted ALOHA: a) time is divided into slots of equal length greater or equal to average frame duration. b) frame transmission can only start at beginning of a time slot. c) collision destroys only those packets transmitted at the beginning of a slot. d) increased transmission delay on a lightly loaded network due to wait for slot. e) effective maximum channel utilization is 37%.
3 2.2.3 Carrier Sense Multiple Access: a) A user wishing to transmit first listens to the medium to see if another transmission is in progress (carrier sense) If the channel is in use, it must wait. If the medium is idle, it may transmit. b) 1-Persistent: station transmits with the probability of 1 when it finds the channel idle. Effective maximum channel utilization is 53% for P=1.0. c) Non Persistent: station does not continuously sense the channel. When the channel is busy, it waits for a random period of time before trying to listen again. This is less greedy. Effective maximum channel utilization approaches 100%. d) P-Persistent: station transmits with the probability of P when it finds the channel idle. e) Detection or sensing delay is determined by receiver hardware: a small detection time means that a user can detect a free channel rapidly. f) CSMA is effective for LANs, where propagation delay is usually very small compared with frame transmission CSMA with Collision Detection: a) non-persistent b) station listens before transmitting c) station aborts transmission when a collision is detected d) Collisions can be detected by looking at the power or pulse width of the received signal and comparing it to the transmitted signal. e) transmitter waits a random amount of time after a collision f) effective maximum channel utilization g) used in Ethernet
4 COMPARISON OF THE CHANNEL UTILIZATION: Collision Free Protocols: A Bit Map Protocol: a) Contention and data transmission periods alternate. b) The contention period is divided into slots, with 1 bitwide slot for each host on the network. c) If a host wants to transmit a packet, it sets its contention slot equal to 1. Otherwise it sets it to zero. d) The slots pass all hosts in sequence so every host is aware of who will transmit Binary Countdown: a) Higher numbered stations have a higher priority than lower numbered stations. b) Has a contention period and a broadcast period. c) During the contention period each host broadcasts its binary address one bit at a time, starting with the most significant bit bits transmitted simultaneously are Boolean OR d. d) Arbitration Rule: If a hosts sends a 0 bit but the OR results in a 1, the host gives up The last host remaining wins the right to broadcast.
5 e) Stations with the highest addresses will always win. f) This is good if you wish to implement priority, but bad if you want to give all hosts fair access to the channel. g) After host A successfully transmits, all hosts with addresses less than host A add one to their address, improving their priority. h) Host A changes its address to zero, giving it the lowest priority. 2.3 FDDI: FDDI (Fiber Distributed Data Interface) is a set of ANSI and ISO standards for data transmission on fiber optic lines in a local area network (LAN) that can extend in range up to 200 km (124 miles). The FDDI protocol is based on the token ring protocol. In addition to being large geographically, an FDDI local area network can support thousands of users. FDDI is frequently used on the backbone for a wide area network (WAN).
6 2.4 DATA LINK LAYER DESIGN ISSUES: a) Services provided to the Network Layer i. Unacknowledged Connection less Service ii. Acknowledged Connection less Service iii. Acknowledged Connection Oriented Service b) Framing c) Error Control d) Flow Control 2.5 FRAMING & STUFFING: Since the physical layer merely accepts and transmits a stream of bits without any regard to meaning or structure, it is upto the data link layer to create and recognize frame boundaries. This can be accomplished by attaching special bit patterns to the beginning and end of the frame. If these bit patterns can accidentally occur in data, special care must be taken to make sure these patterns are not incorrectly interpreted as frame delimiters. The four framing methods that are widely used are Character count Starting and ending characters, with character stuffing Starting and ending flags, with bit stuffing Physical layer coding violations Character Count: This method uses a field in the header to specify the number of characters in the frame. When the data link layer at the destination sees the character count,it knows how many characters follow, and hence where the end of the frame is. The disadvantage is that if the count is garbled by a transmission error, the destination will lose synchronization and will be unable to locate the start of the next frame. So, this method is rarely used.
