Data Communications Data Link Control. What Is Data Link Control? The Data Link layer of a model typically has the following responsibilities: 1. Creates.

Slides:



Advertisements
Similar presentations
William Stallings Data and Computer Communications 7th Edition
Advertisements

CH. 7 Data Link Control. Requirements & Objectives of Data Link Control Frame Synchronization Flow Control Error Control Addressing Control and Data on.
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Telecommunication Technologies
Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
HIGH-LEVEL DATA LINK CONTROL (HDLC) HDLC was defined by ISO for use on both point-to-point and multipoint data links. It supports full-duplex communication.
Chapter 14: Data Link Control
EIE325: Telecommunication TechnologiesMaciej J. Ogorza ł ek, PolyU, EIE Telecommunication Technologies Week 8 Flow Control Error Control.
William Stallings Data and Computer Communications 7th Edition
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 – Data Link Control Protocols.
Data and Computer Communications Updated: 2/9/2009.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Data Link Control Slide 1 Data Link Control Chapter 7.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 – Data Link Control Protocols.
Piggybacking A method to combine a data frame with ACK. Station A and B both have data to send. Instead of sending separately, station A sends a data frame.
Chapter 7 – Data Link Control Protocols
Data Link Control Protocols Data link control protocol Provides a layer of control between systems on a transmission medium referred to as data link. DLC.
1 Data Link Layer Lesson 6 NETS2150/ Position of the data-link layer McGraw-Hill © The McGraw-Hill Companies, Inc., 2004.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
Semester EEE449 Computer Networks The Data Link Layer En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK) Room.
Data Communication and Networks Lecture 4 Data Link Control (Part 2) September 29, 2005.
Semester Copyright USM EEE442 Computer Networks The Data Link / Network Layer Functions: Flow Control and Error Control En. Mohd Nazri Mahmud.
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Gursharan Singh Tatla DATA LINK PROTOCOLS 24-Mar
Link-Level Flow and Error Control
Network Technology CSE Network Technology CSE3020 Week 6.
Data and Computer Communications Eighth & Ninth Edition by William Stallings Chapter 7 – Data Link Control Protocols.
Data Link Control Protocols
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
William Stallings Data and Computer Communications 7th Edition
Data and Computer Communications Ninth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data and Computer Communications, Ninth Edition.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Control and Protocols.
Chapter 3 THE DATA LINK LAYER
1 Kyung Hee University Data Link Protocols. 2 Kyung Hee University 11 장 Data Link Control and Protocols 11.1 Flow and Error Control 11.2 Stop-and-Wait.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
Chapter 11 Data Link Protocols A data link protocol is a set of specifications used to implement the data link layer [A protocol is the set of rules or.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Eighth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange.
DATA LINK CONTROL PROTOCOLS. 2 Introduction Data link control layer – often abbreviated simply to data link layer – is concerned with the transfer of.
CIS : Data Link Control. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow Transmission.
Data Link Layer Flow and Error Control. Flow Control Flow Control Flow Control Specifies the amount of data can be transmitted by sender before receiving.
CSCI 465 D ata Communications and Networks Lecture 10 Martin van Bommel CSCI 465 Data Communications & Networks 1.
FIT – Monash University High-Level Data Link Control
Data and Computer Communications Data Link Control Protocols.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
Data and Computer Communications Data Link Control Protocols.
William Stallings Data and Computer Communications Chapter 7 Data Link Control.
Data Link Control Protocols  need layer of logic above Physical  to manage exchange of data over a link frame synchronization frame synchronization flow.
2.10 Flow and Error Control Before that ...
High level Data Link Layer Protocol - HDLC
HDLC and PPP.
William Stallings Data and Computer Communications 7th Edition
The Data Link Layer Supplementery Slides
Chap. 4 Data link layer 2.
3.2 Data Link Layer : Error & Flow Control
CIS 321 Data Communications & Networking
Chapter 14: Data Link Control
Chapter 14: Data Link Control
Chapter 14: Data Link Control
Chapter 14: Data Link Control
EEC4113 Data Communication & Multimedia System Chapter 4: Flow Control by Muhazam Mustapha, August 2010.
William Stallings Data and Computer Communications
Protocols and the TCP/IP Suite ECE405- Computer Networks
Presentation transcript:

