Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments
|
|
- Jeffery Jordan
- 5 years ago
- Views:
Transcription
1 Telematics 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 18. November, 2010 Institute of Computer Science Telematics Tutorial 18. November,
2 Outline 1. Network Topologies 2. Reducing the Overhead 3. Efficiency of Stop-and-Wait 4. LLC vs. MAC 5. Flow Control 6. Sliding Window Mechanism 7. Sliding Window and Data Rate 8. Sliding Window 9. HDLC vs. PPP 10. The End to End Argument Institute of Computer Science Telematics Tutorial 18. November,
3 Network Topologies Consider the following four network topologies, each with n nodes: Star Fully Meshed Unidirectional Ring Bidirectional Ring Give a formula to calculate the minimum, maximum, and average number of hops between any two nodes for any number n.??? Institute of Computer Science Telematics Tutorial 18. November,
4 Network Topologies Minimum Average Maximum Star Institute of Computer Science Telematics Tutorial 18. November,
5 Network Topologies Minimum Average Maximum Fully Meshed Institute of Computer Science Telematics Tutorial 18. November,
6 Network Topologies Minimum Average Maximum 1 n-1 Unidirectional Ring n 1 1 i = n n 1 2 i=1 Institute of Computer Science Telematics Tutorial 18. November,
7 Network Topologies Bidirectional Ring Min. Average Maximum 1 if n even: 2 n 2 1 i=1 i + n 2 n 1 if n odd: 2 n 1 2 i=1 i n 1 = n 2 4n 4 = n if n even: n 2 if n odd: n 1 2 Institute of Computer Science Telematics Tutorial 18. November,
8 Reducing the Overhead As you have learned, frames (often) consist of data that is framed by special flag bytes (start and stop). Discuss if the stop flag can be omitted to save one byte as the start flag of the succeeding frame can be used to implicitly mark that the previous frame has ended. Start Data 1 Stop Start Data 2 Stop... =? Start Data 1 Start Data 2...?? Institute of Computer Science Telematics Tutorial 18. November,
9 Reducing the Overhead What happens when there is no next frame or a long gap? How can the receiver differentiate noise from data? Start Data 1 Start Data 2...?... Start Data 3 Some Alternative Approaches: Length field the header Three-state logic (pull-ups/downs, output enable) Out of band signaling, separate clock line Institute of Computer Science Telematics Tutorial 18. November,
10 Efficiency of Stop-and-Wait Assume a channel with a bit rate of 1 Mbps and a delay of 20 ms. A Stop-and-Wait protocol is used which unfortunately introduces waiting times and thus a low efficiency. The efficiency is dependent on the size of the frames. Determine the frame size for which the efficiency is 50%.??? Institute of Computer Science Telematics Tutorial 18. November,
11 Efficiency of Stop-and-Wait Using the Stop-and-Wait protocol, only one frame is on the line at a time Acknowledgement has to arrive before next frame is sent Assumptions Processing times are negligible Acknowledgements are always piggybacked Packets in both directions have the same size efficiency utilization in script (slide 4.70) efficiency = length/(length + bitrate RTT) (1) 0.5 = length/(length bps ) (2) 0.5 = length/(length bits) (3) length = bits (4) Institute of Computer Science Telematics Tutorial 18. November,
12 LLC vs. MAC Discuss the difference tasks of the LLC and MAC. Background Problem Statement: Several data link layer protocols exist Data link layer provides different services to the network layer Consistent primitives to the network layer are desired??? Institute of Computer Science Telematics Tutorial 18. November,
13 LLC vs. MAC Data link layer (often) consists of two sublayers: Logical Link Control (LLC) Media Access Control (MAC) LLC Specified in IEEE and adopted by the ISO/IEC and redesignated as ISO/IEC :1998 Hides differences between various kinds of networks, example: Token ring network can be connected (bridged) with Ethernet network Single format and interface to the network layer Format, interface, and protocol closely based on HDLC LLC header is prepended to network layer packet before inserting into payload field of, e.g., frame Services Unreliable datagram service (unacknowledged and connectionless) Acknowledged datagram service (connectionless) Acknowledged connection-oriented service Institute of Computer Science Telematics Tutorial 18. November,
14 LLC vs. MAC LLC Classes Class 1 Class 2 data-link-connectionless-mode service data-link-connectionless-mode service data-link-connection-mode service Class 3 data-link-connectionless-mode service acknowledged-connectionless-mode service Class 4 data-link-connectionless-mode data-link-connection-mode service acknowledged-connectionless-mode service Institute of Computer Science Telematics Tutorial 18. November,
