Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Similar documents
Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Physical and Data Link layers

Physical and Data Link layers. Youki Kadobayashi Graduate School of Information Science Nara Institute of Science and Technology

CS 4453 Computer Networks Winter

Data Link Layer: Overview, operations

Chapter 3. The Data Link Layer

Introduction to Computer Networks. 03 Data Link Layer Introduction

Physical and Data Link layers

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

3. Data Link Layer 3-2

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

PART III. Data Link Layer MGH T MGH C I 204

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Inst: Chris Davison

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

CS422 Computer Networks

Telematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:

DATA LINK LAYER UNIT 7.

CSE 123: Computer Networks

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

Protocol Principles. Framing, FCS and ARQ 2005/03/11. (C) Herbert Haas

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Links. CS125 - mylinks 1 1/22/14

CSCI-1680 Link Layer I Rodrigo Fonseca

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

5th Slide Set Computer Networks

CSE 461: Framing, Error Detection and Correction

Additional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No.

Networking Link Layer

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

ISO/OSI Reference Model. Data Link Layer. 7. Application. 6. Presentation. 5. Session. 4. Transport. 3. Network. 2. Data Link. 1.

Lecture 5: Data Link Layer Basics

The Data Link Layer Chapter 3

The MAC Address Format

Medium Access Control in Wireless Sensor Networks

OSI Reference Model. Application Layer. Presentation Layer. Session Layer. Chapter 4: Application Protocols. Transport Layer.

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Chapter 3 The Data Link Layer

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Medium Access Control in Wireless Sensor Networks

Informal Quiz #01: SOLUTIONS

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

Telecom Systems Chae Y. Lee. Contents. Flow Control Error Detection/Correction Link Control (Error Control) Link Performance (Utility)

CSE 123A Computer Networks

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CPE 548 Exam #1 (50 pts) February 17, 2016

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

UNIT II DATA LINK LAYER 10

Jaringan Komputer. Data Link Layer. The Data Link Layer. Study the design principles

Lecture / The Data Link Layer: Framing and Error Detection

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

INF Data Communication Data Link Layer

Outline. EEC-484/584 Computer Networks. Data Link Layer Design Issues. Framing. Lecture 6. Wenbing Zhao Review.

KINGS COLLEGE OF ENGINEERING

1. Data Link Layer Protocols

From Signals to Packets Computer Networking. Link Layer: Implementation. Datalink Functions. Lecture 5 - Coding and Error Control

Computer Networking. Lecture 4 - Coding and Error Control

Data Link Control. Surasak Sanguanpong Last updated: 11 July 2000

UNIT I FUNDAMENTALS & LINK LAYER

Data Link Layer Overview

CS 455/555 Intro to Networks and Communications. Link Layer

Lecture 3: Data Link. (A. Pattavina, Chapter 4 and 15) Ilenia Tinnirello

CSC 401 Data and Computer Communications Networks

William Stallings Data and Computer Communications. Chapter 7 Data Link Control

Data Link Control Protocols

QUESTION BANK EVEN SEMESTER

Some portions courtesy Robin Kravets and Steve Lumetta

Where we are in the Course

CSE123A discussion session

Data Link Layer (1) Networked Systems 3 Lecture 6

Flow control: Ensuring the source sending frames does not overflow the receiver

UNIT-II 1. Discuss the issues in the data link layer. Answer:

Data Link Layer Overview

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

Chapter 5 Data-Link Layer: Wired Networks

Data Link Layer Overview

The Link Layer and LANs. Chapter 6: Link layer and LANs

Chapter 5 Link Layer and LANs

The Data Link Layer. Data Link Layer Design Issues

From Signals to Packets Computer Networking. Link Layer: Implementation. Network Delay. 06-datalink.ppt, , Fall

Data Link Layer Overview

CS254 Network Technologies. Lecture 2: Network Models & Error Detection and Correction. Dr Nikos Antonopoulos

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Computer and Network Security

Packet/Frame, Error Detection How to send data efficiently & reliably?

INF Data Communication Data Link Layer

Communication Networks. Part I

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L4 Data link (part 1)

Transcription:

Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science I / 3 1 I / 3 2 Role of the data-link layer Communications between hosts over the same transmission media communication between hosts over the same physical media shared media point-to-point connection Physical connection type does not always correspond to a communication model. Especially Ethernet. Role of the data-link layer Using physical layer service to provide communication function. packet switching datalink frame Interface for the network layer network data link introduction of the concept of packet address-based node identification semantic communication control physical I / 3 3 I / 3 4 Functions of the data link layer Frame synchronization Error detection, error correction ARQ, flow control Addressing Link management Function of the physical layer Providing minimal functions to use the digital wire. Per-bit transmission and correcting error Input: bit sequence, Output: bit sequence Direct control over electrical or optical signal transmission medium Remarkable points transmission medium maximum transmission distance multiplexing cost I / 3 5 I / 3 6

