24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.

Slides:



Advertisements
Similar presentations
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Advertisements

Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover.
Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
William Stallings Data and Computer Communications 7th Edition
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Transmission Control Protocol (TCP)
Chapter 7 – Data Link Control Protocols
The Data Link Layer Chapter 3. Position of the data-link layer.
20101 The Data Link Layer Chapter Design Issues Controls communication between 2 machines directly connected by “wire”-like link Services Provided.
Chapter 10 Data Link Control Protocols. Agenda Definition Functions Attributes Concepts Types Conversion.
Data Link Protocols Asynchronous Protocols Synchronous Protocols
Gursharan Singh Tatla DATA LINK PROTOCOLS 24-Mar
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
Chapter 3 THE DATA LINK LAYER
Computer Networks Chapter 11 – Data Link Control and Protocols.
Chapt 3 Data Link Layer1 Data Link Layer Functions –Provides services to network layer Well-defined interface –Framing –Flow control – between adjacent.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
UNIT-II Computer Network Data Link Layer. Data Link Layer Prepared by - ROHIT KOSHTA Data Link Layer is second layer of OSI reference model and is placed.
1 Message Delineation Identify the start and end of messages by: Identify the start and end of messages by:
Chapter 11 Data Link Protocols A data link protocol is a set of specifications used to implement the data link layer [A protocol is the set of rules or.
Eighth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
DATA LINK CONTROL PROTOCOLS. 2 Introduction Data link control layer – often abbreviated simply to data link layer – is concerned with the transfer of.
CIS : Data Link Control. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow Transmission.
Computer Interfacing and Protocols
Data Link Protocols ผศ.ดร. อนันต์ ผลเพิ่ม
Error Correction and Flow Control Martin Weiss. Slide 2 Objectives of this Meeting u Describe different flow control techniques u Describe the major error.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer.
PROTOCOL BASICS. 2 Introduction In chapter 3: Circuits and techniques can be employed to transmit a frame of information between 2 DTEs Error detection.
Chapter 4 Data Link Layer.
The Data Link Layer RIS 251 Dr. ir. S.S. Msanjila.
Computer Communication & Networks
High level Data Link Layer Protocol - HDLC
Chapter 9: Data Link Control
Data Link Layer Flow Control.
Part III Datalink Layer 10.
Data Link Layer.
Data link layer (LLC).
Topic 5: Data Link Layer - Chapter 9: Data Link Control
Chapter 3 The Data Link Layer
Chap. 4 Data link layer 2.
Data Link Layer What does it do?
CIS 321 Data Communications & Networking
Subject Name: Computer Communication Networks Subject Code: 10EC71
Data Link Layer: Data Link Control
Rivier College CS575: Advanced LANs Chapter 6: Logical Link Control
Overview Jaringan Komputer (2)
Process-to-Process Delivery:
Business Data Communications
CS412 Introduction to Computer Networking & Telecommunication
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
DATA COMMUNICATION Lecture-40.
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Error control.
Objectives of Today’s Lecture
Objectives of Today’s Lecture
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Process-to-Process Delivery: UDP, TCP
Chapter 9: Data Link Control
Data Link Layer. Position of the data-link layer.
Presentation transcript:

24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control –Error Control

24/11/1013-Datalink2 The Role of the Data Link Layer To move data across a single physical link To offer a well defined service interface to the network layer To deal with transmission errors To regulate the flow of data across the link

24/11/1013-Datalink3 Data Link Layer Services Unacknowledged Connectionless Acknowledged Connectionless Acknowledged Connection-oriented (in order of increasing reliability)

24/11/1013-Datalink4 Data Link Layer – Main Function Framing –The receiving Data Link Layer must be able to determining the start and end of frames It can do this by: Character count Start and end bits, characters or flags Physical layer coding violations Or a combination of the above