15 LLC vs. MAC MAC Handles access to shared medium Contention for the medium access by all stations Different MAC approaches for different network technologies Network Allocation Vector (NAV) can be used for power management (if available) Institute of Computer Science Telematics Tutorial 18. November,
16 LLC vs. MAC Figure: IEEE Architecture Institute of Computer Science Telematics Tutorial 18. November,
17 Flow Control Repeat and discuss the task of flow control.??? Institute of Computer Science Telematics Tutorial 18. November,
18 Flow Control Control data flow between stations Protect slow receiver from fast sender Approaches Feedback-based flow control Rate-based flow control Different strategies when acknowledgments are not received until timeout Can enable reliable data communication Institute of Computer Science Telematics Tutorial 18. November,
19 Sliding Window Mechanism Consider some host-to-network technology where each frame contains a sequence number SEQ as well as an acknowledgement number ACK. The acknowledgement number acknowledges all frames up to ACK-1. Both numbers are represented by M bits and thus all calculations are modulo log 2 (M).??? Institute of Computer Science Telematics Tutorial 18. November,
20 Sliding Window Mechanism How many frames can be sent before at least one acknowledgement has to be received???? Institute of Computer Science Telematics Tutorial 18. November,
21 Sliding Window Mechanism The maximum window size is M 1. With a window size of M, the following two scenarios can not be distinguished by host A for W = M = 4: A 0 B A 0 B ACK ACK Timeout 0 ACK 1 ACK 1 0 Note: In real networks there is no guarantee that the delay equal in both directions! Institute of Computer Science Telematics Tutorial 18. November,
22 Sliding Window Mechanism Consider an example with M = 8 and window size W = 7. The frames with the sequence numbers 5, 6, 7, 0, 1 have been sent from A to B and no acknowledgement has been received yet. Which of the remaining sequence numbers may be used by A to sent further frames???? Institute of Computer Science Telematics Tutorial 18. November,
23 Sliding Window Mechanism Frames with the sequence numbers 5, 6, 7, 0, 1 have been sent The frames with sequence numbers 2 and 3 can be sent without getting an acknowledgement: M 1 = 7 5 frames have been sent last used sequence number + {1,2} Institute of Computer Science Telematics Tutorial 18. November,
24 Sliding Window Mechanism Which sequence numbers may be used for further frames, if acknowledgements are received with: 1. ACK = 2 2. ACK = 6 3. ACK = 5 List the acknowledged sequence numbers and the window of remaining sequence numbers.??? Institute of Computer Science Telematics Tutorial 18. November,
25 Sliding Window Mechanism Received ACK = 2 Acknowledged: 5, 6, 7, 0, 1 Window: 2, 3, 4, 5, 6, 7, (a) Previous State (b) Received Acknowledgement Institute of Computer Science Telematics Tutorial 18. November,
26 Sliding Window Mechanism Received ACK = 6 Acknowledged: 5 Window: 2, 3, (c) Previous State (d) Received Acknowledgement Institute of Computer Science Telematics Tutorial 18. November,
27 Received ACK = 5 Acknowledged: 4 Window: 2, 3 Sliding Window Mechanism (e) Previous State (f) Received Acknowledgement If a frame with sequence number 4 actually has been sent, the ACK=5 acknowledges this frame. The window doesn t change because sequence number 4 cannot be used. Alternatively, an error has happened Institute of Computer Science Telematics Tutorial 18. November,
28 Sliding Window and Data Rate Consider a host-to-network technology with a sliding window mechanism and a window size of W = 7. The frames can have a size of up to 1,500 bytes and the round trip time between two hosts is 50 ms. Calculate the maximum data rate that can be achieved.??? Institute of Computer Science Telematics Tutorial 18. November,
29 Sliding Window and Data Rate A host can send 7 1, 500 bytes = 10, 500 bytes without getting an acknowledgement. Assumption: Processing times are negligible Thus, a frame that is received by host B at time 25 ms will be acknowledged 25 ms later Host A receives the acknowledgement at time 50 ms The window is shifted and the next frame can be sent 10,500 byte can be sent in 50 ms. Host A can receive 20 acknowledgements in 1 sec Thus, 20 10, 500 byte can be sent 210, 000 byte/s 1.6 Mbps. Institute of Computer Science Telematics Tutorial 18. November,
30 Sliding Window and Data Rate In reality you have to consider the processing times of both hosts 1,500 byte = 12,000 bit take about 120 µs to get the frame on the wire with Fast Ethernet (100 MBit/s) The first frame is received by host B after 25.12ms. Assumption: The ACK is sent immediately without any additional delay Assumption: ACK frames without data are less than 100 bit long and it takes about 1µs sent the frame Thus, after ms host A can move the window by one position and sent the next frame... Institute of Computer Science Telematics Tutorial 18. November,
