EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao Cleveland State University

Slides:



Advertisements
Similar presentations
Chapter 3 The Data Link Layer.
Advertisements

The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
CIS 725 Data Link Layer. Physical Layer Figure 3-1 B. Forouzan, TCP/IP Protocol Suite.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
I N THE N AME OF G OD C OMPUTER N ETWORKS C HAPTER 3: T HE D ATA L INK L AYER Dr. Shahriar Bijani Shahed University March 2014.
1 Lecture #12: Data Link Layer. Error Control. C o n t e n t s l Services Provided by DLL l DLL data structures l Error Control Mechanisms –Error correcting.
EEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 10 Introduction to Computer Networks.
CSC 3352 Computer Communications Chapter 3&41 The Link Layer Has 2 main Components The Data Link Layer Medium Access Control (MAC) Examples:SLIP, PPP,
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
The Data Link Layer Chapter 3. Position of the data-link layer.
The OSI Reference Model
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Circuit Switching (a) Circuit switching. (b) Packet switching.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
CSC 450/550 Part 2: The Data Link Layer. CSC 450/550 Summary Part A Functions (1)Functions of the data link layer (2)Framing (3)Error control (3.1) Error.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
20101 The Data Link Layer Chapter Design Issues Controls communication between 2 machines directly connected by “wire”-like link Services Provided.
Adapted from Tanenbaum's Slides for Computer Networking, 4e The Data Link Layer Chapter 3.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
NETWORKING CONCEPTS. DATA LINK LAYER Data Link Control main functions of the data link layer are Data link control media access control. Data link control.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
TOBB ETÜ ELE46/ELE563 Communications Networks Lecture 01 May 6, 2014 Fall 2011 Tuesday 10:30 – 12:20 (310) Thursday 15:30 – 17:20 (372) İsrafil Bahçeci.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
جلسه هشتم شبکه های کامپیوتری به نــــــــــــام خدا.
Review:. Chapter 3: The Data Link Layer –achieve reliable, efficient communication between two physically connected machines. –Example problems to be.
Data Link Layer. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Data Link Layer : Services, Framing, Error Detection and Correction2.
CS 453 Computer Networks Lecture 9 Layer 2 – Data Link Layer.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
The data link layer. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
The Data Link Layer. Functions of the Data Link Layer Provide service interface to the network layer Dealing with transmission errors Error detection.
Chapter 3 The Data Link Layer (60 % practical part)
The Data Link Layer Chapter 3 10/28/2015www.noteshit.com1.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 13.
ECE453 – Introduction to Computer Networks Lecture 4 – Data Link Layer (I)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Wireless and Mobile Networks (ELEC6219) Session 3: Theories of Data Communications. Data Link Layer. Adriana Wilde and Jeff Reeve 22 January 2015.
The Data Link Layer Chapter 3 1/21/2016www.ishuchita.com1.
Lecture Focus: Data Communications and Networking  Data Link Layer  MAC Frame Format Lecture 25 CSCS 311.
COMPUTER NETWORKS. Unit -2 Continue... Physical Layer Connection –Oriented Networks : X.25 Relay Frames Types of cables Co-axial Fiber optics Twisted.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Data Link Control. The two main functions of the data link layer are data link control and media access control. The first, data link control, deals with.
The Data Link Layer RIS 251 Dr. ir. S.S. Msanjila.
CS4470 Computer Networking Protocols
Data Link Layer.
Data link layer (LLC).
Chapter 3 The Data Link Layer
Data Link Layer What does it do?
Chapter 3 – Part 1 The Data Link Layer.
Overview Jaringan Komputer (2)
Net 221D : Computer Networks Fundamentals
Chapter 3 The Data Link Layer.
CS412 Introduction to Computer Networking & Telecommunication
EEC-484/584 Computer Networks
The Data Link Layer Chapter
EEC-484/584 Computer Networks
UNIT-II The Data Link Layer.
Data Link Layer. Position of the data-link layer.
Presentation transcript:

EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao Cleveland State University

2 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Outline Quiz#3 Result Reminder: EEC584 initial draft due midnight today Data Link layer –Data Link Layer Design Issues –Framing –Error Detection and Correction (omitted) EEC484 only: project walk-through DLL Data Link Medium Access Control (MAC) We Cover This SubLayer in this lecture

3 EEC484 Quiz#3 Result Average: 80.8, high: 95, low: 57 Q1-37.5, Q2-16.9, Q3-12.9, Q /16/2015EEC-484/584: Computer NetworksWenbing Zhao

4 EEC584 Quiz#3 Result Average: 92, high: 100 (4), low: 80 Q1-44.2, Q2-18.7, Q3-14.8, Q /16/2015EEC-484/584: Computer NetworksWenbing Zhao

5 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Data Link Layer Design Issues Services Provided to the Network Layer –Point-to-point, source-to-destination Framing –Physical bit stream divided up into frames Error Control –Acknowledgements (acks), retransmission, duplicate suppression Flow Control –Throttle sender so sends no faster than receiver can receive them

6 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Functions of Data Link Layer Provide a virtual source-to-destination communication channel to the network layer Dealing with transmission errors Regulating data flow

7 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Services Provided to Network Layer (a) Virtual communication (b) Actual communication

8 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Placement of Data Link Protocol

9 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Types of Services Provided to Network Layer Unacked connectionless –Ok if low error rate, real time applications Acked connectionless Unacked connection-oriented Acked connection-oriented

10 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Framing DL layer divides physical bit stream into frames Checksum computed by source included in frame Checksum recomputed by destination and checked against checksum included in the frame –Discard/recover bad frame, notify source

11 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao How Does DL Layer Form Frames? Insert time gaps between frames: too risky Character count Flag bytes with byte stuffing Starting and ending flags, with bit stuffing Physical layer coding violations –Example: encode 1 bit of data with 2 bits 1 => 10 0 => 01 Can use 00 or 11 to delimit frames

12 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Framing Based on Character Count Use field in header to indicate number of characters in frame Problem: Count might be garbled

13 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Framing Based on Byte Stuffing Each frame starts and ends with a special flag byte –Problem: flag byte might appear in data –Solution: Source inserts ESC (DL escape) before each flag byte; ESC before each ESC Destination removes inserted ESC bytes Disadvantage: depends on 8-bits characters in ASCII

14 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Framing Based on Byte Stuffing

15 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Framing Based on Bit Stuffing Each frame begins and ends with special bit patterns, (in fact, a flag byte) When source ’ s data contains 11111, stuff 0 When destination receives , deletes 0 Advantages: –Allows arbitrary number of bits per frame –Allows arbitrary number of bits per character

16 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Framing Based on Bit Stuffing: Example Original Frame (payload only) Frame after bit stuffing Received Frame after taken stuffed bit out

17 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Exercise Q1. The following character encoding is used in a data link protocol: A: ; B: ; FLAG: ; ESC: Show the bit sequence transmitted (in binary) for the four- character frame: A B ESC FLAG when each of the following framing methods are used: (a) Character count. (b) Flag bytes with byte stuffing. (c) Starting and ending flag bytes, with bit stuffing

18 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Exercise Q2. The following data fragment occurs in the middle of a data stream for which the byte- stuffing algorithm described in the text is used: A B ESC C ESC FLAG FLAG D. What is the output after stuffing?

19 6/16/2015EEC-484/584: Computer NetworksWenbing Zhao Exercise Q3. A bit string, , needs to be transmitted at the data link layer. What is the string actually transmitted after bit stuffing?