Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover.

Slides:



Advertisements
Similar presentations
5-1 Data Link Layer l Objective: to achieve reliable and efficient communication between 2 adjacent machines l Data link layer design issues n services.
Advertisements

Traffic and routing. Network Queueing Model Packets are buffered in egress queues waiting for serialization on line Link capacity is C bps Average packet.
Lecture 3, 1Spring 2003, COM1337/3501CCN: Direct Link Networks Direct Link Networks Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie,
Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
HIGH-LEVEL DATA LINK CONTROL (HDLC) HDLC was defined by ISO for use on both point-to-point and multipoint data links. It supports full-duplex communication.
William Stallings Data and Computer Communications 7th Edition
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
ICSA341 Data Communications and Computer Networks 1 Data Link Control •General principles.
5/15/2015© 2008 Raymond P. Jefferis IIILect The Data Link Layer.
Chapter 7 – Data Link Control Protocols
CSC 3352 Computer Communications Chapter 3&41 The Link Layer Has 2 main Components The Data Link Layer Medium Access Control (MAC) Examples:SLIP, PPP,
Fundamentals of Computer Networks ECE 478/578 Lecture #3: Encoding and Framing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
The OSI Reference Model
SYST5030/4030 ☻Error control☻ ☻ Network architecture ☻ ☻ Protocols ☻ ☻ Transmission Efficiency and Throughput ☻
More DLC Topics: ARQ and Framing
Computer Networks: Bit and Byte Stuffing 1 Bit and Byte Stuffing.
Chapter 10 Data Link Control Protocols. Agenda Definition Functions Attributes Concepts Types Conversion.
Data Link Protocols Asynchronous Protocols Synchronous Protocols
Gursharan Singh Tatla DATA LINK PROTOCOLS 24-Mar
Midterm Review - Network Layers. Computer 1Computer 2 2.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
CSE331: Introduction to Networks and Security Lecture 3 Fall 2002.
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
William Stallings Data and Computer Communications 7th Edition
Open Systems and Data Link Protocols November 7, 2002.
CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
Review:. Chapter 3: The Data Link Layer –achieve reliable, efficient communication between two physically connected machines. –Example problems to be.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
UNIT-II Computer Network Data Link Layer. Data Link Layer Prepared by - ROHIT KOSHTA Data Link Layer is second layer of OSI reference model and is placed.
Layer Two Data Link Layer Collects bits from layer 1 and organizes into frames Passes bits that make up frames to layer 1 for transmission Concerned with.
1 Message Delineation Identify the start and end of messages by: Identify the start and end of messages by:
Chapter 11 Data Link Protocols A data link protocol is a set of specifications used to implement the data link layer [A protocol is the set of rules or.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
1 CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
Eighth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Data Transmission n Keep errors to an acceptable low probability n Bit-serial transmission n Parallel transmission.
13-LAN, packets, frames and topologies Dr. John Abraham Professor UTPA.
Computer Interfacing and Protocols
Data Link Protocols ผศ.ดร. อนันต์ ผลเพิ่ม
Delay in packet switched network. Circuit switching In Circuit switched networks the resources needed along a path (buffers and link transmission rate)
Error Correction and Flow Control Martin Weiss. Slide 2 Objectives of this Meeting u Describe different flow control techniques u Describe the major error.
1 University of Calgary CS 441 Part 3 The Data Link Layer 3.1 Framing & Error Control 3.2 Error & Flow Control.
Data Communications Data Link Layer.
24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.
High level Data Link Layer Protocol - HDLC
The University of Adelaide, School of Computer Science
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Data link layer (LLC).
Data Transmission Keep errors to an acceptable low probability
Data Link Layer What does it do?
CIS 321 Data Communications & Networking
Lecture on Data Link Control
Data Link Layer: Data Link Control
CS412 Introduction to Computer Networking & Telecommunication
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Ion Stoica September 6, 2001 EE 122: Lecture 4 Ion Stoica September 6, 2001.
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Error control.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Fundamentals of Computer Networks
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Transport Layer 9/22/2019.
data link Control layer (DLC) – ARQ protocols
13-LAN, packets, frames and topologies
Introduction Communication Modes Transmission Modes
Presentation transcript:

Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover clock timing using sync characters. Network Topologies T2 T6T5 T4 T1 T3 To other Control Stations in Distributed Network Terminals Leased/ Dedicated Lines (Point-to-Point) Shared/Polled Line (Multipoint) Control Station

Message Switching and Delivery Circuit Switching – physical medium is rerouted for duration of message by mechanical switching Message Switching – “store” entire message when received at control station and “forwarded” to the next control station (or destination terminal) when convenient. Packet Switching-Message is broken into standard length packets (~1000 bits). Packets are delivered by “store and forward”, and reassembled at receiving terminal. Packets may take different routes and arrive out of order. T1 T2

What are the odds? Message traffic has been observed to obey Poisson (exponential) distribution (kinda...) For reception of packets at a node, the probability that exactly k packets will arrive at a node in t seconds is: Where r is the average arrival rate (packets/second). The probability that K or fewer packets will be received in time t is:

If a node can transmit an average of  packets per second, then the probability of exactly c packets being transmitted (service completions) is: If a node, on average, is transmitting as many packets as it is receiving, then its internal packet queue will contain, on average, The average packet delay is If r > , the buffer will overflow and the node is “blocked” Node Buffer Requirements

Synchronous Messaging Protocols Message/packet framing Clock Synchronization Master/Slave determination Error detection/Retransmission Flow Control 1.Character/Byte Protocols (e.g. IBM’s BSC/bisync) 2.Byte Count Protocols – Header contains byte count (DDCMP) 3.Bit Frame Oriented Protocols (X.25) contain dedicated fields for Start Stop Destination Address Count Error check Data

Bisync Multipoint: Sender responds with ACK when polled Point-to-Point: Sender requests service (ENQ character) Once Sender is granted use of the line, he sends several SYN (synchronization) characters, Followed (optionally) by a header block preceded by SOH (Start-of-header), Followed by one or more text blocks ending with EOB/ETX and Block Check byte End of Transmission (EOT) terminates the message. Poll Multipoint terminals by address P-P ENQ ACK SYN … SOH Header STX Text message bytesEOB STXText message bytesEOB STXText message bytesETXBCC … EOT … … Link Control Characters: ACK: Acknowledge Error-Free reception of Block NACK: Error Detected WACK: Wait for ACK DLE: Link Escape DLE-STX: Binary data (Transparency) mode

BOP: X.25 Start Flag Address Field 8 bits Control Field 8 bits Message bits CRC 16 bits Stop Flag Transmitter must insert a zero after any sequence of five consecutive 1s. Receiver must remove any 0 it sees after five consecutive 1s. Address of sending station Next Frame # This Frame # Control Code 1 0 P/F Next Frame #0P/F Control Code 1 1 P/F Supervisory Frame Control Field Data Frame Control Field Un-Numbered Frame Control Field