EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L4 Data link (part 1)

Similar documents
EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

CSE 123: Computer Networks

Chapter 3. The Data Link Layer

Chapter 5 Data-Link Layer: Wired Networks

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CS321: Computer Networks Error Detection and Correction

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

Data Link Layer. Srinidhi Varadarajan

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

The Data Link Layer Chapter 3

DATA LINK LAYER UNIT 7.

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

CSE 461: Framing, Error Detection and Correction

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

CS422 Computer Networks

06/05/2008. Chapter 3. The Data Link Layer. Data Link Layer Design Issues. Services Provided to the Network Layer. Error Control Flow Control

Ch. 7 Error Detection and Correction

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Data Link layer (CN chap 3.1, 3.4, 3.6)

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

PART III. Data Link Layer MGH T MGH C I 204

4. Error correction and link control. Contents

Pending Issues. Opera,ng Systems and Networks. Network Lecture 3: Link Layer (1) Where we are in the Course. Scope of the Link Layer

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Communication Networks. Part I

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

Chapter 11 Data Link Control 11.1

Point-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

Lecture 5: Data Link Layer Basics

Chapter 11 Data Link Control 11.1

Chapter 3 The Data Link Layer

The Data Link Layer Chapter 3

Lecture / The Data Link Layer: Framing and Error Detection

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

ISO/OSI Reference Model. Data Link Layer. 7. Application. 6. Presentation. 5. Session. 4. Transport. 3. Network. 2. Data Link. 1.

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Computer Networks. Shyam Gollakota

CSE123A discussion session

CS 4453 Computer Networks Winter

Packet/Frame, Error Detection How to send data efficiently & reliably?

Inst: Chris Davison

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

CSCI-1680 Link Layer I Rodrigo Fonseca

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Networking Link Layer

Data Link Layer: Overview, operations

Jaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles

Links. CS125 - mylinks 1 1/22/14

Data-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols

Reliable transmission

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

Introduction to Data Communications & Networking

UNIT-II 1. Discuss the issues in the data link layer. Answer:

Data Link Control Layer, Error Detection, Error Correction, and Framing

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

3. Data Link Layer 3-2

Chapter 10 Error Detection and Correction 10.1

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

CSE 123: Computer Networks

Fault-Tolerant Computing

Data Link Layer (1) Networked Systems 3 Lecture 6

CSCI-1680 Link Layer Reliability John Jannotti

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

The Data Link Layer. Data Link Layer Design Issues

Introduction to Computer Networks. 03 Data Link Layer Introduction

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination

COMPUTER NETWORKS UNIT-3

CSE 123A Computer Networks

Problem Statement. Physical and Data Link Layer Overview. Five Tasks Encoding. Make two computers talk to each other

Computer Networking. Lecture 4 - Coding and Error Control

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

UNIT I FUNDAMENTALS & LINK LAYER

Hamming Code. Gives a method for construc=ng a code with a distance of 3. Plus an easy way to correct [soon]

CSE123A discussion session

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Data Link Control. Surasak Sanguanpong Last updated: 11 July 2000

CS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos

CPE 548 Exam #1 (50 pts) February 17, 2016

Chapter 3. The Data Link Layer

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

Introduc)on to Computer Networks

Where we are in the Course

Data Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking

Flow control: Ensuring the source sending frames does not overflow the receiver

Some portions courtesy Robin Kravets and Steve Lumetta

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4

POINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016

Transcription:

EITF25 Internet- - Techniques and Applica8ons Stefan Höst L4 Data link (part 1)

Previously on EITF25 (or digital signal) 2

Data Link Layer Medium Access Control Access to network Logical Link Control Node- to- node error and flow control Link layer protocols 3

Link Layer Protocols The sender and receiver uses a link layer protocol that provides error control for data that is sent on a physical link. applica8on Link Applica8on protocol Link protocol applica8on Link blocks PHY Physical protocol PHY bits 4

Framing Physical layer à bitstream Link layer à frames We need logical transmission units Synchronisa8on points Switching between users Error handling flag header data trailer flag 5

Bit stuffing Flag = 01111110 Avoid having the flag pawern (01111110) in the data: Transmi(er AYer five consecu8ve 1s insert a 0 Receiver AYer five consecu8ve 1s delete next bit trailer 01111110 header 101010010101010 100101010110 01111110 6

Bit stuffing Example Data = 01001111111101011111001001 Data BS = 0100111110111010111110001001 7

Error control Data assumed error- free by higher layers Errors occur at lower layers (physical) Extra (redundant) bits added to data Generated by an encoding scheme from data Used to resolve (detect or correct) errors Encoding Data Extra bits 8

Typical Error Types Bit error Burst error 9

Error control Error detec8on: the aim is to detect errors The transmission protocol decides what to do about erroneous packages Error correc8on: the aim is to correct errors Roughly half as many errors can be corrected as can be detected. In most communica8on systems both error detec8on and error correc8on occur 10

Error detec8on schemes Simple parity- check code Cyclic Redundancy Check (CRC) Checksum 11

Simple Parity- Check Code Extra bit added to make the total number of 1s in the codeword Even à even parity Odd à odd parity dataword codeword 10011100 + 0 = 100111000 Can detect an odd number of errors 12

Simple Parity- Check Code TransmiWer Receiver x1 x2 x3 x4 x1 x2 x3 x4 Decision x1 x2 x3 x4 p Transmission x1 x2 x3 x4 p 13

Cyclic Redundancy Check (CRC) Generalise to more (independent) parity bits TransmiWer Receiver x1 x2 x3 x4 x1 x2 x3 x4 Check Decision Generator Transmission x1 x2 x3 x4 p1 p2 p3 x1 x2 x3 x4 p1 p2 p3 14

Polynomial representa8on The dataword of k bits is represented by a polynomial, d(x). The degree of the polynomial is k- 1.

