CS 455. Week Data Communications and Networking - Behrouz A Forouzan Edition: 4.

Size: px
Start display at page:

Download "CS 455. Week Data Communications and Networking - Behrouz A Forouzan Edition: 4."

Transcription

1 CS 455 Week 15 Reading: 1. Data Communications and Networking - Behrouz A Forouzan Edition: 4. Objectives: 1. To implement and present the concepts described in the Project Description. Concepts: 1. Project Presentation Outline: 1. Project Presentation a. Application Layer b. Data Link Layer c. TX/RX Layer d. Circuit Layer References: 1. See the assigned text book. CS 455 Week 15 Page 1

2 CS 455 Week 15 Lecture Notes 1. Application Layer Application layer provides a user interface, which has 11 menu items (or functions): 1. Set Timer 2. Set frame size 3. Enter messages or Load text les 4. Idle RQ (Non-error) 4 ( ) 5. Idle RQ - Implicit I-frame error 6. Idle RQ - Implicit ACK-frame error 7. Idle RQ - Explicit I-frame error 8. Idle RQ - Explicit NAK-frame error 9. Continuous RQ - Non-error 10. Continuous RQ - Corrupted I-frame 11. Exit Menu 1 Set Timer Set how long a timer will expire Use actual time (e.g. msec) Menu 2 Set frame size Set how many bytes of data in one I frame Default: 1/3 of the length of the message Menu 3 Input Messages Enter messages to be sent Or load TXT file as message Menu 4 10 Simulations Simulate different errors for communication protocols Once any menu is selected, communication between both sides will start, following the rules of selected menu Message can only be sent in frame o Default frame size is 1/3 of the message or loaded file o Primary need to send multiple frames to Secondary Menu 4 Idle RQ (Non-error mode) Here, the program simulates non error mode of Idle RQ (no I-Frame, ACK or NACK frame is corrupted or missing) CS 455 Week 15 Page 2

3 Menu 5 and 6. Implicit error mode Simulate implicit Idle RQ protocol In these two simulations, S (secondary) send ACK back only if correctly received frames. S never sends NACK back to P. No ACK indicates corrupted frames P (Primary) re-sent if there is no ACK within a timer limit Menu 5. Implicit I-Frame error mode S does receive a frame, however some bits (flag) of the flame will indicate this frame is lost or wrong. So S does nothing. Menu 6. Implicit ACK error mode Notice: P does receive ACK(N), however there are some bits (flag) in the ACK(N) message will indicate this ACK is lost or malfunction (e.g., become a NACK). Menu 7 and 8. Explicit error mode These two menus simulate explicit Idle RQ protocol o In these two simulations, S (secondary) send ACK back only if correctly received frames. If not correctly received, S sends NACK back to P. o NACK indicates corrupted frames o P (Primary) resent the frames if it received a NACK Menu 7. Explicit I-frame error mode S does receive a frame, however some bits (flag) of the flame will indicate this frame is corrupted or not. If it is corrupted then S sends NACK. CS 455 Week 15 Page 3

4 Menu 8. Explicit NACK error mode While S sending NACK back to P, the NACK is corrupted. o Design and implement your mode o Provide your mechanism in document o Handle as many error cases as possible. For example: NACK lost; NACK malfunction. Menu 9 and 10. Continuour RQ For these two simulations, data link layer needs to maintain a retransmission list. o Menu 9 : See Lecture notes o Menu 10 : Use selective repeat Other Menus Menu 11 terminates the client-side program If necessary, you should add your own menus o For example, to set corrupted I-frame number or to select error type 2. Data Link Layer Thru application layer, user specify: protocol, error mode, message, etc. Data link layer fill these information into an package, before it is transmitted. So, in data link layer o Define format of IFrame, ACK frame, NACK frame o Write down your definition into document in details and indicate the function of each bit in your message CS 455 Week 15 Page 4

