Jaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles

Size: px
Start display at page:

Download "Jaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles"

Transcription

1 Jaringan Komputer The Data Link Layer Data Link Layer Study the design principles Algorithms for achieving reliable, efficient communication between two adjacent machines at the data link layer Adjacent = two machines are connected by a communication channel that acts conceptually like a wire (e.g., a coaxial cable, telephone line, or point-topoint wireless channel) Essential: ''wirelike' = the bits are delivered in exactly the same order in which they are sent. 2

2 Data Link Layer Machine A just puts the bits on the wire, and machine B just takes them off? Communication circuits make errors occasionally They have only a finite data rate There is a nonzero propagation delay between the time a bit is sent and the time it is received These limitations have important implications for the efficiency of the data transfer. The protocols used for communications must take all these factors into consideration 3 Data Link Layer Protocols The nature of errors, their causes, and how they can be detected and corrected Series of increasingly complex protocols, each one solving more and more of the problems present in this layer Examination of protocol modeling and correctness Some examples of data link protocols 4

3 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 5 Functions Provide service interface to the network layer Dealing with transmission errors Regulating data flow Slow receivers not swamped by fast senders 6

4 Packet & Frame Data link layer takes packets from the network layer and encapsulates them into frames for transmission Each frame contains a frame header, a payload field for holding the packet, and a frame trailer Frame management forms the heart of what the data link layer does 7 Packet & Frame Relationship between packets and frames 8

5 Principles Many principles, such as error control and flow control, are found in transport and other protocols as well In many networks, these functions are found only in the upper layers and not in the data link layer The principles are pretty much the same In the data link layer they often show up in their simplest and purest forms, making this a good place to examine them in detail 9 Services Provided to Network Layer (a) Virtual communication. (b) Actual communication. 10

6 Services The data link layer can be designed to offer various services The actual services offered can vary from system to system 3 reasonable possibilities that are commonly provided are: Unacknowledged connectionless service Acknowledged connectionless service Acknowledged connection-oriented service 11 Unacknowledged connectionless service Properties Source machine send independent frames to the destination machine without having the destination machine acknowledge them No logical connection is established beforehand or released afterward If a frame is lost due to noise on the line, no attempt is made to detect the loss or recover from it in the data link layer 12

7 Use Unacknowledged connectionless service Appropriate when the error rate is very low (recovery is left to higher layers) Appropriate for real-time traffic, such as voice, in which late data are worse than bad data Most LANs use unacknowledged connectionless service in the data link layer 13 Acknowledged connectionless service Properties More reliable No logical connections Each frame sent is individually acknowledged. Use The sender knows whether a frame has arrived correctly. If it has not arrived within a specified time interval, it can be sent again. unreliable channels, such as wireless systems. 14

8 Connection-oriented service Establish a connection before data are transferred Each frame sent over the connection is numbered, and the data link layer guarantees that each frame sent is indeed received Each frame is received exactly once and that all frames are received in the right order Transfers go through three distinct phases: connection is established one or more frames are actually transmitted connection is released 15 Example Placement of the data link protocol. 16

9 Framing Data link layer use the service provided to it by the physical layer Physical layer is accept a raw bit stream and attempt to deliver it to the destination This bit stream is not guaranteed to be error free The number of bits received may be less than, equal to, or more than the number of bits transmitted, and they may have different values It is up to the data link layer to detect and, if necessary, correct errors 17 Framing Approach for error Data link layer break the bit stream up into discrete frames and compute the checksum for each frame When a frame arrives at the destination, the checksum is recomputed If the newly-computed checksum is different from the one contained in the frame, the data link layer knows that an error has occurred and takes steps to deal with discarding the bad frame sending back an error report 18

10 Framing Possible way: insert time gaps between frames, much like the spaces between words in ordinary text. Networks rarely make any guarantees about timing - too risky to count on timing to mark the start and end of each frame Other methods have been devised: Character count Flag bytes with byte stuffing Starting and ending flags, with bit stuffing Physical layer coding violations 19 Character Count Idea: specify the number of characters in the frame Problem: the count can be garbled by a transmission error A character stream. (a) Without errors. (b) With one error. 20

