Protocol Strategies.

Slides:



Advertisements
Similar presentations
Data Link Layer (cont’d)
Advertisements

EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
EIE325: Telecommunication TechnologiesMaciej J. Ogorza ł ek, PolyU, EIE Telecommunication Technologies Week 8 Flow Control Error Control.
William Stallings Data and Computer Communications 7th Edition
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 – Data Link Control Protocols.
Data and Computer Communications Updated: 2/9/2009.
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
ELEN 602 Lecture 5 Review of last lecture –Error Detection -- parity/CRC etc. Automatic Retransmission Request (ARQ) Reading: Chap
Two Protocol Case Studies HDLC & Kermit. HDLC A multi-functional protocol. Works in lots of modes. Forms the basis for MANY of the current protocols in.
Chapter 7 – Data Link Control Protocols
Protocols. Basics Defining Interactions VERTICAL Application Presentation Session Transport Network Data Link Physical Please do this for me OK It’s.
Data Link Control Protocols Data link control protocol Provides a layer of control between systems on a transmission medium referred to as data link. DLC.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Chapter 9: Data Link Control Business Data Communications, 4e.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
20101 The Data Link Layer Chapter Design Issues Controls communication between 2 machines directly connected by “wire”-like link Services Provided.
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Lect11.ppt - 03/15/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 11 Link-Level Flow and Error Control by Zornitza Genova Prodanoff.
Link-Level Flow and Error Control
Data and Computer Communications Eighth & Ninth Edition by William Stallings Chapter 7 – Data Link Control Protocols.
Data Link Control Protocols
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Control and Protocols.
Chapter 3 THE DATA LINK LAYER
CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Transport Layer Lecture 10 Imran Ahmed University of Management & Technology.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Eighth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange.
CIS : Data Link Control. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow Transmission.
1 FIT1005 Topic 6 - Data Link Layer Reference: Chapter 7 -Stallings.
Data Link Layer Flow and Error Control. Flow Control Flow Control Flow Control Specifies the amount of data can be transmitted by sender before receiving.
CSCI 465 D ata Communications and Networks Lecture 10 Martin van Bommel CSCI 465 Data Communications & Networks 1.
CSCI 465 D ata Communications and Networks Lecture 11 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Data and Computer Communications Data Link Control Protocols.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
Computer Networking Lecture 16 – Reliable Transport.
Chapter 9: Data Link Control Business Data Communications, 4e.
NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS ( NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS (PRACTICAL PART) Tutorial 4 : Chapter 7 Data & computer.
Data Link Layer.
Chapter 3: The Data Link Layer –to achieve reliable, efficient communication between two physically connected machines. –Design issues: services interface.
Data Link Control Protocols  need layer of logic above Physical  to manage exchange of data over a link frame synchronization frame synchronization flow.
2.10 Flow and Error Control Before that ...
MODULE I NETWORKING CONCEPTS.
Chapter 9: Data Link Control
Data Link Layer Flow Control.
March 21, 2001 Recall we have talked about the Sliding Window Protocol for Flow Control Review this protocol A window of size I can contain at most I.
Part III Datalink Layer 10.
Ch 16 Protocols and Layering
Data link layer (LLC).
Chap. 4 Data link layer 2.
6 Transport Layer Computer Networks Tutun Juhana
Instructor Mazhar Hussain
CIS 321 Data Communications & Networking
Flow Control.
Flow and Error Control.
Protocol Basics.
Chapter 11 Data Link Control and Protocols.
Data Link Layer (cont’d)
Data Link Layer (cont’d)
William Stallings Data and Computer Communications
Chapter 9: Data Link Control
Presentation transcript:

Protocol Strategies

Idle RQ (Stop-and-Wait) Transmission Initiated Ack Received Send Next Send N Send N+1 Fig 1.23

Message is lost Send N Repeat N Send N+1 Fig 1.23

Ack is lost Send N Repeat N Send N+1 Fig 1.23

Message Propagates First bit of message arrives at receiver -> Propagation delay Fig 1.24

Message Transmission Transmission time SAME Transmission time Fig 1.24

Message Transmission Plus Propagation Transmission + Propagation time Fig 1.24

Receiver Processes Turnaround time Fig 1.24

Receiver Send Ack Short time to transmit ACK Fig 1.24

ACK Propagates First bit of ACK arrives at receiver -> Propagation delay… same as before Fig 1.24

