Chapter 4 Chapter 4 Data Link Layer MIS 430. 2 Chapter 4 Data Link Layer Functions Media access control – when computers can transmit Detects and corrects.

Slides:



Advertisements
Similar presentations
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
Advertisements

1 Chapter 4. Data Link Layer Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc.
Copyright 2005 John Wiley & Sons, Inc4 - 1 Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Dwayne Whitten, D.B.A Mays Business School Texas A&M University
Assessment 1 Review Network Layers. Computer 1Computer 2 2.
1 Topic 5: Data Link Layer - Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 6 Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control.
Data Link Layer – Part 1 V.T.Raja Oregon State University.
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Sixth Edition.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
The Data Link Layer Chapter 3. Position of the data-link layer.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Chapter 6: Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control
Chapter 10 Data Link Control Protocols. Agenda Definition Functions Attributes Concepts Types Conversion.
Chapter 2 Data Communications Concepts. What We’ll Be Covering Data Communications Concepts: Data Communications Architecture Data Digitization Data Transmission.
5-1 Business Data Communications and Networking, 6 th ed. FitzGerald and Dennis.
Midterm Review - Network Layers. Computer 1Computer 2 2.
5-1 Business Data Communications and Networking, 6 th ed. FitzGerald and Dennis.
Chapter 5 Data Link Layer.
Lecture 06 Errors, Error Detection, and Error Control.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Data Link Layer Chapter 4. Announcements and Outline Announcements Review Assignment Due next Thurs., 9/17 Assessment #1 – Tues., 9/22 MC Short Answer.
Dwayne Whitten, D.B.A Mays Business School Texas A&M University
1 Chapter 6 Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach.
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Eighth Edition.
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques:
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, October 2011.
1 Message Delineation Identify the start and end of messages by: Identify the start and end of messages by:
Errors, Error Detection, and Error Control
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
PREPARED BY: ENGR. JO-ANN C. VIÑAS
Chapter 6: Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Third Edition.
Copyright ©2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible web site, in whole.
FUNDAMENTALS OF NETWORKING
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 5 Data Link Layer.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
Recap of Layers Application, Data Link and Physical.
Chapter 4 Data Link Layer.
Dwayne Whitten, D.B.A Mays Business School Texas A&M University
24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Chapter 6 Errors, Error Detection, and Error Control
ERROR DETECTION AND CORRECTION
Data Link Layer.
Part III. Data Link Layer
Chapter Six Errors, Error Detection, and Error Control
Chapter 4 Data Link Layer.
Topic 5: Data Link Layer - Chapter 9: Data Link Control
Chapter 4 Data Link Layer
Part III Datalink Layer 10.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
Chapter 4 Data Link Layer 9/18/2018 5:27:13 AM9/18/2018 5:27:13 AM.
Chapter 4 Data Link Layer.
Business Data Communications
Chapter 7 Error Detection and Correction
Chapter Nine: Data Transmission
Chapter 4 Data Link Layer.
Error Detection and Correction
Dwayne Whitten, D.B.A Mays Business School Texas A&M University
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Chapter 4 Chapter 4 Data Link Layer MIS 430

2 Chapter 4 Data Link Layer Functions Media access control – when computers can transmit Detects and corrects transmission errors Identifies the start and end of messages

3 Chapter 4 I. Media Access Control Def’n – method to control when computers can transmit on same circuit (not needed with full duplex circuit) Controlled Access XON/XOFF: if ready to receive, sends XON character If not ready, sends XOFF character Hardware: DTR line in serial port

4 Chapter 4 Media Access Control, contd Polling: send a signal to a client that allows it to transmit Roll-call: server works consecutively through the clients Hub polling (aka token passing): a computer starts the poll, sends it message, then passes the token to next computer; can transmit only if it holds the token

5 Chapter 4 Media Access Control, contd Contention Wait until free, then broadcast (Ethernet) uses contention Can have collisions Relative performance: response time Contention better for small networks (~20) Polling better for larger networks with more transmissions See Fig 4.1 p. 118 for comparison chart

6 Chapter 4 II. Error Control Human errors Control thru the application program Network errors Corrupted data Lost data Networks should prevent, detect, and correct corrupted data Prevention is much preferred!