31 Assume a geostationary satellite sends frames of 1000 bits over a channel with a bit rate of 1 Mbps. The frame take 270 ms to arrive at the station on earth. Calculate the maximum achievable efficiency using a Stop-and-Wait protocol Sliding Window protocol with window size 13 The acknowledgements are always piggybacked on data frames.??? Institute of Computer Science Telematics Tutorial 18. November,
32 Transmission starts at t=0 Station on earth receives 1st frame at t=271 ms Station replies at t=272 ms Reply from station arrives at t=542 ms at the satellite k Frames can be sent in 542 ms until an acknowledgement is required to proceed Efficiency is k/542 k=1 (Stop-and-Wait): efficiency = 1/542 = 0.18% k=13 (Sliding Window): efficiency = 13/542 = 2.40% Institute of Computer Science Telematics Tutorial 18. November,
33 Sliding Window Why do we need preferably a full-duplex connection for sliding window protocols???? Institute of Computer Science Telematics Tutorial 18. November,
34 Sliding Window Without a full-duplex connection, there is only limited parallelization Data and acknowledgements should be on the medium at the same time The rate and delay at which the acknowledgements arrive, significantly determines the performance (remember this when we will discuss TCP!) In many scenarios both stations want to send data at the same time Parallelization is an important motivation for sliding window protocols Institute of Computer Science Telematics Tutorial 18. November,
35 HDLC vs. PPP Compare the HDLC and PPP protocols. Specify appropriate metrics for the comparison.??? Institute of Computer Science Telematics Tutorial 18. November,
36 HDLC vs. PPP HDLC PPP Origin based on SDLC Inspired by HDLC Standardization ISO IETF Implementation hardware software Framing Synchronous or asynchronous Stuffing bit byte Services Modes connection-oriented, connectionless point-to-point or point-tomultipoint depends on framing connection-oriented point-to-point Checksum CCITT CRC-16 depends on framing Discuss further differences! Institute of Computer Science Telematics Tutorial 18. November,
37 HDLC vs. PPP Examples for PPP encapsulation Simpson PPP in HDLC-like Framing RFC 1662, 1994 Mamakos et al. A Method for Transmitting PPP Over Ethernet (PPPoE) RFC 2516, 1999 Simpson PPP over SONET/SDH RFC 1619, 1999 Gross et al. PPP Over AAL5 RFC 2364, 1998 Simpson PPP over ISDN RFC 1618, 1994 PPP Connection Establishment Simpson PPP Challenge Handshake Authentication Protocol (CHAP) RFC 1994, 1996 Simpson PPP LCP Extensions RFC 1570, 1994 Institute of Computer Science Telematics Tutorial 18. November,
38 The End to End Argument Read the article End-to-end arguments in system design by Saltzer et al. Discuss the ideas of the end to end argument and which functions/services should be provided on particular layers of the reference model.??? Institute of Computer Science Telematics Tutorial 18. November,
39 Motivation: The End to End Argument Context: Protocol design Distributed system with different layers Functions that might be implemented on multiple levels of the protocol stack Key question: Where to place which function? End to End (E2) Argument: Implementing these functions at low level may be redundant or provides little usefulness Functions in question should be implemented at the endpoints of the communication system Example: Congestion control at endpoints Discussion: E2E-Argument does not tell at which layer to place the functions Consider a trade-off between costs and performance Institute of Computer Science Telematics Tutorial 18. November,
40 The Last Slide TM Thank you for your attention. Questions? Institute of Computer Science Telematics Tutorial 18. November,
Telematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments
19540 - Telematics 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Matthias Wa hlisch Department of Mathematics and Computer Science Institute of Computer Science 19. November, 2009 Institute
More informationPart 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross
Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,
More informationData Link Layer. Overview. Links. Shivkumar Kalyanaraman
Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control
More informationCS422 Computer Networks
CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service
More informationData Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow
More information3. Data Link Layer 3-2
3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet
More informationFlow control: Ensuring the source sending frames does not overflow the receiver
Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis
More informationDLL: Flow Control DLL. Simplex. Fast sender / slow receiver scenario. Various protocols used. Simplified examples implemented in C.
