Where we are in the Course

Slides:



Advertisements
Similar presentations
Lecture 12 Layer 2 – Data Link Layer Protocols
Advertisements

The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
I N THE N AME OF G OD C OMPUTER N ETWORKS C HAPTER 3: T HE D ATA L INK L AYER Dr. Shahriar Bijani Shahed University March 2014.
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 10 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao Cleveland State University
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
The OSI Reference Model
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Reliability and Channel Coding
Adapted from Tanenbaum's Slides for Computer Networking, 4e The Data Link Layer Chapter 3.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
NETWORKING CONCEPTS. DATA LINK LAYER Data Link Control main functions of the data link layer are Data link control media access control. Data link control.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
CSE331: Introduction to Networks and Security Lecture 3 Fall 2002.
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
CS3502: Data and Computer Networks DATA LINK LAYER - 1.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
Part 2: Packet Transmission Packets, frames Local area networks (LANs) Wide area networks (LANs) Hardware addresses Bridges and switches Routing and protocols.
جلسه هشتم شبکه های کامپیوتری به نــــــــــــام خدا.
Chapt 3 Data Link Layer1 Data Link Layer Functions –Provides services to network layer Well-defined interface –Framing –Flow control – between adjacent.
Data Link Layer : Services, Framing, Error Detection and Correction2.
CS 453 Computer Networks Lecture 9 Layer 2 – Data Link Layer.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
ECE453 – Introduction to Computer Networks Lecture 4 – Data Link Layer (I)
Layer Two Data Link Layer Collects bits from layer 1 and organizes into frames Passes bits that make up frames to layer 1 for transmission Concerned with.
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
CSE 461 University of Washington1 Where we are in the Course Finishing off the Link Layer! – Builds on the physical layer to transfer frames over connected.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Detection (§3.2.2)
Computer Science Division
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
CHAPTER 3: DATA LINK CONTROL Flow control, Error detection – two dimensional parity checks, Internet checksum, CRC, Error control, Transmission efficiency.
Data Link Layer. Data Link Layer Topics to Cover Error Detection and Correction Data Link Control and Protocols Multiple Access Local Area Networks Wireless.
Wireless and Mobile Networks (ELEC6219) Session 3: Theories of Data Communications. Data Link Layer. Adriana Wilde and Jeff Reeve 22 January 2015.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Coding Overview (§3.2)
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
1 University of Calgary CS 441 Part 3 The Data Link Layer 3.1 Framing & Error Control 3.2 Error & Flow Control.
Data Link Layer.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Data Link Control. The two main functions of the data link layer are data link control and media access control. The first, data link control, deals with.
Physical Link Layer.
Data Link Layer.
Communication Networks: Technology & Protocols
Data link layer (LLC).
Process-to-Process Delivery, TCP and UDP protocols
Chapter 3 The Data Link Layer
Data Link Layer What does it do?
Part III Datalink Layer 10.
Detecting and Correcting Bit Errors
Net 221D : Computer Networks Fundamentals
Chapter 3 The Data Link Layer.
CS412 Introduction to Computer Networking & Telecommunication
Chapter 7 Error Detection and Correction
Communication Networks NETW 501
The Data Link Layer Chapter
EEC-484/584 Computer Networks
Fundamentals of Computer Networks
Error Detection and Correction
CSE 461: Framing, Error Detection and Correction
UNIT-II The Data Link Layer.
Home work project #1 Develop and fully debug your program on the Cushing 208 lab. Machines - planet lab machines may not have good development environment.
Types of Errors Data transmission suffers unpredictable changes because of interference The interference can change the shape of the signal Single-bit.
Error Checking continued
Data Link Layer. Position of the data-link layer.
13-LAN, packets, frames and topologies
Presentation transcript:

Where we are in the Course Moving on to the Link Layer! Physical Link Network Transport Application CSE 461 University of Washington

Scope of the Link Layer Concerns how to transfer messages over one or more connected links Messages are frames, of limited size Builds on the physical layer Frame Icon from Cisco icon library CSE 461 University of Washington

In terms of layers (2) Network Link Virtual data path Physical Actual data path Figure from CN5E slides #3-4 CSE 461 University of Washington

Typical Implementation of Layers (2) CN5E slides #3-22 CSE 461 University of Washington

Topics Later Framing Error detection and correction Retransmissions Delimiting start/end of frames Error detection and correction Handling errors Retransmissions Handling loss Multiple Access 802.11, classic Ethernet Switching Modern Ethernet Later CSE 461 University of Washington