11 Flag bytes with byte/character stuffing (esc sequence) (a) A frame delimited by flag bytes. (b) Four examples of byte sequences before and after stuffing (flag & esc byte's bit pattern occurs in the data 21 Starting and ending flags, with bit stuffing To allow arbitrary sized characters (not 8 bits) Each frame begins and ends with a special bit pattern, (in fact, a flag byte) Whenever sender encounters five consecutive 1s, it automatically stuffs a 0 bit into the bit stream When the receiver sees five consecutive incoming 1 bits, followed by a 0 bit, it automatically destuffs (i.e., deletes) the 0 bit Boundary between two frames can be unambiguously recognized by the flag pattern 22

12 Starting and ending flags, with bit stuffing Bit stuffing (a) The original data. (b) The data as they appear on the line. (c) The data as they are stored in receiver s memory after destuffing. 23 Error Control How to make sure all frames are delivered to the network layer at the destination in the proper order Feedback (acknowledgement) Timers (case for lost frame) Sequence number (case for retransmission) 24

13 Flow Control What to do with a sender that wants to transmit frames faster than the receiver can accept them feedback-based flow control: the receiver sends back information to the sender giving it permission to send more data rate-based flow control: built-in mechanism that limits the rate at which senders may transmit data 25 Error Detection and Correction How to deal with transmission errors Error-Correcting Codes Error-Detecting Codes Errors on some media (e.g., radio) tend to come in bursts rather than singly Advantage side: data are always sent in blocks of bits Disadvantage: much harder to correct 26

14 Error-Correcting Codes Include enough redundant information along with each block of data sent, to enable the receiver to deduce what the transmitted data must have been Often referred to as forward error correction On channels such as wireless links that make many errors, it is better to add enough redundancy to each block for the receiver to be able to figure out what the original block was, rather than relying on a retransmission, which itself may be in error 27 Parity Bit added to guarantee there is no error on received bit Even parity Odd parity Will detect single bit error Will not detect two-bits error 28

15 Hamming code Codeword: n-bit unit m data bits and r redundant check bits (n=m+r) Hamming Distance: number of difference bit in 2 codewords (simply using XOR) Example: XOR = , HD = 3 To detect n errors, a coding schema with Hamming distance of n+1 must be used To correct n error, a coding schema with Hamming distance of 2n+1 must be used 29 Principles Hamming code Bits of codeword are numbered, bit 1 at the left end Bits that powers of 2 (1, 2, 4, 8, 16, etc.) are check bits The rest (3, 5, 6, 7, 9, etc.) filled up with m data bits Each check bit forces the parity of some collection of bits, including itself, to be even (or odd) To see which check bits the data bit in position k contributes to, rewrite k as a sum of powers of 2 example, 11 = Bit is checked by check bits occurring in its expansion bit 11 is checked by bits 1, 2, and 8 30

16 Hamming code Using 4 bit check code to code 7-bit ASCII code, known as (11,7) block code Code rate = 7/11 Redundancy = 1 7/11 Example for 7 bit value of bits are: 100x110x1xx Bits 1 are in position 11 (1011),7(0111),6(0110) and 3(0011) xxxx bits are modulo 2 sum of 11,7,6, and 3 that is 1001 The transmitted codeword: Hamming code At the receiver all bit 1 position are added, and the modulo 2 sum must be zero ( ) mod 2 = 0000 Consider bit 11 is corrupted from 1 to 0, the modulo 2 sum would be ( ) mod 2 = 1011 Not zero 1011 = 11, which means bit in position 11 is error Can correct single bit error and detect two-bits error Cannot detect other multiple-bit error 32

17 Error-Correcting Codes Use of a Hamming code to correct burst errors 33 Error Detecting Code Over copper wire or fiber, the error rate is much lower - error detection and retransmission is more efficient Parity bit Polynomial code a.k.a. CRC (Cyclic Redundancy Check 34

