C) All rights reserved by Professor Wen-Tsuen Chen1 Chapter 3 The Data link Layer ä For reliable, efficient communication between two adjacent machines.

Slides:



Advertisements
Similar presentations
Chapter 3 The Data Link Layer.
Advertisements

The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
CH. 7 Data Link Control. Requirements & Objectives of Data Link Control Frame Synchronization Flow Control Error Control Addressing Control and Data on.
Chapter 3 The Data Link Layer.
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
HIGH-LEVEL DATA LINK CONTROL (HDLC) HDLC was defined by ISO for use on both point-to-point and multipoint data links. It supports full-duplex communication.
William Stallings Data and Computer Communications 7th Edition
Chapter 3: The Datalink Layer CS 455/555. Topics to be covered Design Issues Error detection and correction Elementary datalink protocols Sliding window.
Chapter 11 Data Link Control (DLC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data and Computer Communications Updated: 2/9/2009.
The Data Link Layer Framing Error Control Flow Control
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Data Link Control Slide 1 Data Link Control Chapter 7.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
Data Link Control Protocols Data link control protocol Provides a layer of control between systems on a transmission medium referred to as data link. DLC.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
The Data Link Layer Chapter 3. Position of the data-link layer.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
The OSI Reference Model
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Chapter 9: Data Link Control Business Data Communications, 4e.
Semester Copyright USM EEE442 Computer Networks The Data Link / Network Layer Functions: Flow Control and Error Control En. Mohd Nazri Mahmud.
20101 The Data Link Layer Chapter Design Issues Controls communication between 2 machines directly connected by “wire”-like link Services Provided.
Adapted from Tanenbaum's Slides for Computer Networking, 4e The Data Link Layer Chapter 3.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Gursharan Singh Tatla DATA LINK PROTOCOLS 24-Mar
HDLC and PPP. The Data Link Layer in the Internet A home personal computer acting as an internet host. Technology like Ethernet cannot provide “high-level”
Lect11.ppt - 03/15/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 11 Link-Level Flow and Error Control by Zornitza Genova Prodanoff.
Link-Level Flow and Error Control
Network Technology CSE Network Technology CSE3020 Week 6.
Data Link Control Protocols
Data Communications and Networking
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
William Stallings Data and Computer Communications 7th Edition
Data and Computer Communications Ninth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data and Computer Communications, Ninth Edition.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Chapter 3 THE DATA LINK LAYER
Chapt 3 Data Link Layer1 Data Link Layer Functions –Provides services to network layer Well-defined interface –Framing –Flow control – between adjacent.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
The Data Link Layer. Functions of the Data Link Layer Provide service interface to the network layer Dealing with transmission errors Error detection.
The Data Link Layer. Functions of the Data Link Layer Provide service interface to the network layer Frame delineation Dealing with transmission errors.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
Chapter 11 Data Link Protocols A data link protocol is a set of specifications used to implement the data link layer [A protocol is the set of rules or.
Chapter 11 Data Link Control
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
DATA LINK CONTROL PROTOCOLS. 2 Introduction Data link control layer – often abbreviated simply to data link layer – is concerned with the transfer of.
UNIT-2 Design Issues in Data link Layer Framing
CIS : Data Link Control. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow Transmission.
The Data Link Layer Chapter 3 1/21/2016www.ishuchita.com1.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
Data and Computer Communications Data Link Control Protocols.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
Chapter 9: Data Link Control Business Data Communications, 4e.
Data and Computer Communications Data Link Control Protocols.
24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.
Data Link Control Protocols  need layer of logic above Physical  to manage exchange of data over a link frame synchronization frame synchronization flow.
2.10 Flow and Error Control Before that ...
Chapter 3 The Data Link Layer.
HDLC and PPP.
Chapter 9: Data Link Control
Data link layer (LLC).
Chap. 4 Data link layer 2.
Data Link Layer What does it do?
William Stallings Data and Computer Communications
Chapter 9: Data Link Control
Presentation transcript:

C) All rights reserved by Professor Wen-Tsuen Chen1 Chapter 3 The Data link Layer ä For reliable, efficient communication between two adjacent machines ä Adjacent: two machines are physically connected by a communication channel ä Wire-like communication channel: data are delivered in order © All rights reserved. No part of these slides may be reproduced, in any form or by any means, without permission in writing from form or by any means, without permission in writing from Professor Wen-Tsuen Chen ( Professor Wen-Tsuen Chen (

C) All rights reserved by Professor Wen-Tsuen Chen2

3 Design Issues ä Well-defined service interface to the network layer ä Framing ä Flow control ä Error control

C) All rights reserved by Professor Wen-Tsuen Chen4 DLL Services ä Unacknowledged connectionless service í Suitable for use in reliable channel. ä Acknowledged connectionless service í Suitable for use in unreliable channels, such as wireless channels. ä Acknowledged connection-oriented service í Provides the network layer processes with the equivalent of a reliable data link.