Topic The Physical layer gives us a stream of bits. How do we interpret it as a sequence of frames? Um? …10110 … Icons from cisco icon library CSE 461 University of Washington

Framing Methods We’ll look at: Byte count (motivation)» Byte stuffing » Bit stuffing » In practice, the physical layer often helps to identify frame boundaries E.g., Ethernet, 802.11 CSE 461 University of Washington

Byte Count First try: Let’s start each frame with a length field! It’s simple, and hopefully good enough … CSE 461 University of Washington

Byte Count (2) How well do you think it works? CN5E slides #3-7 CSE 461 University of Washington

Byte Count (3) Difficult to re-synchronize after framing error Want a way to scan for a start of frame CN5E slides #3-7 CSE 461 University of Washington

Byte Stuffing Better idea: Have a special flag byte value that means start/end of frame Replace (“stuff”) the flag inside the frame with an escape code Complication: have to escape the escape code too! CN5E slides #3-8 CSE 461 University of Washington

Byte Stuffing (2) Rules: Replace each FLAG in data with ESC FLAG Replace each ESC in data with ESC ESC CN5E slides #3-8 CSE 461 University of Washington

Byte Stuffing (3) Now any unescaped FLAG is the start/end of a frame CN5E slides #3-8 CSE 461 University of Washington

Bit Stuffing Can stuff at the bit level too Call a flag six consecutive 1s On transmit, after five 1s in the data, insert a 0 On receive, a 0 after five 1s is deleted CSE 461 University of Washington

Bit Stuffing (2) Example: Data bits Transmitted bits with stuffing CN5E slides #3-9 CSE 461 University of Washington

Bit Stuffing (3) So how does it compare with byte stuffing? Data bits Transmitted bits with stuffing Data bits CN5E slides #3-9 CSE 461 University of Washington

Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes » Correct errors with codes » Retransmit lost frames Reliability is a concern that cuts across the layers – we’ll see it again Later Icons from cisco icon library CSE 461 University of Washington

Problem – Noise may flip received bits Signal 1 Slightly Noisy Very noisy CSE 461 University of Washington

Approach – Add Redundancy Error detection codes Add check bits to the message bits to let some errors be detected Error correction codes Add more check bits to let some errors be corrected Key issue is now to structure the code to detect many errors with few check bits and modest computation CSE 461 University of Washington

Motivating Example A simple code to handle errors: Send two copies! Error if different. How good is this code? How many errors can it detect/correct? How many errors will make it fail? Draw example of coded message. 2 errors can fool it CSE 461 University of Washington

Motivating Example (2) We want to handle more errors with less overhead Will look at better codes; they are applied mathematics But, they can’t handle all errors And they focus on accidental errors (will look at secure hashes later) 2 errors can fool it -- weak CSE 461 University of Washington

Using Error Codes Codeword consists of D data plus R check bits (=systematic block code) Sender: Compute R check bits based on the D data bits; send the codeword of D+R bits D R=fn(D) Data bits Check bits CSE 461 University of Washington

Using Error Codes (2) Receiver: Receive D+R bits with unknown errors Recompute R check bits based on the D data bits; error if R doesn’t match R’ D R’ Data bits Check bits R=fn(D) =? Note error may be in data or check bits CSE 461 University of Washington

Intuition for Error Codes For D data bits, R check bits: Randomly chosen codeword is unlikely to be correct; overhead is low All codewords Correct Add size of spaces CSE 461 University of Washington

R.W. Hamming (1915-1998) Much early work on codes: See also: Source: IEEE GHN, © 2009 IEEE Much early work on codes: “Error Detecting and Error Correcting Codes”, BSTJ, 1950 See also: “You and Your Research”, 1986 Source: IEEE GHN, http://www.ieeeghn.org/wiki/index.php/File:Richard_Hamming_1598.jpg, Image policy: http://www.ieeeghn.org/wiki/index.php/IEEE_GHN_image_policy CSE 461 University of Washington

Hamming Distance Distance is the number of bit flips needed to change D1 to D2 Hamming distance of a code is the minimum distance between any pair of codewords Use 0 -> 000 and 1 -> 111 as an example CSE 461 University of Washington

Hamming Distance (2) Error detection: For a code of distance d+1, up to d errors will always be detected Use 000, 111 code to show error detection CSE 461 University of Washington

Hamming Distance (3) Error correction: For a code of distance 2d+1, up to d errors can always be corrected by mapping to the closest codeword Use 000, 111 code to show error correction CSE 461 University of Washington