Similar documents
Data and Computer Communications

Chapter 6 Digital Data Communications Techniques

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

Data Link Control Protocols

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

INTERNET ARCHITECTURE & PROTOCOLS

Chapter 7: Data Link Control. CS420/520 Axel Krings Page 1

Chapter 7: Data Link Control. Data Link Control Protocols

This Lecture. BUS Computer Facilities Network Management. Line Discipline. Data Link Layer

Flow control: Ensuring the source sending frames does not overflow the receiver

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

4. Error correction and link control. Contents

3. Data Link Layer 3-2

Data Link Control. Claude Rigault ENST Claude Rigault, ENST 11/3/2002. Data Link control 1

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

DATA LINK CONTROL PROTOCOLS

Data Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

Data Link Control Protocols

Data Link Layer (part 2)

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

TYPES OF ERRORS. Data can be corrupted during transmission. Some applications require that errors be detected and corrected.

CEG3185 TUT6. Prepared by Zhenxia Zhang Revisited by Jiying Zhao

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Data Link Protocols DATA LINK PROTOCOLS. Asynchronous Protocols. Types of Data Link Protocols XMODEM. Asynchronous Protocols.

Chapter 3. The Data Link Layer

Transmission SIGNALs

Chapter 5 Data-Link Layer: Wired Networks

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

HDLC. King of the Link 2005/03/11. (C) Herbert Haas

Data Link Control. Surasak Sanguanpong Last updated: 11 July 2000

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

Data Link Layer: Overview, operations

DATA LINK LAYER UNIT 7.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

HDLC (High level Data Link Control)

Line Protocol Basics. HDLC (High level Data Link Control) Agenda. Additional Issues

The University of Sydney AUSTRALIA. Advanced Communication Networks

DATA LINK LAYER: NEED

Inst: Chris Davison

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Local Networks. Lecture 4 6-Apr-2016

Advantages and disadvantages

INF Data Communication Data Link Layer

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

HDLC PROTOCOL. Michel GARDIE

CS422 Computer Networks

HDLC. Telecom Systems Chae Y. Lee

Chapter 5 Peer-to-Peer Protocols. School of Info. Sci. & Eng. Shandong Univ..

Chapter 11 Data Link Control 11.1

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

The Data Link Layer Chapter 3

Data Communications & Computer Networks. Digital Data Communications Techniques

The flow of data must not be allowed to overwhelm the receiver

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

INTERNATIONAL TELECOMMUNICATION UNION. SERIES X: DATA COMMUNICATION NETWORKS: SERVICES AND FACILITIES, INTERFACES Interfaces

Other Data Link Protocols: Computer Networks by Prof Kamal K Mehta Associate Professor Dept of Computer Science & Engineering

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

OSI Reference Model. Application Layer. Presentation Layer. Session Layer. Chapter 4: Application Protocols. Transport Layer.

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks

Jaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles

Data Link Layer (1) Networked Systems 3 Lecture 6

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CONNECTION-ORIENTED & CONNECTIONLESS NETWORKS

Chapter 11 Data Link Control 11.1

PART III. Data Link Layer MGH T MGH C I 204

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

(Refer Slide Time: 2:20)

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

CS 4453 Computer Networks Winter

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

CSE 461: Framing, Error Detection and Correction

INTERNATIONAL TELECOMMUNICATION UNION. SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATION Public data networks Interfaces

COMPUTER NETWORKS UNIT-3

)454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU

Protocol Principles. Framing, FCS and ARQ 2005/03/11. (C) Herbert Haas

CS 455/555 Intro to Networks and Communications. Link Layer

Introduction to Computer Networks. 03 Data Link Layer Introduction

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

CSE 123: Computer Networks

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Institute of Computer Technology - Vienna University of Technology. L02 - Protocol Principles

INTERNATIONAL TELECOMMUNICATION UNION. SERIES Q: DIGITAL SUBSCRIBER SIGNALLING SYSTEM No. 1 (DSS 1), DATA LINK LAYER

Appendix. Pioneering Protocols

Data Link Layer Overview

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Telecommunication Protocols Laboratory Course

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Chapter 9: Data Transmission

Automatic Repeat Request Data Link Layer Traffic Management

The Data Link Layer Chapter 3

Transcription:

ET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu

Learning Objectives Identify methods of detecting errors. Use Hamming code for error correction. Describe flow control techniques such as stop and wait, and sliding-window. Discuss the concept of error control. Apply ARQ mechanisms to control errors.

