Data Link layer (CN chap 3.1, 3.4, 3.6)

Similar documents
The Data Link Layer. Data Link Layer Design Issues

Chapter 3. The Data Link Layer

Data Link Layer, Part 4. Exemplary Protocols

Flow control: Ensuring the source sending frames does not overflow the receiver

The Data Link Layer Chapter 3

Chapter 3. The Data Link Layer

06/05/2008. Chapter 3. The Data Link Layer. Data Link Layer Design Issues. Services Provided to the Network Layer. Error Control Flow Control

CS422 Computer Networks

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Jaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles

POINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

Chapter 3 The Data Link Layer

DLL: Flow Control DLL. Simplex. Fast sender / slow receiver scenario. Various protocols used. Simplified examples implemented in C.

The Data Link Layer Chapter 3

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

Data Link Layer. Indian Institute of Technology Madras

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

3. Data Link Layer 3-2

DATA LINK LAYER UNIT 7.

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

CS 4453 Computer Networks Winter

UNIT IV -- TRANSPORT LAYER

C08a: Data Link Protocols

Networking interview questions

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Control Protocols

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Chapter 11 Data Link Control 11.1

Chapter 5 Data-Link Layer: Wired Networks

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

OSI Transport Layer. objectives

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Introduction to Protocols

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays.

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.

Networking Technologies and Applications

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L4 Data link (part 1)

TSIN02 - Internetworking

Chapter 11 Data Link Control 11.1

Code No: RR Set No. 1

TSIN02 - Internetworking

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2

Telecommunication Protocols Laboratory Course

Point-to-Point Protocol (PPP)

Chapter 5 TCP/IP SUITE

NT1210 Introduction to Networking. Unit 10

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

ET4254 Communications and Networking 1

Final Exam. Course Grade

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

TCP /IP Fundamentals Mr. Cantu

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Inst: Chris Davison

Different Layers Lecture 20

CSE 461: Framing, Error Detection and Correction

TCP/IP Protocol Suite and IP Addressing

QUESTION BANK UNIT-I

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

Computer Networks (Unit wise Questions)

CSE 123: Computer Networks

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

Other Protocols. Arash Habibi Lashkari

Data Link Control. Outline. DLC functions

PPPoE Technology White Paper

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Data-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols

Data Link Control Protocols

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Your favorite blog : (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Study Guide. Module Two

Networking Link Layer

Introduction to TCP/IP networking

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Sequence Number. Acknowledgment Number. Data

Automatic Repeat Request Data Link Layer Traffic Management

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Interconnecting Networks with TCP/IP

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Introduction to Open System Interconnection Reference Model

Communication Networks. Part I

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Transcription:

Data Link layer (CN chap 3.1, 3.4, 3.6) The OSI model an old friend... Application Presentation Session Transport Network Data link Physical F.eks. ftp, mail, http,... handles data structures and conversion between different representation Sessions f.ex. based on login Connection oriented communication Routing from source to destination Framing of data and error detection at a low level. How to handle lost, duplicated or error packets. Transmitting raw bits. Decides how many volts and milliseconds it takes to send a bit. Data Link layer services Varying from system to system, but normally falls within one of the below three main groups: Unacknowledged connectionless service Acknowledged connectionless service Acknowledged connectionoriented service Used typically in LANs where the error rate is low, or is used for real time traffic where delayed data is worse than erroneous data. Lost packets can be retransmitted, but duplicated and out-of-sequence packets are possible. Packets are delivered guaranteed and in sequence. Notice that reliability in the Data Link layer is just an optimization in relation to leaving the retransmission work to the transport layer. However the Data Link layers packets are typically smaller than the transport layer's packets. Kristoffer Miklas, Niels Brock, Copenhagen Page 1 of 5

Framing How to define and mark a frame? Where does it start and end? Packets can be defined (marking the beginning and end) in different ways: Character count Starting and ending characters, with character stuffing Starting and ending flags, with bit stuffing Physical layer coding violations Kristoffer Miklas, Niels Brock, Copenhagen Page 2 of 5

Error detection and recovery There are many different reasons for a signal not to arrive error free. Some error sources typically produce burst errors while others changes single bits. Error detection Error recovery Discover errors by using checksums and like. The packet is discarded and may be retransmitted again. The packet contain enough redundant information for some data to be recreated in case of error. Error detecting codes parity bit CRC check Error correcting codes redundant bits to increase hamming distance Hamming discovered in 1950 a practical method to achieve the theoretically lowest possible number of redundant bits for correcting bit errors in messages. Bit number 1,2,4,8,16, (2 n ) are used for redundancy. A data bit in position k only contributes to the r bits which are members of: k being expressed as a sum of powers of 2. For example bit 11 only contributes to r bits in position 1, 2 and 8. So a bit error can be recognized as the sum of the r bits where the parity is wrong. Kristoffer Miklas, Niels Brock, Copenhagen Page 3 of 5

Data Link layer Sliding windows (CN chap 3.4) Sliding windows Data packets are given sequential numbers at send time. The sequential numbers can possible by cycled. The sender "window" starts at the lowest packet number not yet acknowledged, and ends at the highest packet number sent. The maximum size of the sender window depends on things like buffer size in the sender system. For example: ---------------- the sender window ----------------------- Packet 1 2 3 4 5 6 Acknowl edged yes no no yes no no In a similar way the receiver has a "window" with the lowest packet number not yet received. The receiver has a fixed window size (4 in the example below) and packets outside this window are ignored. ----------- the receiver window ------------ Packet 1 2 3 4 5 Received yes no no yes no Different versions of sliding windows One bit sliding window (stop and go) Pipelining Go back n Selective repeat Piggybacking of acks Kristoffer Miklas, Niels Brock, Copenhagen Page 4 of 5

Data Link protocol example PPP (CN chap 3.6) PPP - Point to Point Protocol When a newtwork GateWay Router connect to a backbone network Router, it is done buy a private leased line. PPP (or HDLC) is the protocol used between these two routers in different networks. When a home user dials with his modem (or ADSL) to an internet service provider (ISP) Router, then the home PC will use PPP to talk to the ISP Rounter. PPP is handling things like framing, error control, sliding windows, granting IP address to the home PC, checking authentication, and so on. Example: a home user connects to hsi ISP Router via modem or ADSL. After the Router accepts physical connection (bits, speed,...) the PC will send a series of LCP (Link Control Protocol) packets in the payload of some PPP frames. The LCP packets initiates the Data Link and negotiates a PPP/HDLC flavour. Now some NCP (Network Control Protocol) packets are sent inside the PPP payload. Now if the home PC wants to be a TCP/IP host the IP-NCP is used to get configuration information like IP address, network mask, DNS and GW addresses to the home PC. When the home PC wnat to finish, NCP wil close the connection, LCP will close the link, and the model/adsl will close the physical connection. Flag is standard. Payload is gyte stuffed, in HDLC payload is bit stuffed. Address is broadcast as only one station (home PC) and save setup work. Control is 00000011 which is an unnumbered frame so no SEQ-numbers or acknowledgements. (However can be negotiated for noisy conditions) Address and Control is not needed and can be negotiated lost during LCP setup. Protocol is f.ex. IP Payload is fixed and negotiated during LCP setup. Data can be padded. Checksum 2 or 4 bytes depending LCP negotiation. Kristoffer Miklas, Niels Brock, Copenhagen Page 5 of 5