5 Both Primary and Secondary should log all the events (operations) into log file. For example, Primary side(file: client_log): Menu 3, timer duration of 2, corrupted frame number 2 4 (total # of frames receive) >> Send I-frame N(S) = 1 << Receive ACK-frame N(R) = 1 Wait idle time 1 Expire timer idle time 2 and timer is expired. << Receive ACK-frame N(R) = 2 >> Send I-frame N(S) = 3 << Receive ACK-frame N(R) = 3 Secondary side (file server_log) E.g.: Menu 3, timer duration is 2 seconds, corrupted frame number is 2 << Receive I-frame N(S) = 1 >> Send ACK-frame N(R) = 1 << Receive I-frame N(S) = 2 (Frame lost/wrong, do nothing) << Receive I-frame N(S) = 2 >> Send ACK-frame N(R) = 2 << Receive I-frame N(S) = 3 >> Send ACK-frame N(R) = 3 3. TX/RX and Circuit Layer TX/RX Layer o TX (transmitter) puts data into circuit layer o RX (receiver) retrieves data from circuit layer Circuit Layer o Circuit layer simulates a physical circuit, there is no physical circuit in this project. o You should use sockets to implement the communication between the primary and the secondary Test Case Example To test menu 5: Start Server (Secondary) First. Start Client (Primary), connect with S. CS 455 Week 15 Page 5

6 1. Set Timer 2 (here use second as an example) 2. Set frame size 20 (default byte) 3. Select Implicit Iframe error mode 4. Input Message: This project is to simulate the error control! 5. Press send button or press enter key on the keyboard 6. Check expected results on both sides Results at Server Side Contents of File data This project is to simulate the error control! Contents of File server_log Simulating: Idle RQ Implicit I-frame error << Receive I-frame N(S) = 1 >> Send ACK-frame N(R) = 1 << R i Receive I-frame N(S) = 2 (Frame lost/wrong) << Receive I-frame N(S) = 2 >> Send ACK-frame N(R) = 2 << Receive I-frame N(S) = 3 >> Send ACK-frame N(R) = 3 3 (total # of frames receive) Results at Client Side Contents of File client_log Simulating: Idle RQ Implicit I-frame error 3 (total # of frames will be sent) >> Send I-frame N(S) = 1 << Receive ACK-frame N(R) = 1 >> idle time 1 >> Expire timer idle time 2 and timer is expired. << Receive ACK-frame N(R) = 2 >> Send I-frame N(S) = 3 << Receive ACK-frame N(R) = 3 CS 455 Week 15 Page 6

10.1 REVIEW QUESTIONS

10.1 REVIEW QUESTIONS CHAPTER 10 Data Link Control 10.1 REVIEW QUESTIONS 1. Transmission means to put a signal on a line. Communication is a meaningful and orderly relationship between devices that send and receive data. 3.

More information

CS 421: Computer Networks SPRING MIDTERM I April 7, minutes

CS 421: Computer Networks SPRING MIDTERM I April 7, minutes CS 421: Computer Networks SPRING 24 MIDTERM I April 7, 24 12 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 1 msec one-way propagation delay. We want to transfer a file of size 8

More information

Lecture 26: Data Link Layer

Lecture 26: Data Link Layer Introduction We have seen in previous lectures that the physical layer is responsible for the transmission of row bits (Ones and Zeros) over the channel. It is responsible for issues related to the line

More information

The Transport Layer Reliability

The Transport Layer Reliability The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

Outline. CS5984 Mobile Computing

Outline. CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important

More information

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Link Layer Fundamentals of Communication Networks Data Link layer o It is the first logical layer in the protocol stack o Functions

More information

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols

16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols 16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each

More information

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H... 1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:

More information

Reliable Transport : Fundamentals of Computer Networks Bill Nace

Reliable Transport : Fundamentals of Computer Networks Bill Nace Reliable Transport 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administration Stuff is due HW #1

More information

The flow of data must not be allowed to overwhelm the receiver

The flow of data must not be allowed to overwhelm the receiver Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before

More information

Chapter 7: Data Link Control. Data Link Control Protocols

Chapter 7: Data Link Control. Data Link Control Protocols Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error

More information

Chapter 7: Data Link Control. CS420/520 Axel Krings Page 1

Chapter 7: Data Link Control. CS420/520 Axel Krings Page 1 Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error

More information

Lecture 11 Overview. Last Lecture. This Lecture. Next Lecture. Medium Access Control. Flow and error control Source: Sections , 23.