24/11/1013-Datalink5 Asynchronous Data Transmission Asynchronous data transfer sends one character at a time, whenever it is ready for transmission. The character is preceded by a start bit and followed by a stop bit There is usually a gap between characters The start and stop bit allow the receiver to synchronise with the transmitter for the transmission of a single character Data bits 1 - Mark 0 - Space Start Bit Stop Bit

24/11/1013-Datalink6 Synchronous Data Transmission Synchronous data transmission involves the transmission of data in blocks with no gaps or start/stop bits to separate bytes of data The receiver therefore has to be synchronised at all times with the transmitter in order to make any sense of the bits being received

24/11/1013-Datalink7 Asynchronous Framing Although frames are usually regarded as blocks of multiple bytes of data, asynchronous data transfer can be thought of as the transmission of a single byte frame preceded by a start bit and followed by a stop bit to allow the receiver to synchronise with the transmitter to receive one byte Long Blocks of data can also be transmitted asynchronously as a series of asynchronous characters using asynchronous data link protocols

24/11/1013-Datalink8 Asynchronous Data Link Protocols Asynchronous data transmission was at one time very commonly used with modems but was not very suitable for applications such as file transfers due to the lack of powerful error checking A number of simple asynchronous data link protocols were developed to transfer blocks of data reliably over asynchronous links Examples are XMODEM, YMODEM, ZMODEM, BLAST and Kermit They can also be used with synchronous data links which are more common today

24/11/1013-Datalink9 Character-oriented and Bit-oriented Framing Synchronous Data Link protocols can be classified according to whether they are character-oriented or bit oriented Character-oriented protocols transmit data as a series of characters. Header fields are also a series of characters. E.g. IBM’s Binary Synchronous Communications (BSC or Bisynch = ISO’s Basic Mode) Bit oriented protocols transmit data as a series of bits (not necessarily in multiples of 8). Header fields are binary. E.g. Synchronous Data Link Control (SDLC), High-level Data Link Control (HDLC), Point-to-Point Protocol (PPP) and LAN protocols

24/11/1013-Datalink10 Frame Delimiters Character oriented protocols such as BSC use the ASCII characters SYN SYN (Synchronise) followed by SOH (Start of Header) to start a frame header, STX (Start of Text) to start the data field and ETX (End of Text) to end a frame Bit oriented protocols such as HDLC use an 8 bit flag ( ) to start and end a frame. The flag is also continuously transmitted when the link is idle to maintain synchronisation

24/11/1013-Datalink11 Data Transparency If characters or sequences of bits are used to delimit frames there is a problem if it is necessary to transmit these characters or sequence of bits within the data of the frame This is a problem of data transparency. It must be possible to transmit any combination of characters/bits Problem can be overcome with byte or bit stuffing

24/11/1013-Datalink12 Byte Stuffing With BSC, DLEs can be inserted before STX and ETX. Everything between these DLEs must be transparent BSC uses byte stuffing to provide data transparency for DLEs in the data Whenever a DLE appears in the data, the transmitter stuffs another DLE into the data Whenever the receiver sees receives two DLEs, it unstuffs one of them © Tanenbaum, Prentice Hall International

24/11/1013-Datalink13 Bit stuffing Bit oriented protocols use bit stuffing to provide data transparency so that data is not confused with flags Whenever the sender encounters 5 consecutive 1s, a 0 is stuffed into the data to make Whenever the receiver sees 5 1s followed by a 0 it unstuffs the 0 © Tanenbaum, Prentice Hall International

24/11/1013-Datalink14 Data Link Layer Standard Functions Encapsulation Addressing Connection Control Ordered Delivery Flow Control Error Control

24/11/1013-Datalink15 Encapsulation The Data Link Layer encapsulates data from the network layer (i.e. a Network Layer Packet is transmitted inside a Data Link Layer Frame) Most Data Link Layer protocols, not only have a header, but have a trailer as well. The trailer is used for error detection

