Lecture 5: Data Link Layer Basics

Similar documents
Lecture / The Data Link Layer: Framing and Error Detection

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

Where we are in the Course

CSE 123: Computer Networks

CSE 461: Framing, Error Detection and Correction

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

PART III. Data Link Layer MGH T MGH C I 204

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

CSE 123A Computer Networks

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination

CS422 Computer Networks

Data Link Layer. Srinidhi Varadarajan

Chapter 3. The Data Link Layer

Some portions courtesy Robin Kravets and Steve Lumetta

CS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due Thursday!

DATA LINK LAYER UNIT 7.

CS 4453 Computer Networks Winter

CSE123A discussion session

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

Computer and Network Security

Links. CS125 - mylinks 1 1/22/14

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

Data Link Layer (1) Networked Systems 3 Lecture 6

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

3. Data Link Layer 3-2

The Data Link Layer Chapter 3

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

Chapter 3. The Data Link Layer

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1

The Data Link Layer. Data Link Layer Design Issues

5th Slide Set Computer Networks

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Introduction to Computer Networks. 03 Data Link Layer Introduction

Inst: Chris Davison

Data Link Layer Overview

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Packet/Frame, Error Detection How to send data efficiently & reliably?

Direct Link Networks. Framing. Lecture - Encoding & Framing 1. Problems. Areas for Discussion

Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3)

The Data Link Layer Chapter 3

Chapter 10 Error Detection and Correction 10.1

ISO/OSI Reference Model. Data Link Layer. 7. Application. 6. Presentation. 5. Session. 4. Transport. 3. Network. 2. Data Link. 1.

Data Link Layer Overview

Lecture 2 Error Detection & Correction. Types of Errors Detection Correction

Communication Networks. Part I

(Refer Slide Time: 2:20)

COMPUTER NETWORKS UNIT-3

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

CSCI-1680 Link Layer I Rodrigo Fonseca

Introduction to Computer Networks

Introduction to Data Communications & Networking

Ch. 7 Error Detection and Correction

Framing and Stuffing. Advanced Computer Networks

Data Link Layer Overview

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd.

Transmission SIGNALs

Pending Issues. Opera,ng Systems and Networks. Network Lecture 3: Link Layer (1) Where we are in the Course. Scope of the Link Layer

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Data Link Layer. Indian Institute of Technology Madras

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Data Link Layer Overview

Chapter 3 The Data Link Layer

Chapter 6 Digital Data Communications Techniques

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

4. Error correction and link control. Contents

06/05/2008. Chapter 3. The Data Link Layer. Data Link Layer Design Issues. Services Provided to the Network Layer. Error Control Flow Control

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4

Universal Asynchronous Receiver Transmitter Communication

Chapter 9: Data Transmission

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L4 Data link (part 1)

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Direct Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems

Chapter 5 Data-Link Layer: Wired Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

MYcsvtu Notes DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes

CS321: Computer Networks Error Detection and Correction

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Data Link Layer: Overview, operations

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)


Transcription:

Lecture 5: Data Link Layer Basics Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Layer 2 PDU: Frame 2 1

Bit-oriented vs. Byte-oriented Layer 2 protocols can be either: byte-oriented or bit-oriented. In bit-oriented, frames can contain an arbitrary number of bits. Example: HDLC (High-Level Data Link Control) protocol. In byte-oriented (character-oriented), frames consist of an integral number of bytes (8 bits). Example: PPP (Point-to-Point Protocol). In both, the data link layer has the job of dividing a continuous bit stream into identifiable frames. 3 Framing 1. Insert time gaps of no transmission periods between frames. Example: Asynchronous transmission in RS-232 standard. Example: Ethernet. Easiest method. Inefficient because bandwidth is wasted while not transmitting useful data. Unreliable except for short distances (noise). 4 2

Framing 2. Character Count (used mainly in byte-oriented protocols) 5 Framing 3. Frame Delimiters (used in bit-oriented and byte-oriented). For example, the HDLC data link protocol (a bit-oriented protocol) uses the 8-bit sequence 01111110 as a flag sequence (see figure). 6 3

Framing PPP (a byte-oriented protocol) uses the FLAG = 0x7E = 01111110 7 Bit Stuffing Prevents flags occurring in the middle of a frame, which would lead the receiver to have a frame slip. TX: add an extra 0 after a group of five ones that appears in the middle of the frame. This way whatever bit precedes or follows the 11111, there is no chance the flag will appear in the middle of the frame. The start and end flags are not stuffed. RX: performs destuffing by replacing every pattern 111110 by 11111 before the data is handed to the network layer. 8 4

9 Byte Stuffing Byte stuffing (character stuffing) consists of using a special data link escape character DLE to prevent the occurrence of the FLAG (and DLE) bytes in the middle of the frame. The stuffed bytes are removed by the receiving end. For example, PPP uses the FLAG = 0x7E = 01111110, and the DLE = 0x7D = 01111101. 10 5

Byte Stuffing 11 Error Detection and Correction Parity: A parity bit is added to the sent message M. The parity bit is set to 1 or 0 to force the transmitted message to contain even or odd number of 1 s. 7 bit data: M = 1010001 8 bits transmitted (including parity): 10100011 (even parity) 10100010 (odd parity) 12 6

Checksums Checksum is the sum (plus carry) of the 16-bit words making up the message M. The receiver checks that the sum of the received message M matches the checksum sent by the transmitter. If both sums match, no errors have occurred during the transmission of the message. Checksums are used in TCP and IP headers. 13 Cyclic Redundancy Check (CRC) Message bits M are divided by a bit sequence called a generating polynomial G, and the remainder of the division R (called a CRC) is sent along with the message. The receiver divides the received message bits along with the CRC code (M : R ) by the generating polynomial G. If the remainder is zero, no errors have occurred. If the remainder is not zero, an error occurred. CRC can be implement in hardware using a shift register and X-OR gates (inexpensive and fast). CRC can detect burst errors. CRC is used in HDLC, PPP, Ethernet, and many others. It is the most common error detection code nowadays. 14 7

15 Bitwise Arithmetic (X-OR) 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0, carry neglected 0-0 = 0 0-1 = 1, borrow neglected 1-0 = 1 1-1 = 0 16 8