Continuous RQ Sender continues sending, eventually acks arrive from the receiver At the same rate as they depart from the transmitter No Errors Idealistic Fig 1.26

Aggressive Sending Strategy but messages are lost What is the strategy being used by the receiver when receiving messages out of sequence? Receiver recognizes Sender knows N+1 problem Sends in next slot Fig 1.27

Now ACK is lost! Fig 1.27

A different retransmission strategy Information frame lost Fig 1.28

Again ACK is Lost Fig 1.28

Strategies Idle RQ -> Stop and Wait Continuous RQ-> Selective Repeat Go-Back-N

Idle RQ Send a message Do not send the next until ACK is received Messages and ACKS numbered 0/1/0/1/…. If “a” is large, capacity of link may be severely underutilized Overall user delay may be excessive (why wait)

Selective repeat Aggressive sending Multiple outstanding messages (w/o ACK) If error at receiver Receiver keeps later messages buffered at a lower level and only passes them up when the missing frames arrive Sender only resends error messages Extra management effort required at receiver

Go-Back-N Aggressive sending Multiple outstanding messages (w/o ACK) If error at receiver Receiver REJECTs out of order messages Sender only resends ALL messages from point of error Simple management effort required at receiver

How do you number frames? Fig 1.29

SIZE not NAMES Fig 1.29

This Shows How To Name Fig 1.30

N=4, K=3 (will lead to a problem) Sender Receiver Send M1, M2 and M3 Recv M1, M2 and M3 ACK M1, M2 and M3 Recv ACK M1, M2 and M3 Send M4, M1* and M2* time

N=4, K=3 ACKs are lost Sender Receiver Send M1, M2 and M3 Recv M1, M2 and M3 ACK M1, M2 and M3 Recv ACK M1, M2 and M3 ReSend M1, M2 and M3 time

N=7, K=3 (NO problems) Sender Receiver Send M1, M2 and M3 Recv M1, M2 and M3 ACK M1, M2 and M3 Recv ACK M1, M2 and M3 Send M4, M5 and M6 time

N=7, K=3 ACKs lost.. No problems Sender Receiver Send M1, M2 and M3 Recv M1, M2 and M3 ACK M1, M2 and M3 Recv ACK M1, M2 and M3 ReSend M1, M2 and M3 time

Naming… A summary Fig 1.30

What about 2-way traffic?

PiggyBacked ACKs Traffic frequently going in the reverse direction No send to send an entire new frame with additional overhead. Typically, a message contains the name of the message in transit AND the name of the ack message, message expected in the other direction

What if nothing in the other driection? Set a timer waiting for return travel If no return travel before the timer goes off, Send a separate ACK when the timer expires. ELSE Piggyback on return traffic.

What about reverse traffic Discussion only focuses on traffic in one direction Problem is symmetric. Software is tricky but the send and receive code are integrated into the same process.

Protocol Design and Software Development

Link Layer Complexity SubLayers Link Fig 1.31

Link Layer Complexity Timer to alert sender to resend Fig 1.31

Events From Side From Above From Below Fig 1.32

State Diagram event action state change Fig 1.33

State Machine and Events Figs 1.32 and 1.33

Actions Create Outgoing Events (Events at the receiver) Figs 1.32 and 1.33

These Outgoing Events Are INCOMING to the receiver via MAC layer sender receiver Figs 1.33 and 1.34

One more time Ls_User Creates LdataReq TxFrame to destination iRCVD from MAC_provider to destination

Focus on State Machines

Three Ways = Same State Transition Diagram Program Event-State Table

Event-State Table Fig 1.33

Program Choose -action -next State based on -current state -event Main Loop Fig 1.33

An Example : HDLC

1-Connect 2- Data 3-Disconnect

network link physical physical link network network link link network

1-Connect 2- Data 3-Disconnect

HDLC Frame Format

Frame Types

16 bit version

Network<-> Link Link <-> Link

Entire State Machine (Sender AND Receiver)

Information Exchange Station A Station B SEND I Frames N(R)=0 N(S)=0 Frame Damaged N(R)=1 N(S)=2 Frame Rejected Send REJ with N(R)=1 SEND I Frames N(R)=2 N(S)=1 (no activity) N(R)=2 N(S)=2 Send RRJ with N(R)=3 N(R)=2 N(S)=3