24/11/1013-Datalink16 Addressing Many Data Link protocols have either been designed to work over a shared medium or can trace their origins back to terminal to host networks which used point-to- multipoint links. All Data Link protocols have an address field even when designed for use on a point to-point link

24/11/1013-Datalink17 Connection Control Some Data Link Protocols (such as HDLC, SDLC and PPP) are connection-oriented. They require a link set-up phase before data can be transferred and a link disconnection phase when data no longer needs to be sent The establishment and disconnection of the link are achieved through special frames known as supervisory frames which carry no data These protocols will guaranty the delivery of data in order and without loss or duplication

24/11/1013-Datalink18 Ordered Delivery Ordered delivery is achieved through sequence numbering of information frames and the retransmission of errored frames

24/11/1013-Datalink19 Flow Control X-on/X-off –Only used with asynchronous transmission –When receiver wants to stop transmitter it sends an X-off character (CTRL-S) and when it wants the transmitter to restart it sends X-on (CTRL-Q) Stop and Wait –Each frame must be positively acknowledged before another frame can be sent Sliding Window –The sliding window mechanism allows a number of frames (up to the maximum window size) to be transmitted without acknowledgement

24/11/1013-Datalink20 Error Control Error Detection –Vertical Redundancy Check (Parity Bit) –Longitudinal Redundancy Check –Cyclical Redundancy Check These error detection techniques will be covered in detail in a workshop For unacknowledged connectionless data link service, errored frames are simply discarded and higher layers are relied upon to retransmit data

24/11/1013-Datalink21 Error Control Error Correction Techniques –Echoplexing Used in asynchronous terminal transmission. Characters are echoed back to the user from host. Requires a full duplex link and relies on user to detect and recover from errors –Forward Error Correction Redundant bits are used to allow recovery from burst errors. Such techniques are useful where the media is very unreliable (E.g. Hamming Codes which will be covered in a workshop) –Automatic Repeat reQuest (ARQ) Idle RQ Continuous RQ –Go Back N –Selective Repeat

24/11/1013-Datalink22 IDLE RQ (Stop and Wait ARQ) BSC is an example of an Idle RQ protocol Idle RQ works in half duplex mode Transmitter will transmit the next information frame only after receipt of ACK (Acknowledgement Frame) If a frame is lost, receiver will not acknowledge it and the transmitter will retransmit it after a timeout If a frame is damaged the receiver can transmit a NAK (Negative Acknowledgement) frame If an ACK or NAK is lost, transmitter will retransmit after timeout

24/11/1013-Datalink23 IDLE RQ (Stop & Wait RQ) © Forouzan, McGraw Hill

24/11/1013-Datalink24 Continuous RQ Continuous RQ gives better performance as it uses a sliding window where the transmitter can transmit up to the window size of unacknowledged information frames An acknowledgement signals the next frame expected Continuous RQ requires a full duplex link With Go Back N, if a frame is corrupted or lost, the transmitter must retransmit all the subsequent information frames With Selective Repeat, only the corrupted or lost frame is retransmitted

24/11/1013-Datalink25 Go Back N with Damaged Frame © Forouzan, McGraw Hill

24/11/1013-Datalink26 Go Back N with Lost Frame © Forouzan, McGraw Hill

24/11/1013-Datalink27 Go Back N with Lost ACK © Forouzan, McGraw Hill

24/11/1013-Datalink28 Selective Repeat with Damaged Frame © Forouzan, McGraw Hill

24/11/1013-Datalink29 Selective Repeat Lost Frames are discovered when frames are received out of sequence and a NAK is transmitted for the missing frame. The receiver will buffer any subsequent frames and wait for the lost frame to be resent Lost ACKs and NAKs are handled in the same way as Go Back N. The data frames are retransmitted after a timeout

24/11/1013-Datalink30 Go Back N versus Selective Repeat Selective Repeat appears to be more efficient as frames are not retransmitted unnecessarily However the complexity of the code required for sorting and storing frames outweighs many of the advantages Selective Repeat is often not used in practice