Lecture 11 Overview. Last Lecture. This Lecture. Next Lecture. Medium Access Control. Flow and error control Source: Sections , 23. Last Lecture Lecture 11 Overview Medium Access Control This Lecture Flow and error control Source: Sections 11.1-11.2, 23.2 Next Lecture Local Area Networks 1 Source: Sections 13 Data link layer Logical

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

Programming Assignment 2 (50 pts) Due: 9 a.m. Friday, February 8, Data Link Layer Client and Server Processes Using Tanenbaum s PAR Protocol

Programming Assignment 2 (50 pts) Due: 9 a.m. Friday, February 8, Data Link Layer Client and Server Processes Using Tanenbaum s PAR Protocol Programming Assignment 2 (50 pts) Due: 9 a.m. Friday, February 8, 2001 Data Link Layer Client and Server Processes Using Tanenbaum s PAR Protocol Introduction This assignment exposes the student to data

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Communication Networks

Communication Networks Communication Networks Prof. Laurent Vanbever Exercises week 4 Reliable Transport Reliable versus Unreliable Transport In the lecture, you have learned how a reliable transport protocol can be built on

More information

Programming Assignment 2

Programming Assignment 2 Programming Assignment 2 50 pts. Sending Photos to a Photo Server Due: Thursday, November 17, 2005 1 p.m. Introduction The goal of this assignment is to send a set of digital photographs from a single

More information

23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22

23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22 23-3 TCP 23.22 TCP is a connection-oriented protocol; it creates a virtual connection between two TCPs to send data. In addition, TCP uses flow and error control mechanisms at the transport level. Topics

More information

Reliable Services. Implies... Reliability. Stop and Wait / Idle ARQ. Recovery by Timer Using Stop and Wait

Reliable Services. Implies... Reliability. Stop and Wait / Idle ARQ. Recovery by Timer Using Stop and Wait Reliability Services G Fairhurst (c) 998 G Fairhurst (c) 998 efinition of Reliability Stop & wait ARQ s N Implies... All information is received No information is duplicated (no loss, no residual errors)

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

Lecture 6: The Transport Layer

Lecture 6: The Transport Layer Lecture 6: The Transport Layer Reliable data delivery No lost data No duplicate data Computer Networks, Fall 2015 2 applicabon transport network link physical Computer Networks, Fall 2015 3 message app

More information

COMPUTER NETWORKS - Window protocols

COMPUTER NETWORKS - Window protocols ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere

More information

COMPUTER NETWORKS - Window protocols

COMPUTER NETWORKS - Window protocols ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Window protocols - 1 Copyright Quest opera è protetta dalla licenza Creative

More information

CS118 Discussion 1A, Week 3. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

CS118 Discussion 1A, Week 3. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. CS118 Discussion 1A, Week 3 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Application Layer Protocol: DNS, CDN, P2P Transport Layer Protocol: UDP, principles of reliable transport protocol

More information

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review. EEC-484/584 Computer Networks Lecture 6 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Data Link Layer Design Issues Error

More information

Flow control: Ensuring the source sending frames does not overflow the receiver

Flow control: Ensuring the source sending frames does not overflow the receiver Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis

More information

ELEN Network Fundamentals Lecture 15

ELEN Network Fundamentals Lecture 15 ELEN 4017 Network Fundamentals Lecture 15 Purpose of lecture Chapter 3: Transport Layer Reliable data transfer Developing a reliable protocol Reliability implies: No data is corrupted (flipped bits) Data

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

Telecommunication Protocols Laboratory Course. Lecture 2

Telecommunication Protocols Laboratory Course. Lecture 2 Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Chapter 5 Peer-to-Peer Protocols. School of Info. Sci. & Eng. Shandong Univ..