7 Chapter 4 Source of Errors Line noise/distortion Line outages: cuts! Faulty equipment White noise: background hiss Impulse noise: spikes Cross-talk: signal picked up in another circuit Echo: poor connections Attenuation: loss of signal power over distance Intermodulation: several circuits combine Jitter: phase changes can cause volume fluctuation Harmonic distortion: amp doesn’t reproduce

8 Chapter 4 Error Prevention Shielding Move cables away from noise Change mux technology (crosstalk) Replace repeater/amplifier or put closer together Purchase conditioned circuit (better quality lines) from common carrier

9 Chapter 4 Error Detection Send extra data with each packet so that receiving side checks message received with message sent Parity checking Make number of ones an even or odd number by adding another bit to byte (50% accuracy) LRC: longitudinal redundancy checking Add block check character to packet Similar to parity through packet 98% error detection rate

10 Chapter 4 Error Detection Polynomial Checking Based on mathematical algorithm CRC: Cylic Redundancy Check adds 8, 16, 24, or 32 bits to message CRC-16: % error detection CRC-32: % error detection! For example, see next slide..

11 Chapter 4 UPC Code: CRC Check Digit UPC: check digit = is manufacturer code = is product code for that manufacturer Algorithm: Starting from right, add odd digits Multiply sum by 3 Starting from right, add even digits Add to previous number Check digit is ten’s complement of 1s digit

12 Chapter 4 UPC Example: checksum Suppose UPC is: =20 20*3= = = =5 which is the check digit added to end Scan product, calculate check digit If same as with packet, OK If not same as with packet, need to rescan

13 Chapter 4 Correction: Retransmission If error is detected, correction occurs when packet is retransmitted ARQ – Automatic Repeat reQuest Stop and Wait ARQ: ACK/NAK Continuous ARQ: send next packet unless get a NAK Both of these are flow control techniques

14 Chapter 4 Forward Error Correction Add redundant bits to correct errors without retransmitting packet Hamming Code (corrects 1-bit errors) Reed-Solomon (corrects longer errors) RAID: redundant array of inexpensive disks uses forward error correction RAID 5: 3 drives = 2 drives ( =36 GB with redundancy)

15 Chapter 4 III. Data Link Protocols Asynchronous transmission Start-stop: each character sent independently of other characters Start bit, 7 data bits, stop bit, parity or 10 bits per character (2/8 overhead) Asynchronous file transfer protocols Xmodem: CRC-8 with 132 char packets Kermit: CRC-24 with 1000 char packets

16 Chapter 4 Data Link Protocols Synchronous Transmission Message sent in a block (packet) w/ checksum Less overhead – sync characters at start and end of packet rather than for each character SDLC: Synchronous Data Link Control – IBM 3270 standard Bit-oriented protocol for 3270 terminals 3270 represents IBM mainframe connection PC can do this with 3270/IRMA card

17 Chapter 4 Synchronous Transmission HDLC: High-level data link control ISO standard, very similar to SDLC Ethernet (802.3) Similar to SDLC but length is carried along with other signal characters CRC-32 plus up to 1492 byte packets: Dest Addr|Source Addr|Length|Control|…message…|CRC-32

18 Chapter 4 Synchronous Transmission PPP: Point to Point Protocol 1990s: dial-up networking to ISP CRC-16 plus packet up to 1,500 bytes: Flag|Address|Control|Protocol|…message…|CRC-16|Flag

19 Chapter 4 IV. Transmission Efficiency How many overhead bits are needed beyond the information bits? TE=total # information bits/total # bits Ex: 7-bit ASCII asynchronous 3 overhead bits, 7 data bits TE=7/10=70% Thus V.90 56K maximum is 43.6 Kbps

20 Chapter 4 Improving Efficiency Increase size of message in packet Decrease number of overhead bits But CRC will detect errors Problem:If a much longer packet has an error and must be retransmitted, this reduces efficiency!

21 Chapter 4 TRIB Calculation TRIB=K(M-C)(1-P) (M/R)+T K=information bits/character 7 M=packet length in characters 400 R=data transmission rate in char/sec 600 C=avg number of noninformation char/block 10 P=probability that a block will require retransmission.01 T=time between in blocks in seconds.025 sec Example using values above: TRIB=7(400-10)(1-.01)/[400/ ]=3,908 bps

22 Chapter 4 Mgt Focus 4-2: Packet Size Standard Commercial tested packet size from 500 to 32,000 bytes 32,000 byte more 44% more efficient but response time delays occurred Ideal packet size was between 4,000 and 8,000 bytes However, this depends on the application and message pattern