Business Data Communications

Slides:



Advertisements
Similar presentations
William Stallings Data and Computer Communications 7th Edition
Advertisements

The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Assessment 1 Review Network Layers. Computer 1Computer 2 2.
1 Topic 5: Data Link Layer - Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 6 Errors, Error Detection, and Error Control.
Data Link Layer – Part 1 V.T.Raja Oregon State University.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Nov-03 ©Cisco Systems CCNA Semester 1 Version 3 Comp11 Mod8 – St. Lawrence College – Cornwall Campus, ON, Canada – Clark slide 1 Cisco Systems CCNA Version.
The Data Link Layer Chapter 3. Position of the data-link layer.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Chapter 6: Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control
TDC 461 Basic Communications Systems 8 May, 2001.
Chapter 2 Data Communications Concepts. What We’ll Be Covering Data Communications Concepts: Data Communications Architecture Data Digitization Data Transmission.
Gursharan Singh Tatla DATA LINK PROTOCOLS 24-Mar
Midterm Review - Network Layers. Computer 1Computer 2 2.
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Module 8: Ethernet Switching
CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged.
1 Message Delineation Identify the start and end of messages by: Identify the start and end of messages by:
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Chapter 6: Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Third Edition.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Chapter 6 – Layer 2 MAC, Frames, Hex, etc.. Layer 1 / Layer 2 Layer 1 Signals, media, bit streams Layer 2 –Communicates with upper layers using Logical.
Chapter 11 Data Link Protocols A data link protocol is a set of specifications used to implement the data link layer [A protocol is the set of rules or.
Ethernet Overview it the IEEE standard for Ethernet.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 5 Data Link Layer.
Data Communication Network Models
Data Communications Data Link Layer.
Data and Computer Communications Digital Data Communications Techniques + Error Control+ Digital Data Communications Techniques + Error Control+Multiplexing.
Chapter 4 Data Link Layer.
The Data Link Layer RIS 251 Dr. ir. S.S. Msanjila.
24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.
Introduction to Networks v6.0
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Physical Link Layer.
Chapter 9: Data Link Control
Instructor Materials Chapter 5: Ethernet
ERROR DETECTION AND CORRECTION
Data Link Layer.
Part III. Data Link Layer
Local Area Networks: Topologies
Data link layer (LLC).
Topic 5: Data Link Layer - Chapter 9: Data Link Control
CIS 321 Data Communications & Networking
Chap. 4 Data link layer 2.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
CIS 321 Data Communications & Networking
Chapter 11 Data Link Control (DLC)
CCNA 1 Chapter 5 Ethernet Fundamentals
DATA COMMUNICATION Lecture-40.
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Error control.
Chapter Nine: Data Transmission
Chapter 4 Data Link Layer.
William Stallings Data and Computer Communications
Chapter 9: Data Link Control
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Business Data Communications Chapter Three Data Link Layer Fundamentals

Primary Learning Objectives Understand the function of the data link layer Distinguish Logical Link Control from Media Access Control Describe the two types of flow control Explain line discipline Define the components of error control Recognize two methods of delineating data in a bit stream Identify devices and components associated with the data link layer

The Data Link Layer – Its Function Sits above the physical and below the Network Layers Formats data bits into frames Has two components: Logical Link Control – 802.2 Media Access Control – 802.3 for Ethernet Is responsible for: Line discipline Flow control Error control

Components of the Data Link Layer

Logical Link Control (LLC) Designated by the IEEE as 802.2 and sits above the Media Access Control Provides three types of frame delivery service using protocol data units: Type 1 – connectionless without acknowledgement, the most used delivery service Type 2 – connection-oriented with acknowledgement Type 3 – connectionless with acknowledgement

Logical Link Control (LLC) LLC supports three types of frames: I – Information is connection-oriented S – Supervisory manages the Information frames U – Unnumbered used by connectionless services and terminates connection-oriented services Only Type 2 delivery service uses all three types of frames

Logical Link Control (LLC)

Media Access Control (MAC) Has various IEEE designations, with the most common being 802.3 for Ethernet Determines how devices share a common circuit Falls into one of two categories: Contention (802.3, Ethernet, for example) Controlled access (802.5, Token Ring, for example) FDDI, another form of controlled access, is an ANSI/ITU-T standard

Media Access Control – 802.3

Media Access Control – 802.5

Media Access Control (MAC) Standard 802.3 networks using hubs and bridges can suffer from significant collision impairment under high traffic: Modern 802.3 networks using switching technology have greatly eased this problem Switches do not change the underlying 802.3 architecture

Media Access Control (MAC) Format of a MAC Protocol Data Unit (PDU)

Flow Control Prevents a sender from overwhelming a receiver with traffic: A sender and receiver each have a memory area in which they can store frames This memory is sometimes referred to as a buffer A sender can overwhelm, or overflow, a receiver’s memory buffer without proper flow control If an overflow occurs, data would likely be lost