Chapter 5 Peer-to-Peer Protocols. School of Info. Sci. & Eng. Shandong Univ.. hapter 5 Peer-to-Peer Protocols School of Info. Sci. & Eng. Shandong Univ.. Outline 5. Peer-to-peer protocols and service models 5. RQ Protocols 5.3 Other daptation Functions Sliding Window Flow ontrol

More information

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP) Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames

More information

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:

More information

Data Link Layer, Part 5 Sliding Window Protocols. Preface

Data Link Layer, Part 5 Sliding Window Protocols. Preface Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. TYPES OF ERRORS There are two types of errors, 1. Single Bit Error The term single-bit error

More information

3. Data Link Layer 3-2

3. Data Link Layer 3-2 3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link

More information

Local Networks. Lecture 4 6-Apr-2016

Local Networks. Lecture 4 6-Apr-2016 Local Networks Lecture 4 6-Apr-2016 Roadmap of the Course So far Basic telecom concepts General study of LANs LAN topologies Flow and error control Today we continue the general study of LANs Medium access

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CE443 - Fall 1390 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport

More information

Introduction to Data Communications & Networking

Introduction to Data Communications & Networking Introduction to Data Communications & Networking Data Link Layer (Set 5) Chapter 10 and Chapter 11 Dr. Ali Maqousi, Dr. Tatiana Balikhina amaqousi@uop.edu.jo, tbalikhina@uop.edu.jo Department of Computer

More information

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple

More information

EE382C Lecture 14. Reliability and Error Control 5/17/11. EE 382C - S11 - Lecture 14 1

EE382C Lecture 14. Reliability and Error Control 5/17/11. EE 382C - S11 - Lecture 14 1 EE382C Lecture 14 Reliability and Error Control 5/17/11 EE 382C - S11 - Lecture 14 1 Announcements Don t forget to iterate with us for your checkpoint 1 report Send time slot preferences for checkpoint

More information

Project 2 Reliable Transport

Project 2 Reliable Transport Project 2 Reliable Transport UC Berkeley CS 168, Fall 2014 Version 1.0 Due: 11:59am (noon), November 2nd, 2014 In this project, you will build a simple reliable transport protocol, BEARS TP (BTP). Your

More information

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1. Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL

More information

Internet Protocols Fall Outline

Internet Protocols Fall Outline Internet Protocols Fall 2004 Lecture 12 TCP Andreas Terzis Outline TCP Connection Management Sliding Window ACK Strategy Nagle s algorithm Timeout estimation Flow Control CS 449/Fall 04 2 1 TCP Connection

More information

RFIC TX/RX Configuration

RFIC TX/RX Configuration RFIC TX/RX Configuration RFIC TX/RX Configuration 01/19/17 1 of 10 www.murata.com RXC101 Configuration When the RXC101 is configured in microcontroller mode, data can be received in three ways; directly

More information

rdt2.0 has a fatal flaw!

rdt2.0 has a fatal flaw! rdt2. has a fatal flaw! rdt2.1:, handles garbled ACK/NAKs what happens if ACK/NAK corrupted? doesn t know what happened at! can t just retransmit: possible duplicate handling duplicates: retransmits current

More information

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection 2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow

More information

1999, Scott F. Midkiff

1999, Scott F. Midkiff Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams

More information

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1. Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT

More information

Preview Test: HW3. Test Information Description Due:Nov. 3

Preview Test: HW3. Test Information Description Due:Nov. 3 Preview Test: HW3 Test Information Description Due:Nov. 3 Instructions Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed later. Question

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching Assistant: Mike Wawrzoniak http://www.cs.princeton.edu/courses/archive/spring06/cos461/

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 4: Transport Layer Literature: Forouzan: ch 11-12 2004 Image Coding Group, Linköpings Universitet Lecture 4: Outline Transport layer responsibilities UDP TCP 2 Transport layer in OSI model Figure

More information

Chapter 3: Transport Layer Part A

Chapter 3: Transport Layer Part A Chapter 3: Transport Layer Part A Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook 3: Transport

More information

Pretty Good Protocol - Design Specification

Pretty Good Protocol - Design Specification Document # Date effective October 23, 2006 Author(s) Ryan Herbst Supersedes Draft Revision 0.02 January 12, 2007 Document Title Pretty Good Protocol - Design Specification CHANGE HISTORY LOG Revision Effective

More information

ATA Power Management SATA Device Initiated Power Management (DIPM)

ATA Power Management SATA Device Initiated Power Management (DIPM) ATA/ATAPI T13 / e04149-r0 ATA Power Management SATA Device Initiated Power Management (DIPM) John Masiewicz Western Digital john.masiewicz@wdc.com 949-672-7686 John Masiewicz October 8, 2004 Background

More information

Question. Reliable Transport: The Prequel. Don t parse my words too carefully. Don t be intimidated. Decisions and Their Principles.