Data and Computer Communications Chapter 6 Digital Data Communications Techniques Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education - Prentice Hall, 2011

Digital Data Communications Techniques A conversation forms a two-way communication link; there is a measure of symmetry ybetween the two parties, and messages pass to and fro. There is a continual stimulus-response, cyclic action; remarks call up other remarks, and the behavior of the two individuals becomes concerted, co-operative, and directed toward some goal. This is true communication. On Human Communication, Colin Cherry

Asynchronous and Synchronous Transmission timing i problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit intervals if clocks are not precisely aligned, drifting will sample at wrong time after sufficient bits are sent two solutions to synchronizing clocks:

Asynchronous Transmission data are transmitted one character at a time each character is 5 to 8 bits in length receiver has the opportunity to resynchronize at the beginning of each new character simple and cheap requires overhead of 2 or 3 bits per character (~20% ~20%) the larger the block of bits, the greater the cumulative timing error good for data with large gaps (keyboard)

Asynchronous Transmission

Synchronous Transmission block of bits transmitted in a steady stream without start and stop codes clocks must be synchronized to prevent drift can use separate clock line embed clock signal in data need to indicate start and end of block use preamble and postamble bit patterns frame is data plus preamble, postamble, and control information more efficient than asynchronous for large blocks of data

Types of Error an error occurs when a bit is altered between transmission and reception binary 1 is transmitted and binary 0 is received or binary 0 is transmitted and binary 1 is received single bit errors isolated error that alters one bit but not nearby bits caused by white noise burst errors contiguous sequence of B bits where first and last bits and any number of intermediate bits are received in error caused dby impulse noise or by fading in wireless effects greater at higher data rates

Error Detection regardless of design you will have errors can detect errors by using an error- detecting code added by the transmitter code is also referred to as check bits recalculated and checked by receiver still chance of undetected error parity parity bit set so character has even (even parity) or odd (odd parity) number of ones even number of bit errors goes undetected

Parity Check the simplest error detecting scheme is to append a parity bit to the end of a block of data if any even number of bits are inverted due to error, an undetected error occurs

Error Detection Process

Cyclic Redundancy Check (CRC) one of most common and powerful checks for block of k bits transmitter generates an n bit frame check sequence (FCS) transmits k+n bits which h is exactly divisible i ibl by some predetermined number receiver divides frame by that number if no remainder, assume no error

Error Correction correction of detected errors usually requires data block to be retransmitted not appropriate for wireless applications bit error rate is high h causing lots of retransmissions i propagation delay long (satellite) compared with frame transmission time, resulting in retransmission of frame in error plus many subsequent frames need to correct errors on basis of bits received codeword d on the transmission end each k-bit block of data is mapped into an n-bit block (n > k) using a forward error correction (FEC) encoder

Error Correction Process

How Error Correction Works adds redundancy to transmitted message redundancy makes it possible to deduce original message despite some errors block error correction code

Line Configuration - Topology topology refers to the physical arrangement of stations point to point - two stations such as between two routers / computers multi point - multiple stations traditionally mainframe computer and terminals now typically a local area network (LAN)

Line Configuration - Topology

Line Configuration - Duplex data exchanges classified as half or full duplex half duplex (two-way way alternate) only one station may transmit at a time requires one data path full duplex (two-way way simultaneous) simultaneous transmission and reception between two stations requires two data paths separate media or frequencies used for each direction

Summary asynchronous & synchronous transmission i asynchronous data transmitted one character at a time synchronous block of bits transmitted in steady stream without start and stop codes error detection and correction single bit error and error burst error detecting codes parity and cyclic redundancy d check (CRC) line configurations topology full duplex and half duplex

Data and Computer Communications Chapter 7 Data Link Control Protocols Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education - Prentice Hall, 2011

Data Link Control Protocols Great and enlightened one, said Ten-teh, as soon as his stupor was lifted, has this person delivered his message competently, for his mind was still a seared vision of snow and sand and perchance his tongue has stumbled? Bend your ears to the wall, replied the Emperor, and be assured. Kai Lung's Golden Hours, g G, Earnest Bramah

Data Link Control Protocols when sending data, to achieve control, a layer of logic is added above the Physical layer data link control or a data link control protocol to manage exchange of data over a link: frame synchronization flow control error control addressing control and data link management

Flow Control ensure sending entity does not overwhelm receiving entity prevent buffer overflow influenced by: transmission time time taken to emit all bits into medium propagation time propagation time time for a bit to traverse the link assumption is all frames are successfully received with no frames lost or arriving with errors

Model of Frame Transmission

Stop and Wait simplest form of flow control works well for a message sent in a few large frames stop and wait becomes inadequate if large block of data is split into small frames by source

Stop and Wait Link Utilization

Sliding Windows Flow Control allows multiple numbered frames to be in transit receiver has buffer W long transmitter sends up to W frames without ACK ACK includes number of next frame expected sequence number is bounded by size of field (k) frames are numbered ed modulo oduo 2 k giving max window size of up to 2 k 1 receiver can ACK frames without permitting further transmission (Receive Not Ready) must send a normal acknowledge to resume if have full-duplex link, can piggyback ACKs