DLL: Flow Control Fast sender / slow receiver scenario Feedback mechanism reqd. Various protocols used Stop and Wait Sliding window protocols Hugh Melvin, Dept. of IT, NUI,G 1 DLL Simplified examples implemented
More informationOverview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer
Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology
More informationEthernet Switches (more)
Ethernet Switches layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-B and A - to-b simultaneously, no collisions large number of interfaces often: individual hosts, star-connected
More informationData Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.
Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT
More informationData Link Layer, Part 4. Exemplary Protocols
CS 455 Examplary DLL Protocols, Page 1 Data Link Layer, Part 4 Exemplary Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationTransport Over IP. CSCI 690 Michael Hutt New York Institute of Technology
Transport Over IP CSCI 690 Michael Hutt New York Institute of Technology Transport Over IP What is a transport protocol? Choosing to use a transport protocol Ports and Addresses Datagrams UDP What is a
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationProtocol Principles. Framing, FCS and ARQ 2005/03/11. (C) Herbert Haas
Protocol Principles Framing, FCS and ARQ (C) Herbert Haas 2005/03/11 Link Layer Tasks Framing Frame Protection Optional Addressing Optional Error Recovery Connection-oriented or connectionless mode Optional
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each
More informationEthernet Switches Bridges on Steroids. Ethernet Switches. IEEE Wireless LAN. Ad Hoc Networks
Ethernet Switches Bridges on Steroids layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-B and A - to-b simultaneously, no collisions large number of interfaces often: individual
More information(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.
Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 5: The Link Layer I Errors and medium access Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You should
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationOther Protocols. Arash Habibi Lashkari
LAN Technology Other Protocols Arash Habibi Lashkari PHD of Computer Science - Information Security July 2010 Other Protocols Outlines: FDDI: Fiber Distributed Data Interface Token Ring: IEEE 802.5 LAN
More informationData Communication & Computer Networks INFO
Data Communication & Computer Networks INFO Instructor: Dr. A. SARI Department: Management Information Systems Course Code: MIS 305 Academic Term: 2013/2014 Fall Title: Data Communication & Computer Networks
More informationPOINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016
POINT TO POINT DATALINK PROTOCOLS ETI 2506 Telecommunication Systems Monday, 7 November 2016 TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember PPP Frame
More informationCS1302 / Computer Networks
CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationCSE 461: Framing, Error Detection and Correction
CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationAdvanced Computer Networking. CYBR 230 Jeff Shafer University of the Pacific QUIC
CYBR 230 Jeff Shafer University of the Pacific QUIC 2 It s a Google thing. (Originally) 3 Google Engineering Motivations Goal: Decrease end-user latency on web To increase user engagement So they see more
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationExpected Time: 90 min PART-A Max Marks: 42
Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:
More informationChapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control
Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside
More informationCode No: RR Set No. 1
Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationWilliam Stallings Data and Computer Communications. Chapter 7 Data Link Control
William Stallings Data and Computer Communications Chapter 7 Data Link Control Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time
More informationCS 428/528 Computer Networks Lecture 01. Yan Wang
1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationThe Link Layer II: Ethernet
Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols
More informationOverview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.
Overview Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.3 Performance Metrics Bandwidth Amount of data that can
More informationChapter 5 part 2 LINK LAYER. Computer Networks Timothy Roscoe Summer Networks & Operating Systems Computer Networks
Chapter 5 part 2 LINK LAYER Computer Networks Timothy Roscoe Summer 2007 LAN technologies Data link layer so far services, error detection/correction, multiple access Next: LAN technologies LAN addressing,
More information(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker
Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationTransport Layer Review
Transport Layer Review Mahalingam Mississippi State University, MS October 1, 2014 Transport Layer Functions Distinguish between different application instances through port numbers Make it easy for applications
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationChapter 11 Data Link Control 11.1
Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationRAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.