Question. Reliable Transport: The Prequel. Don t parse my words too carefully. Don t be intimidated. Decisions and Their Principles. Question How many people have not yet participated? Reliable Transport: The Prequel EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica,

More information

CS 455. Week 9. Reading: 1. Data Communications and Networking Behrouz A Forouzan Edition: 4.

CS 455. Week 9. Reading: 1. Data Communications and Networking Behrouz A Forouzan Edition: 4. CS 455 Week 9 Reading: 1. Data Communications and Networking Behrouz A Forouzan Edition: 4. Objectives: 1. To test the students knowledge on the concepts covered from Week 1 through Week 7. Concepts: 1.

More information

Data Link Control. Claude Rigault ENST Claude Rigault, ENST 11/3/2002. Data Link control 1

Data Link Control. Claude Rigault ENST Claude Rigault, ENST 11/3/2002. Data Link control 1 Data Link Control Claude Rigault ENST claude.rigault@enst.fr Data Link control Data Link Control Outline General principles of Data Link Control HDLC Data Link control 2 General principles of Data Link

More information

Telematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

Telematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments 19540 - Telematics 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Matthias Wa hlisch Department of Mathematics and Computer Science Institute of Computer Science 19. November, 2009 Institute

More information

Data Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking

Data Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking Data Link Layer Bharati Vidyapeeth s Institute of Computer Applications and Management,New Delhi-63 by Vishal Jain U2. 1 Learning Objectives To introduce the design issues of data link layer. To discuss

More information

ECE 435 Network Engineering Lecture 10

ECE 435 Network Engineering Lecture 10 ECE 435 Network Engineering Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 28 September 2017 Announcements HW#4 was due HW#5 will be posted. midterm/fall break You

More information

FINAL May 21, minutes

FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2004 FINAL May 21, 2004 160 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 20 msec one-way propagation delay, i.e., 40 msec roundtrip delay. We want

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CS 375: Computer Networks Thomas C. Bressoud 1 Goals for Todayʼs Lecture Principles underlying transport-layer services (De)multiplexing Detecting

More information

ARQ and HARQ inter-working for IEEE m system

ARQ and HARQ inter-working for IEEE m system ARQ and HARQ inter-working for IEEE 802.16m system Document Number: IEEE C802.16m-08/1053r1 Date Submitted: 2008-09-17 Source: Xiangying Yang (xiangying.yang@intel.com) Yuan Zhu Muthaiah Venkatachalam

More information

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24 Lecture 20 Overview Last Lecture Transport Control Protocol (1) This Lecture Transport Control Protocol (2) Source: chapters 23, 24 Next Lecture Internet Applications Source: chapter 26 COSC244 & TELE202

More information

PROBLEMSAND EXERCISES

PROBLEMSAND EXERCISES Departamento de Tecnología Electrónica Computer Networking Unit 3: Transport layer PROBLEMSAND EXERCISES Transport Layer 95 Pr1: port numbers Suppose that the client A initiates a TCP connection to a Web

More information

Chapter III: Transport Layer

Chapter III: Transport Layer Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross rdt2.0 has a fatal flaw! what happens if ACK/NAK corrupted?