7 2.5.2 Character Stuffing: Each frame starts with special start and end bytes (flag bytes). Here will imagine it as same byte, FLAG. After error, can always find start of next frame Bit Stuffing: a) Byte stuffing specifies char format (e.g. 8 bits per char). b) To allow arbitrary no. of bits per char, use stuffing at bit-level rather than at byte-level. c) Each frame begins and ends with bit pattern (6 1's) d) If 5 1's in a row in data, stuff a 0 in so will never be 6 in a row. e) Stuff it in always - whether the next char was going to be a 1 or not. f) De-stuffer removes the 0's after any 5 1's Physical layer coding violations: The final framing method is physical layer coding violations and is applicable to networks in which the encoding on the physical medium contains some redundancy. In such cases normally, a 1 bit is a high-low pair and a 0 bit is a low-high pair. The combinations of low-low and high-high which are not used for data may be used for marking frame boundaries.
8 2.6 ELEMENTARY DATA LINK PROTOCOL: Unrestricted Simplex Protocol a) data transmission in one direction only (simplex) b) no errors take place on the physical channel c) the sender/receiver can generate/consume an infinite amount of data. d) always ready for sending/receiving Simplex stop-and-wait Protocol a) Drop assumption that receiver can process incoming data infinitely fast b) stop-and-wait--protocols where the sender sends one frame and then waits for acknowledgement. c) In this protocol, the contents of the acknowledgement frame are unimportant. d) Data transmission is one directional, but must have bidirectional line. Could have a half-duplex (one direction at a time) physical channel.
9 2.6.3 A simplex protocol for a noisy channel a) What if the channel is noisy and we can lose frames (checksum incorrect). b) Simple approach, add a time out to the sender so it retransmits after a certain period and retransmit the frame. c) Scenario of what could happen: A transmits frame one B receives A1 B generates ACK ACK is lost A times out, retransmits B gets duplicate copy (sending on to network layer) d) Use a sequence number. How many bits? 1-bit is sufficient because only concerned about two successive frames. e) Positive Acknowledgement with Retransmission (PAR)--sender waits for positive acknowledgement before advancing to the next data item.
10 2.7 SLIDING WINDOW PROTOCOL (Windowing): Sliding window is a technique for controlling transmitted data packets between two network computers where reliable and sequential delivery of data packets is required, such as when using the Data Link Layer (OSI model) or Transmission Control Protocol (TCP). In the sliding window technique, each data packet (for most data link layers) and byte (in TCP) includes a unique consecutive sequence number, which is used by the receiving computer to place data in the correct order. The objective of the sliding window technique is to use the sequence numbers to avoid duplicate data and to request missing data. It uses the concept of piggybacking. Instead of sending ack frame on its own, if there is an outgoing data frame in the next short interval, attach the ack to it (using "ack" field in header). Sliding window size 1. Sequence nos. 0 to 7. (a) At start. Receiver waits for 0. (b) Sender sends 0. (c) Receiver receives 0. Waits for 1. (d) Sender got ack for 0.
11 bit Sliding Window: (a) Normal Case: Notation (seq, ack, packet) Asterisk (*) delivered to Network layer. (b) Abnormal Case:
12 2.7.2 Go back N Protocol: a) Receiver B window size = 1 b) Discard all frames after error c) No ack - they will eventually get re-sent d) Can be lot of re-sends e) Wastes lot of bandwidth if error rate high.
13 2.7.3 Selective repeat Protocol: a) Receiver B window size = n b) Good frames after error are buffered (because can't send them to Network Layer NB yet, can't get rid of them) c) Bad frame 2 times out and is re-sent. d) At a timeout, sender A only sends the oldest un-ack-ed frame, not a sequence. e) Or (in figure) B sends a Negative Ack (NAK) to provoke a re-send of frame 2 instead of waiting for timeout - may improve performance. If you know it will timeout, why wait? f) Notice B doesn't ack 3-5 while it is buffering them. g) It sends back "Ack 1" which means "Everything ok up to and including 1". h) Once 2 gets through, B can send a whole bunch (2-5) to NB layer and can then jump to "Ack 5" ("Everything ok up to and including 5") 2.8 ERROR DETECTION: Single-bit error means that only one bit of given data unit (such as a byte, character, or data unit) is changed from 1 to 0 or from 0 to 1 Burst error means that two or more bits in the data unit have changed from 0 to 1 or vice-versa. There are four types of Error Detecting Codes: Simple Parity check, Two-dimensional Parity check, Checksum and Cyclic redundancy check Simple Parity check a) Commonly used technique for detecting a single flip Define the parity of a bit string w as the parity (even or odd) of the number of 1 s in the binary representation of w. b) If there are an even number of flips in transmission, the receiver gets a bit string with even parity
14 c) If there are an odd number of flips in transmission, the receiver gets a bit string with odd parity d) Thus errors in more than one bit cannot be detected Two-dimensional Parity check a) Assume each block of data to be encoded consists of mn bits b) View these bits as being arranged in an m n array (in row-major order, say) c) Compute m + n + 1 parity bits (One for each row, one for each column, and one for the whole message) d) Send mn + m + n + 1 bits (in some fixed order) a) If two bits in one data unit are damaged and two bits in exactly same position in another data unit are also damaged, the 2-D Parity check checker will not detect an error. For example, if two data units: and If first and second from last bits in each of them is changed, making the data units as and , the error cannot be detected by 2-D Parity check.