More informationECE697AA Lecture 3. Today s lecture
ECE697AA Lecture 3 Transport Layer: TCP and UDP Tilman Wolf Department of Electrical and Computer Engineering 09/09/08 Today s lecture Transport layer User datagram protocol (UDP) Reliable data transfer
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationData Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination
Data Link Protocols Data Link Services Connection-less services Functions of a Data Link Protocol Framing PDUs ing Destination Error Detection / Error Recovery Link Management Ethernet (covered elsewhere)
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationHubs. Interconnecting LANs. Q: Why not just one big LAN?
Interconnecting LANs Q: Why not just one big LAN? Limited amount of supportable traffic: on single LAN, all stations must share bandwidth limited length: 802.3 specifies maximum cable length large collision
More informationLecture 5: Data Link Layer Basics
Lecture 5: Data Link Layer Basics Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Layer 2 PDU: Frame 2 1 Bit-oriented vs. Byte-oriented Layer 2 protocols
More informationEE 610 Part 2: Encapsulation and network utilities
EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationTransport Protocols. Raj Jain. Washington University in St. Louis
Transport Protocols Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 16-1 Overview q TCP q Key features
More informationChapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
Chapter 4 DataLink Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. DataLink Layer Link Layer 4.1 Link-Layer Addressing 4.2 Ethernet
More informationCRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors
CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationComputer Networks (Unit wise Questions)
Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies
More informationTransport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections
Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address
More informationComputer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48
Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes
More informationComputer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1
Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter
More informationChapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.
hapter 5 Link Layer and LNs omputer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 2009. hapter 5: The Data Link Layer Our goals: understand principles behind data
More informationEE 122 Fall st Midterm. Professor: Lai Stoica
EE 122 Fall 2001 1 st Midterm Professor: Lai Stoica Question 1 (15 pt) Layering is a key design principle in computer networks. Name two advantages, and one disadvantage to layering. Explain. Use no more
More informationInstitute of Computer Technology - Vienna University of Technology. L02 - Protocol Principles
Protocol Principles Layering, CL versus CO Service, ARQ Techniques, Sequence umbers, Windowing, Flow Control Agenda Introduction 3 Layer Model and Service Types ARQ Techniques Introduction Idle RQ Continuous
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 1 Final project demo Please do the demo THIS week to the TAs. Or you are allowed to use
More informationComputer Facilities and Network Management BUS3150 Tutorial - Week 13
Computer Facilities and Network Management BUS3150 Tutorial - Week 13 *** FOR TUTORS ONLY *** The answers provided here are only brief guides. If you have any comments or suggestions for improvement to
More informationPhysical and Data Link layers
Physical and Data Link layers Youki Kadobayashi Graduate School of Science Nara Institute of Science and Technology Physical Layer All rights reserved. 2 Types of transmission medium! Cables Optical fiber
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationData-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols
Computer Networking Data-link layer Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr Data Link Layer Our goals: Understand principles behind link layer services: sharing a broadcast channel: multiple
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationCommunication and Networks. Problems
Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes
More informationQuestion 7: What are Asynchronous links?
Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:
More informationLecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24
Lecture 20 Overview Last Lecture Transport Control Protocol (1) This Lecture Transport Control Protocol (2) Source: chapters 23, 24 Next Lecture Internet Applications Source: chapter 26 COSC244 & TELE202
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationCS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 18 th class; 7 th Oct 2011 Instructor: Sridhar Iyer IIT Bombay Reliable Transport We have already designed a reliable communication protocol for an analogy
More informationNetworking Link Layer
Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding
More informationHousekeeping. Fall /5 CptS/EE 555 1
Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section
More informationQUIZ: Longest Matching Prefix
QUIZ: Longest Matching Prefix A router has the following routing table: 10.50.42.0 /24 Send out on interface Z 10.50.20.0 /24 Send out on interface A 10.50.24.0 /22 Send out on interface B 10.50.20.0 /22
More informationAugust AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links
Network Working Group Request for Comments: 1504 A. Oppenheimer Apple Computer August 1993 Status of This Memo Appletalk Update-Based Routing Protocol: Enhanced Appletalk Routing This memo provides information
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationIntroductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.
Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory
More informationUser Datagram Protocol
Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationAutomatic Repeat Request Data Link Layer Traffic Management
Automatic Repeat Request Data Link Layer Traffic Management Reliable Communications with Retransmission How to transport data units over an unreliable data link in a reliable way? End to End E.g.. TCP
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More information