More information

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B

More information

MME SGs Service Configuration Mode Commands

MME SGs Service Configuration Mode Commands SGs Service Configuration Mode Commands The SGs Service Configuration Mode is used to create and manage the LTE Mobility Management Entity () SGs services on this system. The SGs service creates an SGs

More information

NWEN 243. Networked Applications. Layer 4 TCP and UDP

NWEN 243. Networked Applications. Layer 4 TCP and UDP NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols

More information

TCP: Flow and Error Control

TCP: Flow and Error Control 1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol

More information

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448 Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted

More information

MME SGs Service Configuration Mode Commands

MME SGs Service Configuration Mode Commands MME SGs Service Configuration Mode Commands The MME SGs Service Configuration Mode is used to create and manage the LTE Mobility Management Entity (MME) SGs services on this system. The SGs service creates

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:

More information

Flow Control, and Congestion Control

Flow Control, and Congestion Control TCP Sliding Windows, Flow Control, and Congestion Control Lecture material taken from Computer Networks A Systems Approach, Fourth Ed.,Peterson and Davie, Morgan Kaufmann, 2007. Computer Networks TCP Sliding

More information

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP Outline Connecting to the access network: DHCP and mobile IP, LTE Transport layer: UDP and TCP IETF TCP/IP protocol suite User application, e.g., http with Mozilla Communication for each process on computer

More information

This presentation covers Unsolicited Events notification and handling, and standalone acknowledgments used to confirm reliable delivery or

This presentation covers Unsolicited Events notification and handling, and standalone acknowledgments used to confirm reliable delivery or This presentation covers Unsolicited Events notification and handling, and standalone acknowledgments used to confirm reliable delivery or communicate errors. 1 2 UE packets are used to asynchronously

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 8

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 8 1 A lot of students have been having difficulty seeing the HTTP packets generated when navigating

More information

COMPUTER NETWORKS UNIT 3

COMPUTER NETWORKS UNIT 3 COMPUTER NETWORKS UNIT 3 1. Illustrate about Reservation, Polling and Token Passing. [10 marks] Controlled access: In controlled access, the stations consult one another to find which station has the right

More information

The MMDVM Specification ( )

The MMDVM Specification ( ) The MMDVM Specification (20150922) Introduction The MMDVM is intended to be an open-source Multi-Mode Digital Voice Modem, which utilises the power of an ARM processor and a simple analogue interface board.

More information

Announcements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.

Announcements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing. IP Forwarding & Transport Protocols EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/

More information

ECE251: Thursday November 8

ECE251: Thursday November 8 ECE251: Thursday November 8 Universal Asynchronous Receiver & Transmitter Text Chapter 22, Sections 22.1.1-22.1.4-read carefully TM4C Data Sheet Section 14-no need to read this A key topic but not a lab

More information

Data Link Control Layer, Error Detection, Error Correction, and Framing

Data Link Control Layer, Error Detection, Error Correction, and Framing Data Link Control Layer, Error Detection, Error Correction, and Framing EEE 538, WEEK 2 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Error Detection Techniques Used

More information

Question Points Score total 100

Question Points Score total 100 CS457: Computer Networking Date: 3/21/2008 Name: Instructions: 1. Be sure that you have 8 questions 2. Be sure your answers are legible. 3. Write your Student ID at the top of every page 4. This is a closed

More information

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

Computer Networks & Security 2016/2017

Computer Networks & Security 2016/2017 Computer Networks & Security 2016/2017 Transport Layer (04) Dr. Tanir Ozcelebi Courtesy: Kurose & Ross Courtesy: Forouzan TU/e Computer Science Security and Embedded Networked Systems Transport Layer Our

More information

MSP430F149 P3.4/UTXD0 P3.5/URXD0 P1.5 P1.6 P1.7 MSP430F149 P1.0 P5.4 P5.3 P5.2 P5.1. Figure B-1. BSL Replicator Block Diagram

MSP430F149 P3.4/UTXD0 P3.5/URXD0 P1.5 P1.6 P1.7 MSP430F149 P1.0 P5.4 P5.3 P5.2 P5.1. Figure B-1. BSL Replicator Block Diagram Appendix B Appendix B MSP430 BSL Replicator Author: Greg Morton, MSP430 Applications B.1 BSL Replicator Overview The BSL Replicator application, executing on a host MSP430F149 device, uses the BSL protocol

More information

DATA LINK LAYER UNIT 7.

DATA LINK LAYER UNIT 7. DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission

More information