18 CRC Treating bit strings as representations of polynomials with coefficients of 0 and 1 only has 6 bits and thus represents a six-term polynomial with coefficients 1, 1, 0, 0, 0, and 1: x 5 + x 4 + x 0 Sender and receiver must agree upon a generator polynomial, G(x), in advance The idea is to append a checksum to the end of the frame that the polynomial represented by the checksummed frame is divisible by G(x) When the receiver gets the checksummed frame, it tries dividing it by G(x). If there is a remainder, there has been a transmission error 35 CRC The algorithm for computing the checksum: Let r be the degree of G(x). Append r zero bits to the low-order end of the frame so it now contains m + r bits and corresponds to the polynomial x r M(x). Divide the bit string corresponding to G(x) into the bit string corresponding to x r M(x), using modulo 2 division. Subtract the remainder (which is always r or fewer bits) from the bit string corresponding to x r M(x) using modulo 2 subtraction. The result is the checksummed frame to be transmitted. Call its polynomial T(x). 36

19 CRC Calculation of the polynomial code checksum 37 Elementary Data Link Protocols An Unrestricted Simplex Protocol A Simplex Stop-and-Wait Protocol A Simplex Protocol for a Noisy Channel 38

20 An Unrestricted Simplex Protocol A protocol that is as simple as it can be Data are transmitted in one direction only Both the transmitting and receiving network layers are always ready Processing time can be ignored Infinite buffer space is available The communication channel between the data link layers never damages or loses frames 39 A Simplex Stop-and-Wait Protocol The receiving network layer unable to process incoming data infinitely quickly No infinite amount of buffer space to store all incoming frames How to prevent the sender from flooding the receiver with data faster than the latter is able to process them sender simply insert a delay to slow it down sufficiently to keep from swamping the receiver receiver provide feedback to the sender 40

21 A Simplex Protocol for a Noisy Channel Frames may be either damaged or lost completely If frame is damaged in transit, the receiver hardware will detect this when it computes the checksum Sender put a sequence number in the header of each frame it sends, then the receiver can check the sequence number of each arriving frame to see if it is a new frame or a duplicate to be discarded Sender waits for a positive acknowledgement before advancing to the next data item Called PAR (Positive Acknowledgement with Retransmission) or ARQ (Automatic Repeat request). 41 Sliding Window Protocols A One-Bit Sliding Window Protocol A Protocol Using Go Back N A Protocol Using Selective Repeat 42

22 Sliding Window Protocols At any instant of time: the sender maintains a set of sequence numbers corresponding to frames it is permitted to send. the receiver also maintains a receiving window corresponding to the set of frames it is permitted to accept Deliver all frames in the order sent 43 Sliding Window Protocols Frames may be lost or damaged in transit Sender must keep all these frames in its memory for possible retransmission If the maximum window size is n, the sender needs n buffers to hold the unacknowledged frames If the window ever grows to its maximum size, the sending data link layer must forcibly shut off the network layer until another buffer becomes free 44

23 Sliding Window Protocols At receiver window, any frame falling outside the window is discarded without comment When a frame whose sequence number is equal to the lower edge of the window is received, it is passed to the network layer, an acknowledgement is generated, and the window is rotated by one Receiver's window always remains at its initial size Note that a window size of 1 means that the data link layer only accepts frames in order, but for larger windows this is not so The network layer, in contrast, is always fed data in the proper order, regardless of the data link layer's window size 45 Sliding Window Protocols A sliding window of size 1, with a 3-bit sequence number. (a) Initially. (b) After the first frame has been sent. (c) After the first frame has been received. (d) After the first acknowledgement has been received. 46

24 One-Bit Sliding Window Protocol Uses stop-and-wait since the sender transmits a frame and waits for its acknowledgement before sending the next one For sequence number, 0 and 1 are the only possibilities 47 One-Bit Sliding Window Protocol 48