Frame Datalink layer protocol data unit (PDU) Defining the frame borders. Can determine failure (bit error) root cause Adding error-detecting / error-correcting code to bit sequences in order to delimit the appropriate frame length Frame header error detection and flow control control information 01111110 address control data checksum 01111110 Frame synchronization (1) Character-based frame synchronization Physical layer transmits data based on character unit. CCITT X.21 physical layer frame is 8bit coding format ASCII(IA5) Insertion of a special character at the header and footer of the data transmission. STX, ETX Data identification by DLE (Data Link Escape) transmission of binary data character stuffing header payload I / 3 7 I / 3 8 Frame synchronization (2) Original Data Transmission Sequence DLE ETX DLE DLE DLE STX DLE data frame character stuffing transmission Frame synchronization (3) Bit-sequence-based frame synchronization A special bit sequence is inserted to the data header and footer. synchronization bit stuffing special bit sequence only appears at the frame header and footer e.g. special bit sequence 01111110 01111110 address control data checksum 01111110 I / 3 9 I / 3 10 Frame synchronization (4) Original Data Transmission Sequence end bit pattern start bit pattern transmission Error Control Goal Detecting and correcting transmission error in channel Is the frame correctly sent? Is the frame sequence order correct? Technology Introducing the concept of frame (failure localization) Coding technology Error Correction Code Error Detection Code Protocol technology timer retransmission bit stuffing I / 3 11 I / 3 12

Error detection code bit error parity method is typical example ASCII is a 7-bit code representation. Parity bit is the 8th bit. Even parity: even number odd parity: odd number of Detecting single bit error in 8-bit frame is possible burst error consecutive bits error Usually caused by electrical noise of a network adaptor or a switching equipment Widespread use of cyclic code. CRC (Cyclic Redundancy Check code) Existence of several standards. FEC (Forwarded Error Correction) CRC (1) Adds a failure detection CRC check bit after the frame. Polynomial representation of the bit sequence. n-bit sequence (a n-1 1, a 0 ) a i : 0 or 1 polynomial expression F(x)=a n-1 x n-1 2 x 2 +a 1 x+a 0 Calculates polynomial expression. modulo 2 equivalent to an exclusive OR I / 3 13 I / 3 14 CRC (2) Calculation procedure Generate the generator polynomial G(x) of order r (r < m) In the case a node sends an m-bit frame, the polynomial expression is M(x) (order m-1) Generate x r M(x) by adding r Calculate a remainder R(x) by dividing the polynomial expression x r M(x) by G(x). CRC (3) Error detection F(x) is always divisible by G(x) If F(x) is not divisible by G(x), there is a remainder Burst error less than r-bit long is detectable Other remainders depend on G(x) Generate F(x), the code to be sent F(x) = x r M(x) + R(x) I / 3 15 I / 3 16 Standardized CRC (1) Typical standards CRC-12 x 12 +x 11 +x 3 +x 2 +x+1 CRC-16 x 16 +x 15 +x 2 +1 CRC-32 x 32 +x 26 +x 23 +x 22 +x 16 +x 12 + x 11 +x 10 +x 8 +x 7 + x 5 +x 4 +x 2 +x+1 CRC-CCITT x 16 +x 12 +x 5 +1 Standardized CRC (2) Application CRC-12 for 6-bit character expression CRC-16 and CRC-CCITT for 8-bit character expression Detection Characteristics (CRC-16 and CRC-CCITT) all single- and two-consecutive-bit errors all odd-bit number errors burst errors less than 16-bit long 99.997% of burst errors less than 17-bit 99.998% of burst errors more than 18-bit There exist many other CRC standards. I / 3 17 I / 3 18

Error Correction Code Retransmission Error Correction Code hamming code distance between codes -bit error detection >a+1 b -bit error correction >2b+1 1 1 b a For error control Receiver-side frame error detection Sender has to send the same frame once more retransmission Many implementation methods ARQ (Automatic Repeat request) Fundamental protocols Stop-and-wait Go-back-N Selective-repeat I / 3 19 I / 3 20 Stop-and-wait ARQ (1) Stop-and-wait ARQ (2) Sender t 1 t 2 t 3 t 1 t 4 t 1 : Round Trip Time t 2 : Frame Transmission Time t 3 : Frame Processing Time t 4 : ACK Transmission Time t 5 : ACK Processing Time t 5 Receiver Procedure Waiting to receive ACK on each frame transmission Setting a sender timer greater than 2t 1 +t 2 +t 3 +t 4 Retransmission when sender timer times out. Characteristics Simple The buffer never contains more than one frame for the receiver and the sender Line usage rate is extremely bad I / 3 21 I / 3 22 Go-back-N ARQ (1) Procedure Improving Stop-and-Wait Protocol. Transmitting a frame in series. Error detection A frame in which an error has been detected is dropped until the frame is correctly received. Go-back-N ARQ (2) Time out for Frame3!! 1 2 3 4 5 3 4 5 6 No ACK is returned until the frame is correctly received. 1 2 4 5 3 4 5 6 I / 3 23 I / 3 24