Sliding Window Diagram

Sliding Window Example

Error Control Techniques error detection detection and correction of errors such as: negative acknowledgement & retransmission positive acknowledgment retransmission i after timeout lost frames -a frame fails to arrive at the other side damaged frames -frame arrives but some of the bits are in error

Automatic Repeat Request (ARQ) collective name for error control mechanisms effect of ARQ is to turn an unreliable data link into a reliable one versions of ARQ are: stop-and-wait go-back-n selective-reject

Stop and Wait ARQ source transmits single frame waits for ACK no other data can be sent until destination s s reply arrives if frame received is damaged, discard it transmitter has timeout if no ACK within timeout, retransmit if ACK is damaged, transmitter will not recognize transmitter will retransmit receiver gets two copies of frame use alternate numbering and ACK0 / ACK1

Stop and Wait ARQ pros simplistic cons inefficient i

Go-Back-N ARQ most commonly used error control based on sliding-window use window size to control number of outstanding frames if no error, ACK as usual if error, reply with rejection destination will discard that frame and all future frames until frame in error is received correctly transmitter must go back and retransmit that t frame and all subsequent frames

Go Back N - Handling Damaged frame error in frame i so receiver rejects frame i transmitter retransmits frames from i Lost frame frame i lost and either transmitter sends i+1 and receiver gets frame i+1 out of sequence and rejects frame i or transmitter times out and sends ACK with P bit set which receiver responds to with ACK i transmitter then retransmits frames from i

Go Back N - Handling Damaged Acknowledgement Damaged Rejection receiver gets frame i, sends ACK (i+1) which is lost reject for damaged frame is lost ACKs are cumulative, so next ACK (i+n) may arrive before transmitter times out on frame i handled as lost frame when transmitter times out if transmitter times out, it sends ACK with P bit set can be repeated a number of times before a reset procedure is initiated

Selective-Reject (ARQ) also called selective retransmission only rejected frames are retransmitted subsequent frames are accepted by the receiver and buffered minimizes retransmission receiver must maintain large enough buffer more complex logic in transmitter less widely used useful for satellite links with long propagation delays

Go-Back-N vs. Selective Reject

High Level Data Link Control (HDLC) most important data link control protocol specified as ISO 3009, ISO 4335 basis for other data link control protocols station types: Primary - controls operation of link Secondary - under control of primary station Combined - issues commands and responses link configurations Unbalanced - 1 primary, multiple secondary Balanced - 2 combined stations

HDLC Transfer Modes Normal Response Mode (NRM) used with an unbalanced configuration primary initiates transfer Asynchronous Balanced Mode (ABM) used with a balanced configuration either station initiates transmission has no polling overhead most widely used Asynchronous Response Mode (ARM) used with unbalanced configuration secondary may transmit without t permission i from primary rarely used

HDLC Frame Structure uses synchronous transmission transmissions are in the form of frames single frame format used

Flag Fields and Bit Stuffing delimit frame at both ends with 01111110 receiver hunts for flag sequence to synchronize bit stuffing used to avoid confusion with data containing flag sequence 01111110 0 inserted after every sequence of five 1s if receiver detects five 1s it checks next bit if next bit is 0, it is deleted (was stuffed bit) if next bit is 1 and seventh bit is 0, accepted as flag if sixth and seventh bits 1, sender is indicating abort

Address Field identifies secondary station that transmitted or will receive frame usually 8 bits long may be extended to multiples of 7 bits leftmost bit indicates if is the last octet (1) or not (0) address 11111111 allows primary to broadcast

Control Field different frame types Information - data transmitted to user (next layer up) flow and error control piggybacked on information frames Supervisory - ARQ when piggyback is not used Unnumbered - supplementary link control functions first 1-2 bits of control field identify frame type

Control Field use of Poll/Final (P/F) bit depends on context in command frame P bit set to 1 to solicit (poll) response from peer in response frame F bit set to 1 to indicate response to soliciting command sequence number usually 3 bits can extend to 8 bits as shown below

Information and Frame Check Sequence (FCS) Fields Information o Field in I-frames and some U-frames must contain integral number of octets variable length Frame Check Sequence Field (FCS) used for error detection either 16 bit CRC or 32 bit CRC

HDLC Operation consists of exchange of I-frames, S-frames and U-frames involves three phases Initialization either side may request by issuing one of the six setmode commands Data Transfer with flow and error control using both IandS- frames (RR, RNR, REJ, SREJ) Disconnect when fault noted or at request of higher- layer user sends a disconnect (DISC) frame

HDLC Operation Example

HDLC Operation Example

data link protocols Summary frame synchronization flow control stop-and and-wait, sliding window ACK frame error control lost frame, damaged frame stop-and and-wait, go-back-n, selective-reject t ARQs HDLC NRM, ABM,ARM