C) All rights reserved by Professor Wen-Tsuen Chen5 Character Count

C) All rights reserved by Professor Wen-Tsuen Chen6 Character Delimiters

C) All rights reserved by Professor Wen-Tsuen Chen7 Flags with Bit Stuffing ä Used in HDLC and SDLC of IBM starting flag ending flag ä When line idle, stream of flags are sent. ä Data Bit Stuffing

C) All rights reserved by Professor Wen-Tsuen Chen8 Data Framing ä Character count ä Starting and ending characters with character stuffing ä Starting and ending flags with bit stuffing ä Physical layer coding violations

C) All rights reserved by Professor Wen-Tsuen Chen9 Flow Control ä A technique for assuring that a transmitting entity does not overwhelm a receiving entity with data. ä Stop-and-wait flow control ä Sliding window flow control

C) All rights reserved by Professor Wen-Tsuen Chen10 ä A source transmits a frame. ä Upon reception, the destination sends back an acknowledgment. ä The source must wait until it receives the acknowledgment before sending the next frame. Stop-and-wait Flow control frame1 ack frame2 time sourcedestination

C) All rights reserved by Professor Wen-Tsuen Chen11 Link Utilization ä a = where t prop = propagation time t frame = frame transmission Time

C) All rights reserved by Professor Wen-Tsuen Chen12 ä Stop-and-wait utilization u is the ratio of single frame transmission time to the total time of a link engaged in transmission of the frame u = ä Stop-and-wait flow control is suitable when a is small

C) All rights reserved by Professor Wen-Tsuen Chen13 ä Multiple frames are transmitted in pipelining fashion. Sliding-Window Flow Control Window of outstanding frames are transmitted and waiting for ACK Last frame acknowledged Window of frames that are accepted and not yet sent to host Frames already acknowledged Frames already received

C) All rights reserved by Professor Wen-Tsuen Chen14

C) All rights reserved by Professor Wen-Tsuen Chen15 ä Stop-and-wait protocol is a special case of sliding- window protocol with window size 1.

C) All rights reserved by Professor Wen-Tsuen Chen16 Link Utilization

C) All rights reserved by Professor Wen-Tsuen Chen17 ä u = where N is the window size Optimal window size

C) All rights reserved by Professor Wen-Tsuen Chen18 Error Control ä Error detection and correction ä Three types of frames at receiver end: valid frame, lost frame, and damaged frame. ä Techniques for error control: í Positive acknowledgment í Retransmission after timeout í Negative acknowledgment and retransmission

C) All rights reserved by Professor Wen-Tsuen Chen19 Error Control (cont.) ä These techniques are referred to as automatic repeat request(ARQ). ä Three versions of ARQ have been standardized: ä stop-and-wait ARQ ä Go-back-N ARQ ä Selective-reject ARQ

C) All rights reserved by Professor Wen-Tsuen Chen20 Error Correction and Detection ä Error Correction with the Hamming Code

C) All rights reserved by Professor Wen-Tsuen Chen21 Error Correction and Detection(cont.) ä Error correction codes are sometimes used when retransmission cannot be requested, such as in a simplex channel, space communications.

C) All rights reserved by Professor Wen-Tsuen Chen22 Error Detection Codes ä Parity Check ä Cyclic redundancy check (CRC) í Easy hardware implementation í Detection of burst errors ä An error detection code, called frame check sequence (FCS) is appended to a data frame for transmission. dataFCS

C) All rights reserved by Professor Wen-Tsuen Chen23 Cyclic Redundancy Check ä Use modulo 2 Arithmetic to compute CRC code and detect errors.

C) All rights reserved by Professor Wen-Tsuen Chen24 Polynomial Representation of CRC G(X) : generator polynomial of degree r M(X) : message polynomial Where R(X) : remainder polynomial T(X) : transmitted polynomial Hence T(X) is divisible by G(X)

C) All rights reserved by Professor Wen-Tsuen Chen25 ä T’(x) : received polynomial T’(x) = T(x) + E(x) T’(x) = T(x) + E(x) Where E(X) : error polynomial with coefficient is in positions where errors occur. Where E(X) : error polynomial with coefficient is in positions where errors occur. ä If T’(x) is not divisible by G(x), i.e. E(x) is not divisible by G(x), then error is detected. ä An error E(X) will only be undetectable, if it is divisible by G(X). ä If T’(x) is divisible by G(x), the received frame is considered as a “valid” frame.