25 One-Bit Sliding Window Protocol 3/14/ One-Bit Sliding Window Protocol - example Computer A is trying to send its frame 0 to computer B and B is trying to send its frame 0 to A Suppose that A's timeout interval is a little too short Consequently, A may time out repeatedly, sending a series of identical frames, all with seq = 0 and ack = 1 When first valid frame arrives at computer B, it will be accepted and frame_expected will be set to 1 All the subsequent frames will be rejected because B is now expecting frames with sequence number 1, not 0 Since all the duplicates have ack = 1 and B is still waiting for an acknowledgement of 0, B will not fetch a new packet from its network layer. 50

26 One-Bit Sliding Window Protocol - example After every rejected duplicate comes in, B sends A a frame containing seq = 0 and ack = 0 Eventually, one of these arrives correctly at A, causing A to begin sending the next packet No combination of lost frames or premature timeouts can cause the protocol to deliver duplicate packets to either network layer, to skip a packet, or to deadlock. 51 One-Bit Sliding Window Protocol - abnormal Two scenarios for protocol 4. (a) Normal case. (b) Abnormal case. The notation is (seq, ack, packet number). An asterisk indicates where a network layer accepts a packet 52

27 Pipelining Transmission time is not negligible Long round-trip time can have important implications for the efficiency of the bandwidth utilization By allowing the sender to transmit up to w frames before blocking, instead of just 1 (pipelining) If the bandwidth is high, even for a moderate delay, sender will exhaust its window quickly unless it has a large window If the delay is high the sender will exhaust its window even for a moderate bandwidth These two factors tells what the capacity of the pipe is 53 Pipelining Pipelining frames over an unreliable communication channel raises some serious issues What happens if a frame in the middle of a long stream is damaged or lost? Large numbers of succeeding frames will arrive at the receiver before the sender even finds out that anything is wrong. When a damaged frame arrives at the receiver, it obviously should be discarded, but what should the receiver do with all the correct frames following it? Remember that the receiving data link layer is obligated to hand packets to the network layer in sequence 54

28 Pipelining Pipelining and error recovery. Effect on an error when (a) Receiver s window size is 1. (b) Receiver s window size is large. 55 Protocol Using Go Back N Dealing with errors in the presence of pipelining The receiver discard all subsequent frames, sending no acknowledgements for the discarded frames Corresponds to a receive window of size 1 If the sender's window fills up before the timer runs out, the pipeline will begin to empty Eventually, the sender will time out and retransmit all unacknowledged frames in order, starting with the damaged or lost one This approach can waste a lot of bandwidth if the error rate is high 56

29 Selective Repeat Bad frame that is received is discarded, but good frames received after it are buffered When the sender times out, only the oldest unacknowledged frame is retransmitted If that frame arrives correctly, the receiver can deliver to the network layer, in sequence, all the frames it has buffered Often combined with having the receiver send NAK when it detects an error NAKs stimulate retransmission before the corresponding timer expires and thus improve performance 57 Protocol Verification Realistic protocols and the programs that implement them are often quite complicated Need to find formal, mathematical techniques for specifying and verifying protocols using some models and techniques Models: Finite State Machined Models Petri Net Models 58

30 Finite State Machine Models Each protocol machine (i.e., sender or receiver) is always in a specific state at every instant of time Its state consists of all the values of its variables, including the program counter The state of the complete system is the combination of all the states of the two protocol machines and the channel The state of the channel is determined by its contents From each state, there are zero or more possible transitions to other states Initial state corresponds to the description of the system when it starts running 59 Finite State Machine Models Formally, a finite state machine model of a protocol can be regarded as a quadruple (S, M, I, T): S: set of states the processes and channel can be in M: set of frames that can be exchanged over channel I: set of initial states of the processes. T: set of transitions between states Reachability analysis can be used to detect a variety of errors: Incompleteness (in the protocol specification) Deadlock (a situation in which the protocol can make no more forward progress) Extraneous transition (event cannot occur) 60

31 Finite State Machine Models Simplified protocol 3. unreachable state and checksum errors are ignored here for simplicity (a) State diagram (b) Transmissions. 61 Finite State Machine Models Each state is labeled by SRC S is 0 or 1, correspond to frame sender try to send R is 0 or 1, correspond to frame the receiver expects C is 0, 1, A, or empty ( ), correspond to state of channel Initial state is (000) sender has just sent frame 0 receiver expects frame 0 frame 0 is currently on the channel 62