CRC: The principle Objec1ve: Send a dataword d(x) of k bits represented by a polynomial of degree k- 1. Given: Generator polynomial g(x) of degree m. Find: Remainder polynomial r(x) such that: c(x) = d(x) x m + r(x) can be divided by g(x) without remainder. Codeword c(x) will then be sent to the receiver. r(x) has degree m- 1 or less, and CRC has m bits.

CRC: How it works Sender: 1. Generate b(x) = d(x) x m 2. Divide b(x) by g(x) to find r(x) 3. Send c(x) = b(x) + r(x) Receiver: 1. Divide c (x) = c(x) + e(x) by g(x) 2. Check remainder r (x) if 0 data correct, c(x) = c (x) 3. Remove CRC bits from codeword to get dataword

Example: CRC deriva8on For dataword 1001, derive CRC using generator 1011. Data polynomial: d(x) = x 3 +1 Generator polynomial: g(x) = x 3 +x+1 Dividend: b(x) = d(x) x 3 = x 6 +x 3 Codeword polynomial: c(x) = d(x) x 3 + r(x) CRC polynomial: r(x) =?

Example: CRC deriva8on

CRC: Some theory The CRC polynomial is the reminder of the division Thus d(x)x n or, equivalently d(x)x n g(x) k k = g(x)z(x)+r(x) c(x) =d(x)x n k + r(x) =g(x)z(x) A polynomial c(x) with deg<n is a codeword if and only if g(x) divides c(x). 20

Error detec8on capabili8es Single errors: e(x)=x i is not divisable by g(x) Double errors: e(x)=x j +x i =x i (x j- i +1) Use primi8ve polynomial p(x) with deg=l. Then if n- 1<2 L - 1 it is not divisable and all double errors will be detected If x+1 g(x) all odd error pawerns will be detected In prac8ce, set g(x)=(x+1) p(x)

Some standard CRC polynomials

Checksum The checksum is used in the Internet by several protocols although not at the data link layer. The main principle is to divide the data into segments of n bits. Then add the segments and use the sum as redundant bits.

Checksum process

Example: Checksum 0 1 1 1 1 0 1 1 1 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 1 1 0 1 1 1 1 0 0 0 0 0 0 0 1 1 0 1 0 0 1 1 1 0 1

Forward Error Correc8on (FEC) Two simple examples Repe88on code Concatenated parity check

Repe88on code Transmi(er For each bit, transmit three copies Receiver Decode acording to majority decision If one error uccured this will be corrected

Repe88on code, Example Transmi(er d =0) c = 000 Channel One error: e = 010 ) y = 010 Receiver y = 010 ) ĉ = 000 ) ˆd =0

Ver8cal and horisontal parity Encoding Let d be a binary matrix. Add parity bits for each row and column Decoding If one error, it can be found from the parity bits Two or three errors can be detected (but not always corrected)

V+H parity, Example Encoding d = Channel One error 1 1 0 1 0 0 1 1 0 0 0 1 y = ) c = 1 1 0 1 1 0 0 0 1 0 0 0 0 1 1 1 1 1 1 0 1 1 0 1 1 0 0 1 1 0 0 0 0 1 1 1 1 1 1 0

V+H parity, Example Decoding Two parity bits wrong. Points at one posi8on. y = 1 1 0 1 1 0 0 0 1 0 0 0 0 1 1 1 1 1 1 0 ) ĉ = 1 1 0 1 1 0 0 1 1 0 0 0 0 1 1 1 1 1 1 0 ) ˆd = 1 1 0 1 0 0 1 1 0 0 0 1

Error and flow control The basic principle in error and flow control is that the receiver acknowledges all correctly received packets. Data ACK

Stop- and- wait ARQ The receiver sends an ACK for every data packet that is correctly received. The sender transmits the next packet when it has received an ACK for the previous one. The sender uses a 8me- out for each packet. If the 8me- out expires (i.e. no ACK has arrived), the packet is retransmiwed. Packets are iden8fied with a sequence number, alterna8ng between 0 and 1. ACK is labeled with the next packet

Stop- and- wait ARQ flow diagram

Stop- and- wait ARQ inefficiency Too much wai8ng Solu8on Keep the pipe full But not too full Sliding window Size mawers Window size < 2 m

Sliding window at sender

Importance of window size 37

Go- back- N, example (lost ACK)

Go- back- N, example (lost data)

Selec8ve repeat ARQ Why? Too many retransmissions What if? Just send lost frames Higher efficiency Higher receiver complexity

Windows again

Selec8ve repeat ARQ window size

Selec8ve repeat ARQ flow diagram

Piggyback OYen the traffic goes both ways. Use the transmiwed packages to send ACK Let S n and R n be transmiwed and received sequense numbers. Use frame as below. Flag S n R n Data CRC Flag

Point- to- point protocol (PPP) Direct connec8on between two nodes Internet access Home user to ISP Telephone line Cable TV PPP

State transi8ons in PPP We need more protocols LCP LCP AP Data NCP

PPP frame format Support for several (sub)protocols Address & control not used Maximum payload 1500 bytes

Link control protocol (LCP) Establish Configure Terminate

Authen8ca8on protocols (AP) Password authen8ca8on (PAP)

Authen8ca8on protocols (AP) Challenge handshake authen8ca8on (CHAP)

Network control protocols (NCP) Prepara8ons for the network layer IPCP for Internet

IP datagram encapsula8on in PPP

PPP session example

PPP session example (cont d)