Flow Control Two common forms of flow control are: Stop-and-wait Each single frame sent requires receipt of one acknowledgement Sliding windows The sending of multiple frames requires a single acknowledgement returned

Flow Control Stop-and-wait: Sliding windows: Most efficient for messages containing a few large frames that traverse short links Requires one acknowledgement for each frame sent Sliding windows: Most efficient for messages containing many small frames that traverse long links Allows for one acknowledgement for multiple frames

Stop-and-Wait Flow Control

Sliding Windows Flow Control

Line Discipline Can be viewed as a “polite” means of controlling a conversation between communicating devices Associated with two types of network environments: Point-to-point between communicating devices using half- or full-duplex circuits Multipoint with communicating devices going through a central controlling device The central control device is often a mainframe with connected terminals

Error Control No system is perfect; errors should be expected Errors can result when data is lost, corrupted, or damaged, making error control critical Error control has two components: Error Detection Error Correction The two components are equally important

Error Detection Common error-detection methods include: Parity checking 50% probability of detection Longitudinal redundancy checking 98% probability of detection Checksum checking 99.6% probability of detection Cyclical redundancy checking 99.9%+ probability of detection

Parity Checking An extra parity bit is added to the byte Assuming even parity: 10000010 – data sent 10000110 - data received Error detected on receiver side (single bit) 10011010 – data received No error detected on receiver side (multiple bit) Simple parity detects only single bit errors

Longitudinal Redundancy Checking -- LRC Longitudinal literally means “lengthwise” The sender, for each byte in the message, calculates a parity value, creating an additional block check character or BCC As with parity checking, the parity value is odd or even The BCC is added to the end of the message block The receiver performs the same lengthwise LRC computation If the receiver’s calculated BCC does not equal the sender’s calculated BCC, the receiver assumes a transmission error

Longitudinal Redundancy Checking 01000010 01011001 01010100 01000101 – Before BCC

Longitudinal Redundancy Checking 01000010 01011001 01010100 01000101 00001010 – After BCC The BCC added to the end of the data block.

Checksum Checking – CC The message sender: The message receiver: Evaluates each binary byte in the message to its decimal value Totals the decimal values of all bytes Divides the total by 255, creating a remainder Using the remainder for the CC, adds the CC to the end of the message block The message receiver: Performs the same byte-by-byte calculation and creates his own CC Compares his calculated CC to the sender’s Assumes a transmission error if the two CC values differ

Checksum Checking – CC 308 / 255 = 1.21 CC = 21 66 89 84 69 308 Char Col 1 Col 2 Col 3 Col 4 Col 5 Col 6 Col 7 Col 8 B 1 Y T E TOTAL Decimal Equivalent 66 89 84 69 308 308 / 255 = 1.21 CC = 21

Error Control The most common error correction technique is to simply retransmit the data in error Easy, but requires time for the retransmission A second error correction technique is called forward error correction: The core message is sent along with redundant data bits The redundant data bits can, if necessary, be used by the receiving device to correct errors on site without retransmission However, forward error correction results in inefficient use of a circuit if too many redundant data bits are sent and not used

Data Delineation A transmitted bit stream contains not only the core message but control information as well Control information could include: Source address Destination address Length of message field Error control data Other “non-core” information Data delineation differentiates between core and other data

Data Delineation Two key methods providing data delineation are: Asynchronous data link protocols Synchronous data link protocols Asynchronous protocols: Are used mostly by mainframes and their connected terminals Provide byte-by-byte delineation Synchronous protocols: Are used in LANs, BNs, MANs, and WANs Provide delineation for groups of bytes

Data Delineation Popular asynchronous protocols include: XModem YModem ZModem Kermit Asynchronous protocols require that every data byte have a start and stop bit before and after it Generally less efficient than synchronous protocols

Asynchronous Transmission

Data Delineation Synchronous protocols are either bit- or byte-oriented Bit-oriented protocols are more flexible: They do not require a predetermined “byte” character format, such as EBCDIC or ASCII They are more complicated Bit stuffing may be required HDLC is a formalized bit-based protocol Byte-oriented protocols: Are based upon known “byte” based data Ethernet is a very common byte-based protocol

Simple Synchronous Transmissions

Data Link Layer Devices and Components A Network Interface Card is: A component rather than device Essential to connect a device to a network Bridges: Link segments of the same logical network Filter traffic, and so can improve network performance Switches: Offer more functionality than hubs and bridges Provide point-to-point connections to devices plugged into them Have transformed how standard Ethernet is configured

A 3Com Network Interface Card (NIC) NICs have a physical address NIC addresses must be unique NIC addresses can be bypassed, or overridden, by software, but care must be taken when doing this to avoid address duplication

A Linksys Wireless Bridge Bridges filter network traffic

A Bridge Filtering Traffic

A standard Cisco Switch Switches have mostly replaced hubs in modern Ethernet networks

In Summary The data link layer: Is stacked above the physical and below the network layers Formats data bits into units called frames Is composed of two stacks, the logical link and the media access controls Performs error control Has devices such as bridges and switches with which it is particularly associated