C) All rights reserved by Professor Wen-Tsuen Chen26 ä With suitable chosen G(X), the following errors can be detected: í All single-bit errors. í All double-bit errors, if G(X) has at least three terms. í Any odd number of errors, if G(X) contains a factor (x+1). í Any burst error with length degree of G(X). í Most larger burst errors. ä Widely used G(X):

C) All rights reserved by Professor Wen-Tsuen Chen27

C) All rights reserved by Professor Wen-Tsuen Chen28

C) All rights reserved by Professor Wen-Tsuen Chen29 ARQ Protocols ä Stop-and-Wait ARQ: good for small a, where a= propagation time/frame transmission time. ä Go-back-n ARQ: Receiver discards all subsequent frames of a damaged frame, sending no ack’s for the discard frames. ä Selective-Repeat ARQ: Receiver stores all the correct frames following the bad one. Sender retransmits only the bad frame, not all its successors.

C) All rights reserved by Professor Wen-Tsuen Chen30

C) All rights reserved by Professor Wen-Tsuen Chen31

C) All rights reserved by Professor Wen-Tsuen Chen32

C) All rights reserved by Professor Wen-Tsuen Chen33 SLIDING WINDOW PROTOCOLS ä Both Go-back-n and Selective-repeat ARQs uses the pipelining technique. ä The optimal sender’s windows size is 1+2a. ä Maximum sender’s window size of Go- back-n ARQ is Max-seq, where the sequence number are 0, 1,..., Max-seq. Receiver window size is 1. ä Max sender’s and receiver’s window size of Selective-repeat ARQ is (Max-seq+1)/2.

C) All rights reserved by Professor Wen-Tsuen Chen34 ä Consider the following scenario with window size=8 À The sender sends frame 0 thru 7. Á The receiver sends ack for frame 7. Â The sender sends another eight frames, frame 0 thru 7. Ã The receiver sends ack for frame 7. ä The second batch of eight frames may be lost, Ambiguity occurs in the second acknowledgment. ä Maximum window size of Go-back-n ARQ is Max-seq, where the frame sequence numbers are 0,1,...,Maxseq-1.

C) All rights reserved by Professor Wen-Tsuen Chen35 ä Consider the following scenario with window size=7 À Frame 0,...,6 are sent Á Frames are received, the window are advanced to 7,0,...,5  Acknowledgments are all lost à Frame 0,...,6 are re-sent Ä Frame 0,...,5 are erroneously accepted ä Maximum window size of the Selective-Reject ARQ is (Max-seq+1)/2, where the frame sequence numbers are 0,1,...,Maxseq-1.

C) All rights reserved by Professor Wen-Tsuen Chen36

C) All rights reserved by Professor Wen-Tsuen Chen37 Utilization of ARQ Protocols ä Stop-and-Wait ARQ Where Nr = the expected number of transmissions of a frame. Assume the probability that a single frame is in error is P and ACKs and NAKs are never in error.

C) All rights reserved by Professor Wen-Tsuen Chen38 Utilization of ARQ Protocols (cont.) ä Selective-Reapeat ARQ

C) All rights reserved by Professor Wen-Tsuen Chen39 Utilization of ARQ Protocols (cont.) Where f(i) = the total number of frames transmitted if the original frame must be transmitted i times. =1+ (i-1) k Each error generates a requirement to retransmit k frames. k  2a+1 for N  2a+1, and k=N for N<2a+1. ä Go-back-N ARQ

C) All rights reserved by Professor Wen-Tsuen Chen40 Utilization of ARQ Protocols (cont.)

C) All rights reserved by Professor Wen-Tsuen Chen41 ARQ Programs

C) All rights reserved by Professor Wen-Tsuen Chen42 Stop-and-Wait AQR Program

C) All rights reserved by Professor Wen-Tsuen Chen43 Go-back-N AQR Program

C) All rights reserved by Professor Wen-Tsuen Chen44

C) All rights reserved by Professor Wen-Tsuen Chen45 Selective-Reject AQR Program

C) All rights reserved by Professor Wen-Tsuen Chen46

C) All rights reserved by Professor Wen-Tsuen Chen47 Software Timers

C) All rights reserved by Professor Wen-Tsuen Chen48 HDLC - High-level Data Link Control ä SDLC (Synchronous Data Link Control) of IBM’s SNA ä ADCCP (Advanced Data Communication Control Procedure): ANSI ä HDLC: ISO 33009, ISO 4335 ä LAP (Link Access Procedure): X.25 of CCITT ä LAPB: CCITT