32 Finite State Machine Models Example of total 9 transitions: Transition 0: channel losing its contents Transition 1: channel correctly delivering packet 0 to the receiver, receiver then expect frame 1 and emitting an acknowledgement During normal operation, transitions 1, 2, 3, and 4 are repeated in order over and over Transition 7: eventually, the sender times out and the system moves back to (000) The loss of an acknowledgement is more complicated, requiring two transitions, 7 and 5, or 8 and 6, to repair the damage 63 Petri Net Models Has four basic elements: Places: represents a state which (part of) the system may be in Transitions: indicated by a horizontal or vertical bar Arcs: each transition has zero or more input arcs coming from its input places, and zero or more output arcs, going to its output places Tokens: a transition is enabled if there is at least one input token in each of its input places. Enabled transition may fire at will, removing one token from each input place and depositing a token in each output place 64

33 Petri Net Models A Petri net with two places and two transitions. 65 Petri Net Models A Petri net model for protocol 3 66

34 Petri Net Models Transitions 1 and 2 correspond to transmission of frame 0 by the sender, normally, and on a timeout respectively Transitions 3 and 4 are analogous for frame 1 Transitions 5, 6, and 7 correspond to the loss of frame 0, an acknowledgement, and frame 1, respectively Transitions 8 and 9 occur when a data frame with the wrong sequence number arrives at the receiver Transitions 10 and 11 represent the arrival at the receiver of the next frame in sequence and its delivery to the network layer 67 Petri Net Models Can be represented in convenient algebraic form resembling a grammar Each transition contributes one rule to the grammar Each rule specifies the input and output places of the transition 1: BD AC 2: A A 3: AD BE 4: B B 5: C 6: D 7: E 8: CF DF 9: EG DG 10: CG DF 11: EF DG 68

35 Example Data Link Protocols HDLC High-Level Data Link Control: classical bit-oriented protocol Its variants have been in use for decades in many applications The Data Link Layer in the Internet PPP The Point-to-Point Protocol 69 High-Level Data Link Control Bit oriented use bit stuffing for data transparency History: Derived from the data link protocol first used in the IBM mainframe world: SDLC (Synchronous Data Link Control) protocol ANSI modified it to become ADCCP (Advanced Data Communication Control Procedure ISO modified it to become HDLC CCITT then adopted and modified HDLC for its LAP (Link Access Procedure) as part of the X.25 70

36 High-Level Data Link Control Frame format for bit-oriented protocols. 71 High-Level Data Link Control Control field is used for sequence numbers, acknowledgements, and other purposes Data field may contain any information. It may be arbitrarily long. Checksum field is a cyclic redundancy code Frame is delimited with another flag sequence ( ). On idle point-to-point lines, flag sequences are transmitted continuously Minimum frame contains three fields and totals 32 bits, excluding the flags on either end 72

37 High-Level Data Link Control Control field of (a) An information frame. (b) A supervisory frame. (c) An unnumbered frame. 73 High-Level Data Link Control Uses a sliding window, with a 3-bit sequence number Seq field is the frame sequence number Next field is a piggybacked acknowledgement instead of piggybacking the number of the last frame received correctly, they use the number of the first frame not yet received (i.e., the next frame expected) P/F: Poll/Final. Used when a computer is polling a group of terminals Computer is inviting the terminal to send data. All frames sent by the terminal, except the final one, have the P/F bit set to P The final one is set to F 74

38 The Data Link Layer in the Internet A home personal computer acting as an internet host 75 PPP PPP Point to Point Protocol Defined in RFC 1661, Further elaborated on in several other RFCs (e.g., RFCs 1662 and 1663). Handles error detection, supports multiple protocols, allows IP addresses to be negotiated at connection time, permits authentication 3 features: Framing method (+ error detection) Link Control Protocol (LCP): bring up, test, negotite options, and bring down Have different NCP (Network Control Protocol) for each network layer supported 76