15 2.8.3 Checksum Cyclic redundancy check: If a k bit message is to be transmitted, the transmitter generates an r-bit sequence, known as Frame Check Sequence (FCS) so that the (k+r) bits are actually being transmitted. Now this r-bit FCS is generated by dividing the original number, appended by r zeros, by a predetermined number. This number, which is (r+1) bit in length, can also be considered as the coefficients of a polynomial, called Generator Polynomial. The remainder of this division process generates the r-bit FCS. On receiving the packet, the receiver divides the (k+r) bit (use modulo two subtractions only ) frame by the same predetermined number and if it produces no remainder, it can be assumed that no error has occurred during the transmission.
16 2.9 ERROR CORRECTION (Single Bit): Error Correction can be handled in two ways. One is when an error is discovered; the receiver can have the sender retransmit the entire data unit. This is known as backward error correction. In the other, receiver can use an error-correcting code, which automatically corrects certain errors. This is known as forward error correction. Basic approach for error detection by using Hamming code is as follows: a) To each group of m information bits k parity bits are added to form (m+k) bit code as shown in Figure b) Location of each of the (m+k) digits is assigned a decimal value.
17 c) The k parity bits are placed in positions 1, 2,, 2 k-1 positions. K parity checks are performed on selected digits of each codeword. d) At the receiving end the parity bits are recalculated. The decimal value of the k parity bits provides the bit-position in error, if any.
Data Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationOutline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.
EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationSRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of
More informationInst: Chris Davison
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of
More informationData link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection
2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow
More informationThe data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.
Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More informationCS422 Computer Networks
CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February
More informationDATA LINK LAYER UNIT 7.
DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationProblem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.
Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationJaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles
Jaringan Komputer The Data Link Layer Data Link Layer Study the design principles Algorithms for achieving reliable, efficient communication between two adjacent machines at the data link layer Adjacent
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More information1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.
/9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital
More informationData Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More informationData Communications. Automatic Repeat Request Medium Access Control
Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements
More information06/05/2008. Chapter 3. The Data Link Layer. Data Link Layer Design Issues. Services Provided to the Network Layer. Error Control Flow Control
Chapter 3 The Data Link Layer Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 1 Functions of the Data Link Layer Provide service interface to the
More informationCS 4453 Computer Networks Winter
CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session
More informationWilliam Stallings Data and Computer Communications. Chapter 7 Data Link Control
William Stallings Data and Computer Communications Chapter 7 Data Link Control Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time
More informationUNIT-II 1. Discuss the issues in the data link layer. Answer:
UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing
More informationLink layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction
More information3. Data Link Layer 3-2
3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link
More informationCOMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?
Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability
More informationET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data
More informationData Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class
Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different
More informationNetworking Link Layer
Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding
More informationChapter 5 Data-Link Layer: Wired Networks
Sungkyunkwan University Chapter 5 Data-Link Layer: Wired Networks Prepared by Syed M. Raza and H. Choo 2018-Fall Computer Networks Copyright 2000-2018 Networking Laboratory Chapter 5 Outline 5.1 Introduction
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationData Link Layer. Overview. Links. Shivkumar Kalyanaraman
Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction
More informationCSE 123: Computer Networks
Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationLecture 6 Datalink Framing, Switching. From Signals to Packets
Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationThe Data Link Layer. Data Link Layer Design Issues
The Data Link Layer Chapter 3 Data Link Layer Design Issues Network layer services Framing Error control Flow control 1 Packets and Frames Relationship between packets and frames. Network Layer Services
More informationOverview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer
Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control
More informationCourse Introduction. Purpose. Objectives. Content. Learning Time
Course Introduction Purpose This training course provides an overview of Message Frames and hardware issues of the Controller Area Network (CAN) technology used to build networked, multiprocessor embedded
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet
More informationFlow control: Ensuring the source sending frames does not overflow the receiver
Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis
More informationERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain
ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationToday. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?