C) All rights reserved by Professor Wen-Tsuen Chen49 ä A frame is delimited with the flag sequence On idle point-to-point lines, flag sequences are transmitted continuously. ä Address is primarily used to identify multidrop terminals. ä Checksum: CRC-CCITT, for detecting damaged flag bytes. Frame Format

C) All rights reserved by Professor Wen-Tsuen Chen50 Three Kinds of frames

C) All rights reserved by Professor Wen-Tsuen Chen51 Supervisory frame ä Type 0 (Receive Ready): are ack frame used to indicate the next frame expected ä Type 1 (Reject): a negative ack, Next is the first frame in sequence not received correctly. Use go- back-n protocol ä Type 2 (Receive not Ready): An ack as Type 0 and telling the sender to stop sending ä Type 3 (Selective Reject): Retransmission of only the frame specified in Next field. Use Selective Repeat protocol

C) All rights reserved by Professor Wen-Tsuen Chen52 HDLC commands and Responses

C) All rights reserved by Professor Wen-Tsuen Chen53 Basic Characteristics ä Three Station types: À Primary station: controls operation of the link and issues command frames. Á Secondary station: under the control of the primary station, issues response frames. Â Combined station: combines the features of primary and secondary.

C) All rights reserved by Professor Wen-Tsuen Chen54 Basic Characteristics (cont.) ä Two link configurations: À Unbalanced configuration: consists of one primary and one or two secondary stations. Á Balanced configuration: consists of two combined stations.

C) All rights reserved by Professor Wen-Tsuen Chen55 Basic Characteristics (cont.) ä Three Data transfer modes: À Normal response mode (NRM): Used with an unbalanced configuration. Á Asynchronous balance mode (ABM): Used with a balanced configuration. Most widely used. Â Asynchronous response mode (ARM): Used with an unbalanced configuration. The secondary may initiate transmission. Rarely used.

C) All rights reserved by Professor Wen-Tsuen Chen56 HDLC Operation ä Three phases: Line setup, data transfer, disconnect.

C) All rights reserved by Professor Wen-Tsuen Chen57 DLL in Internet

C) All rights reserved by Professor Wen-Tsuen Chen58 SLIP - Serial Line IP ä SLIP (Serial Line IP): to connect SUN workstations to the Internet over a dial-up line using a modem. ä RFC 1055 ä Sending IP packets over the line, with a special flag byte at the end for framing. Using character stuffing. ä Many problems: no error detection, supporting only IP, no authentication, etc.

C) All rights reserved by Professor Wen-Tsuen Chen59 PPP - Point-to-Point Protocol ä RFC 1661, RFC 1662, RFC 1663 ä A multiprotocol framing mechanism suitable for use over modems, HDLC lines, SONET, and other physical layers. ä Supports error detection, option negotiation, optionally reliable transmission using HDLC framing. ä Character-oriented

C) All rights reserved by Professor Wen-Tsuen Chen60 PPP Frame Format ä Protocol: indicates network layer protocol used, such as IP, IPX, AppleTalk, or to be negotiated.

C) All rights reserved by Professor Wen-Tsuen Chen61 LCP - Link Control Protocol ä Used in PPP for bringing lines up and down.

C) All rights reserved by Professor Wen-Tsuen Chen62 NCP - Network Control Protocol ä Used in PPP to negotiate network layer options

C) All rights reserved by Professor Wen-Tsuen Chen63 DLL in ATM ä Transmission convergence sublayer of the ATM physical layer. ä Header error control: correcting single-bit error of a cell header. ä Cell delineation: cell framing.

C) All rights reserved by Professor Wen-Tsuen Chen64 ATM Cell Format

C) All rights reserved by Professor Wen-Tsuen Chen65

C) All rights reserved by Professor Wen-Tsuen Chen66 Header Error Control ä HEC checksum: Remainder of the 32 header bits divided by the polynomial x**8+x**2+x+1, added with to provide robustness in face of headers containing mostly 0 bits. ä Correcting all single-bit errors and detecting many multi-bit errors. ä Suitable for optical fiber: 99.64% of all errors are single-bit errors.

C) All rights reserved by Professor Wen-Tsuen Chen67

C) All rights reserved by Professor Wen-Tsuen Chen68 CELL DELINEATION ä Using the HEC to delineate a cell. ä Cell delineation heuristic: see Fig ä To protect against malicious users, payload bits are scrambled on transmission and descrambled on reception.