39 PPP Point to Point Protocol The PPP full frame format for unnumbered mode operation PPP frame is based on HDLC, but character oriented 77 PPP Point to Point Protocol A simplified phase diagram for bring a line up and down 78

40 PPP Point to Point Protocol The LCP frame types 79 Summary Data link layers Task: convert the raw bit stream offered by the physical layer into a stream of frames for use by the network layer Framing method: character count, bit/byte stuffing Error Control: detect & retransmit, correct Flow Control: sliding window (6 protocol variants) 80

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 2 Functions of the Data Link Layer Provide service interface to the

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review. EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error

More information

Inst: Chris Davison

Inst: Chris Davison ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of

More information

1.Write about the Data Link layer design issues.

1.Write about the Data Link layer design issues. 1.Write about the Data Link layer design issues. Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing a well-defined

More information

06/05/2008. Chapter 3. The Data Link Layer. Data Link Layer Design Issues. Services Provided to the Network Layer. Error Control Flow Control

06/05/2008. Chapter 3. The Data Link Layer. Data Link Layer Design Issues. Services Provided to the Network Layer. Error Control Flow Control Chapter 3 The Data Link Layer Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control 1 Functions of the Data Link Layer Provide service interface to the

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1, CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet

More information

Networking Link Layer

Networking Link Layer Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction

More information

3. Data Link Layer 3-2

3. Data Link Layer 3-2 3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link

More information

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames. Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept

More information

Introduction to Data Communications & Networking

Introduction to Data Communications & Networking Introduction to Data Communications & Networking Data Link Layer (Set 5) Chapter 10 and Chapter 11 Dr. Ali Maqousi, Dr. Tatiana Balikhina amaqousi@uop.edu.jo, tbalikhina@uop.edu.jo Department of Computer

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

DATA LINK LAYER UNIT 7.

DATA LINK LAYER UNIT 7. DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission

More information

The Data Link Layer. Data Link Layer Design Issues

The Data Link Layer. Data Link Layer Design Issues The Data Link Layer Chapter 3 Data Link Layer Design Issues Network layer services Framing Error control Flow control 1 Packets and Frames Relationship between packets and frames. Network Layer Services

More information

Data Link Layer. Indian Institute of Technology Madras

Data Link Layer. Indian Institute of Technology Madras Data Link Layer Study of algorithms for achieving reliable, efficient communication between two adjacent machines at DLL. adjacent - two machines physically connected using a communication channel that

More information

Lesson Schedule: Class No. Portion covered per hour (An estimate)

Lesson Schedule: Class No. Portion covered per hour (An estimate) Chapter -3: The Data Link Layer 1 Slide 29: Contents Lesson Schedule: Class No. Portion covered per hour (An estimate) 1. Data Link Layer Design Issues Dates Planned Engaged 2. Error detecting codes 3.

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination Data Link Protocols Data Link Services Connection-less services Functions of a Data Link Protocol Framing PDUs ing Destination Error Detection / Error Recovery Link Management Ethernet (covered elsewhere)

More information

Data Link layer (CN chap 3.1, 3.4, 3.6)

Data Link layer (CN chap 3.1, 3.4, 3.6) Data Link layer (CN chap 3.1, 3.4, 3.6) The OSI model an old friend... Application Presentation Session Transport Network Data link Physical F.eks. ftp, mail, http,... handles data structures and conversion

More information

INF Data Communication Data Link Layer

INF Data Communication Data Link Layer INF3190 - Data Communication Data Link Layer Carsten Griwodz Email: griff@ifi.uio.no most slides from: Ralf Steinmetz, TU Darmstadt and a few from Olav Lysne, J. K. Kurose og K. W. Ross Function, Services

More information

Introduction to Computer Networks. 03 Data Link Layer Introduction

Introduction to Computer Networks. 03 Data Link Layer Introduction Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple

More information

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology

More information

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. TYPES OF ERRORS There are two types of errors, 1. Single Bit Error The term single-bit error

More information

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16 Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data