Embedded networks Characteristics Requirements Simple embedded LANs Bit banged SPI I2C LIN Ethernet Last Time CAN Bus Intro Low-level stuff Frame types Arbitration Filtering Higher-level protocols Today
More informationUNIT II DATA LINK LAYER 10
UNIT II DATA LINK LAYER 10 Error detection and correction Parity LRC CRC Hamming code flow Control and Error control - stop and wait go back-n ARQ selective repeat ARQ- sliding window HDLC. - LAN - Ethernet
More informationComparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:
Comparison of ISO-OSI and TCP/IP Suit Functions of Data Link Layer: 1. Frame generation ( Character Count, Character Stuffing, Bit Stuffing) 2. Error Processing (Parity(EVEN or ODD), Block Parity, Hamming
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationDATA LINK LAYER: NEED
Page no: 1 Department of Computer Science and Engineering CS6004 Computer Networking Subject Notes: UNIT-II DATA LINK LAYER: NEED Data Link Layer is second layer of OSI Layered Model. This layer is one
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationCOMPUTER NETWORKS UNIT 3
COMPUTER NETWORKS UNIT 3 1. Illustrate about Reservation, Polling and Token Passing. [10 marks] Controlled access: In controlled access, the stations consult one another to find which station has the right
More informationLayer 2 functionality bridging and switching
Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How
More informationToken Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationUNIT II THE DATA LINK LAYER DESIGN ISSUES
Branch : CSE Subject : Computer Networks UNIT II Data link layer design issues Services - Framing - Error Control - Flow Control - Error detection and correction codes - data link layer protocols -Simplex
More informationCOMPUTER NETWORKS UNIT-3
COMPUTER NETWORKS UNIT-3 Syllabus: The Data Link Layer - Data Link Layer Design Issues, Services Provided to the Network Layer Framing Error Control Flow Control, Error Detection and Correction Error-Correcting
More informationData Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking
Data Link Layer Bharati Vidyapeeth s Institute of Computer Applications and Management,New Delhi-63 by Vishal Jain U2. 1 Learning Objectives To introduce the design issues of data link layer. To discuss
More informationAdvantages and disadvantages
Advantages and disadvantages Advantages Disadvantages Asynchronous transmission Simple, doesn't require synchronization of both communication sides Cheap, timing is not as critical as for synchronous transmission,
More informationData Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1
Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation
More informationData Link Control Protocols
Data Link Control Protocols need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error control addressing control and data link management Flow Control
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 2 Functions of the Data Link Layer Provide service interface to the
More informationINF Data Communication Data Link Layer
INF3190 - Data Communication Data Link Layer Carsten Griwodz Email: griff@ifi.uio.no most slides from: Ralf Steinmetz, TU Darmstadt and a few from Olav Lysne, J. K. Kurose og K. W. Ross Function, Services
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More information4. Error correction and link control. Contents
//2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.
More information1.Write about the Data Link layer design issues.
1.Write about the Data Link layer design issues. Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing a well-defined
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationChapter 6 Digital Data Communications Techniques
Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More informationChapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify
More informationCS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16
Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error
More informationECSE 414 Fall 2014 Final Exam Solutions
ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:
More informationLecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission
1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationData Link Layer (part 2)
Data Link Layer (part 2)! Question - What is a major disadvantage of asynchronous transmission? Reference: Chapters 6 and 7 Stallings Study Guide 6! Question - What is a major disadvantage of asynchronous
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationIntroduction to Data Communications & Networking
Introduction to Data Communications & Networking Data Link Layer (Set 5) Chapter 10 and Chapter 11 Dr. Ali Maqousi, Dr. Tatiana Balikhina amaqousi@uop.edu.jo, tbalikhina@uop.edu.jo Department of Computer
More informationCSC 4900 Computer Networks: The Link Layer
CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationPSD2A Computer Networks. Unit : I-V
PSD2A Computer Networks Unit : I-V 1 UNIT 1 Introduction Network Hardware Software Reference Models OSI and TCP/IP models Example networks: Internet, ATM, Ethernet and Wireless LANs Physical layer Theoretical
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationData Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More information