Go-back-N ARQ (3) Characteristics Wastefulness : upon error detection, correct frames received after the error are also dropped. Especially, setting a bigger value to the retransmission timer is a disadvantage. On the sender side, a buffer is necessary for retransmission. For frames that did not receive an ACK, buffering is necessary to enforce retransmission. -back-n corresponds to the number of frames sent without receiving an ACK (on-the-fly frames) Buffer depends on the retransmission timer value. Selective-repeat ARQ (1) Methods Improving Go-back-N protocol. Only retransmitting necessary frames (erroneous frames). Characteristics Transmission efficiency is better than Go-back-N. Not dropping correct frames uselessly. Processing is complex. Needs a buffer on the receiver side. Frame sequence control is necessary. I / 3 25 I / 3 26 Selective-Repeat ARQ (2) Time out for Frame3!! 1 2 3 4 5 3 6 7 8 1 2 4 5 3 6 7 8 Flow control Stop-and-Wait and Go-back- processing on the receiver side. In Selective-Repeat, sequence control is enforced on the receiver side. Buffer on the receiver side When sender-side processing does not perform well, there is a possibility that an overflow occurs on the receiver side. Flow control Overflow control between the receiver and sender using some methods. I / 3 27 I / 3 28 Window Flow Control Window flow control W : window size Considering a same buffer size for the receiver. On sender side, let Nr be in (1)the number of already sent frames, (2) those that did not receive an ACK. Transmitting until Nr < W sliding window flow control Windows Flow Control Sender keep frame until ACK is received sent frame sendable frame maximum size W) 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 already received ACK last sent frame if sent If ACK is received move to right move to right Receiver received frame receivable frame maximum size W) 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 I / 3 29 already transmitted ACK last received frame if received if ACK is sent move to I right move / 3 to right 30

Fundamental functions of data link layer Providing fundamental functions for packet switching Using transmitting functions provided by the physical layer, enables packet level switching. Exchanging frames Identifying nodes by address Providing a data forwarding function that takes the characteristics of the physical layer into account. Stable data transmission. Propagation delay Errors Interface for network layer. Especially, when a common interface is provided, the difference of medium can be absorbed. IEEE802.2 and IEEE802.x From monolithic structure to sub-layered structure Network Layer Data link Layer Physical Layer Logical Link Control Sublayer Media Access Control Sublayer ISO/OSI Local Area Network Definitions (8802) 8802/3 CSMA/CD 8802/2 LLC 8802/4 Token Bus 8802/5 Token Ring CCITT Datalink Layer Definition CCITT X.25 (HDLC/LAPB) I / 3 31 I / 3 32 From monolithic structure to sub-layered structure Datalink basic concepts were formed from the technologies using point-to-point connection type datalink back in the 1960s. LAN standardization from the late 1970s moved to sub-layered structure. Architecture of ISO/OSI 8802 and IEEE802 groups. Constructing a common IEEE802.2 (ISO8802/2) Logical Link Control (LLC) IEEE802.x specialized for each medium Data link layer structure Divided into sub-layers Which function provided by which sub layer? http://standards.ieee.org/getieee802/ 802.3 CSMA/CD IEEE 802.2 LLC 802.11 WLAN 802.16 WMAN LLC: Logical Link Control MAC: Medium Access Control 802.3u 802.3ae 802.11a 802.11b 802.16a PHY: Physical Layer I / 3 33 I / 3 34 Data-link layer service model Unacknowledged Connectionless Service (LLC type1) Transmitting frame without synchronization between sender and receiver. No special processing, upon error detection. Enforcing error control in upper layers. Control method for high speed and errorless links. LAN, real-time traffic (voice/speech) Acknowledged Connection-oriented Service (LLC type2) Setting up a connection, before data transmission Enabling synchronized processing between sender and receiver Ensuring reliability (error and sequence) Processing is usually complex For low speed and error-prone links Data-link layer service model Acknowledged connectionless Service (LLC type3) Receiver sends ACK for each frame. Enforcing error control at data-link layer level Improving reliability Unacknowledged Connection-oriented Service Not ensuring reliability (error and sequence) Control method for high speed and errorless links. I / 3 35 I / 3 36

Role allocation with upper layers In which layer implementation is realized is up to design choices. Various solutions exist Transport Network Data Link sequence assurance flow control retransmission surveillance of network error detection and correction frame range I / 3 37 Conclusion Introduced fundamental technology of data-link layer Flow Control Fundamental protocols, ARQ Data-link layer structure Evolution from monolithic structure to sub-layered structure LLC, MAC Existing various forms of function redundancy/ assignment with upper layers. These technologies are used in another layers e.g. network layer, transport layer General technology I / 3 38