More information

UNIT-II 1. Discuss the issues in the data link layer. Answer:

UNIT-II 1. Discuss the issues in the data link layer. Answer: UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing

More information

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection 2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow

More information

Flow control: Ensuring the source sending frames does not overflow the receiver

Flow control: Ensuring the source sending frames does not overflow the receiver Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each

More information

Data Link Layer (1) Networked Systems 3 Lecture 6

Data Link Layer (1) Networked Systems 3 Lecture 6 Data Link Layer (1) Networked Systems 3 Lecture 6 Purpose of Data Link Layer Arbitrate access to the physical layer Structure and frame the raw bits Provide flow control Detect and correct bit errors Perform

More information

COMPUTER NETWORKS UNIT-3

COMPUTER NETWORKS UNIT-3 COMPUTER NETWORKS UNIT-3 Syllabus: The Data Link Layer - Data Link Layer Design Issues, Services Provided to the Network Layer Framing Error Control Flow Control, Error Detection and Correction Error-Correcting

More information

DLL: Flow Control DLL. Simplex. Fast sender / slow receiver scenario. Various protocols used. Simplified examples implemented in C.

DLL: Flow Control DLL. Simplex. Fast sender / slow receiver scenario. Various protocols used. Simplified examples implemented in C. DLL: Flow Control Fast sender / slow receiver scenario Feedback mechanism reqd. Various protocols used Stop and Wait Sliding window protocols Hugh Melvin, Dept. of IT, NUI,G 1 DLL Simplified examples implemented

More information

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer: Comparison of ISO-OSI and TCP/IP Suit Functions of Data Link Layer: 1. Frame generation ( Character Count, Character Stuffing, Bit Stuffing) 2. Error Processing (Parity(EVEN or ODD), Block Parity, Hamming

More information

The flow of data must not be allowed to overwhelm the receiver

The flow of data must not be allowed to overwhelm the receiver Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before

More information

Data Link Control Protocols

Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error control addressing control and data link management Flow Control

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols 16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use

More information

DATA LINK LAYER: NEED

DATA LINK LAYER: NEED Page no: 1 Department of Computer Science and Engineering CS6004 Computer Networking Subject Notes: UNIT-II DATA LINK LAYER: NEED Data Link Layer is second layer of OSI Layered Model. This layer is one

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that

More information

ET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not CS475 Networks Lecture 5 Chapter 2: Direct Link Networks Assignments Reading for Lecture 6: Sections 2.6 2.8 Homework 2: 2.1, 2.4, 2.6, 2.14, 2.18, 2.31, 2.35. Due Thursday, Sept. 15 2.4 Error Detection

More information

CSE 123: Computer Networks

CSE 123: Computer Networks Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:

More information

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

Lecture / The Data Link Layer: Framing and Error Detection

Lecture / The Data Link Layer: Framing and Error Detection Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start

More information

Chapter 5 Data-Link Layer: Wired Networks

Chapter 5 Data-Link Layer: Wired Networks Sungkyunkwan University Chapter 5 Data-Link Layer: Wired Networks Prepared by Syed M. Raza and H. Choo 2018-Fall Computer Networks Copyright 2000-2018 Networking Laboratory Chapter 5 Outline 5.1 Introduction

More information

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1 Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter

More information

Physical and Data Link layers

Physical and Data Link layers Physical and Data Link layers Youki Kadobayashi Graduate School of Science Nara Institute of Science and Technology Physical Layer All rights reserved. 2 Types of transmission medium! Cables Optical fiber

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:

More information

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) Data Link Control Contents Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility) 2 Flow Control Flow control is a technique for assuring that a transmitting entity

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

Computer Networking : Principles, Protocols and Practice

Computer Networking : Principles, Protocols and Practice Computer Networking : Principles, Protocols and Practice Part 3 : Transport Layer Olivier Bonaventure http://inl.info.ucl.ac.be/ O. Bonaventure 2008 Basics Module 3 : Transport Layer Building a reliable

More information

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat

More information

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002 EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise

More information

Telecommunication Protocols Laboratory Course

Telecommunication Protocols Laboratory Course Telecommunication Protocols Laboratory Course G721 Lecture 1 Behind the name Telecommunication: the science and technology of transmitting information (words, sounds, images) over great distances, in the

More information

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For

More information

Where we are in the Course

Where we are in the Course Link Layer Where we are in the Course Moving on up to the Link Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Scope of the Link Layer Concerns how to transfer messages

More information

Chapter 3 The Data Link Layer

Chapter 3 The Data Link Layer Chapter 3 The Data Link Layer 陳瑞奇 (Rikki) 亞洲大學資訊工程學系 Adapted from Computer Networks, Andrew S. Tanenbaum, Vrije University, Netherlands & Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross

More information

Data Link Layer, Part 4. Exemplary Protocols

Data Link Layer, Part 4. Exemplary Protocols CS 455 Examplary DLL Protocols, Page 1 Data Link Layer, Part 4 Exemplary Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Data Link Control. Outline. DLC functions

Data Link Control. Outline. DLC functions Data Link Control #8 1 Outline functions Framing Error and flow control Performance of Example of a standard protocol- >H Open loop flow control 2 Data Link Layer Functions Data Link layer provides a error

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution

More information

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments 19531 - Telematics 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 18. November, 2010 Institute

More information

PART III. Data Link Layer MGH T MGH C I 204

PART III. Data Link Layer MGH T MGH C I 204 PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control

More information

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure Computer Networking Reliable Transport Prof. Andrzej Duda duda@imag.fr Reliable Transport Reliable data transfer Data are received ordered and error-free Elements of procedure usually means the set of

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst EITF25 Internet Techniques and Applications L3: Data Link layer Stefan Höst Communication on physical layer To transmit on the physical medium use signals At each computer it can be seen as transmitting

More information

CSE123A discussion session

CSE123A discussion session CSE123A discussion session 2007/02/02 Ryo Sugihara Review Data Link layer (1): Overview Sublayers End-to-end argument Framing sublayer How to delimit frame» Flags and bit stuffing Topics Data Link Layer

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

CSCI-1680 Link Layer Reliability John Jannotti

CSCI-1680 Link Layer Reliability John Jannotti CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

CSE123A discussion session

CSE123A discussion session CSE23A discussion session 27/2/9 Ryo Sugihara Review Data Link Layer (3): Error detection sublayer CRC Polynomial representation Implementation using LFSR Data Link Layer (4): Error recovery sublayer Protocol

More information

C08a: Data Link Protocols

C08a: Data Link Protocols CISC 7332X T6 C08a: Data Link Protocols Hui Chen Department of Computer & Information Science CUNY Brooklyn College 10/16/2018 CUNY Brooklyn College 1 Data Link Layer Responsible for delivering frames

More information

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

William Stallings Data and Computer Communications. Chapter 7 Data Link Control William Stallings Data and Computer Communications Chapter 7 Data Link Control Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview First of four classes on the data link layer Internet Architecture Bottom up: Physical: electromagnetic signals on the wire Link: data transfer between neighboring network elements

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview First of four classes on the data link layer 9/9/2009 CSC 257/457 - Fall 2009 1 Internet Architecture Bottom-up: physical: electromagnetic signals on the wire link: data transfer

More information

Transmission SIGNALs

Transmission SIGNALs Chapter 6 Digital Communications Basics 6.1 Introduction 6.2 Transmission media 6.3 Source of signal impairment 6.4 Asynchronous Transmission 6.5 Synchronous Transmission 6.6 Error Detection Methods 6.7

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

NWEN 243. Networked Applications. Layer 4 TCP and UDP

NWEN 243. Networked Applications. Layer 4 TCP and UDP NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Packet/Frame, Error Detection How to send data efficiently & reliably?

Packet/Frame, Error Detection How to send data efficiently & reliably? Packet/Frame, Error Detection How to send data efficiently & reliably? Packet and Packet Communication - Shared Network Resource, Fairness, Reliability Frame - Byte Oriented Frame and Bit Oriented Frame

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important

More information

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check. Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced

More information