Data Communications Data Link Control

What Is Data Link Control? The Data Link layer of a model typically has the following responsibilities: 1. Creates a frame 2. Creates an error-free logical connection Error control Flow control 3. Makes sure the receiver stays synchronized with the incoming data stream

Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time Time taken to emit all bits into medium Propagation time Time for a bit to traverse the link

Model of Frame Transmission

Stop and Wait Source transmits frame Destination receives frame and replies with acknowledgement Source waits for ACK before sending next frame Destination can stop flow by not send ACK Works well for a few large frames

Stop and Wait Link Utilization

T F = t prop + t frame + t proc + t prop + t ack + t proc T proc and t ack negligible, so T = n(2t prop + t frame ) U = (n * t frame ) / n(2t prop + t frame ) = t frame / (2t prop + t frame ) With a = t prop / t frame, U = 1 /(1 + 2a)

Stop and Wait Link Utilization Furthermore, a = t prop / t frame = Propagation Time / Transmission Time = (d/V) / (L/R) = Rd/VL Where: D = distance of link V = velocity of propagation (air = speed of light (3 x 10 8 m/s) ; fiber = same ; copper = 0.67 x speed of light) L = length of frame in bits R = data rate in bps

Stop and Wait Link Utilization Example Consider a WAN using ATM, 2 stations 1000 km apart, ATM frame size = 424 bits, standard data rate = Mbps Transmission Time (L/R) =424/ x 10 6 = 2.7 x seconds Assume optical link: Propagation Time (d/V) = 10 6 m / 3 x 10 8 m/sec = 0.33 x seconds

Stop and Wait Link Utilization Example Thus, a = 0.33 x / 2.7 x = 1222 U = 1/(1+2a) = 1/(1+2x1222) = ouch! Another example: A LAN V = 2 x 10 8 m/s L = 1000 bits R = 10 Mbps D = 0.1 km = 100 m

Stop and Wait Link Utilization Example Thus, a = (d/V) / (L/R) = U = 1/(1+2a) = 0.99No ouch!

Sliding Windows Flow Control Allow multiple frames to be in transit Receiver has buffer W long Transmitter can send up to W frames without ACK Each frame is numbered ACK includes number of next frame expected Sequence number bounded by size of field (k) Frames are numbered modulo 2 k

Sliding Window Diagram

Example Sliding Window

Sliding Window Enhancements Receiver can acknowledge frames without permitting further transmission (Receive Not Ready) Must send a normal acknowledge to resume If duplex, use piggybacking If no data to send, use acknowledgement frame If data but no acknowledgement to send, send last acknowledgement number again, or have ACK valid flag (TCP)

Sliding Window Performance U = 1 if W >= 2a + 1 where W = window size Thus, Utilization = 1 (100%) where ACK for frame 1 reaches A before A has exhausted its window U = W / (2a+1) if W < 2a + 1 Utilization = W/(2a+1) where A exhausts its window at t = W.

Sliding Window Performance Example: What is U for a 1000-bit frame on a 1 Mbps satellite link with 270 ms delay with a window size of 127? a = Prop/Tran =.270 sec/(1000/ ) a = 270 2a + 1 = 541 Is W < 2a + 1? Yes, so U = W / (2a + 1) U = 127 / 541 = 0.23

Error Control Detection and correction of errors Lost frames Damaged frames Automatic repeat request Error detection Positive acknowledgment Retransmission after timeout Negative acknowledgement and retransmission

Automatic Repeat Request (ARQ) Stop and wait Go back N Selective reject (selective retransmission)

Stop and Wait Source transmits single frame Wait for ACK If received frame damaged, discard it Transmitter has timeout If no ACK within timeout, retransmit If ACK damaged,transmitter will not recognize it Transmitter will retransmit Receive gets two copies of frame Use ACK0 and ACK1

Stop and Wait - Diagram Simple Inefficient

Go Back N Based on sliding window If no error, ACK as usual with next frame expected Use window to control number of outstanding frames If error, reply with rejection Discard that frame and all future frames until error frame received correctly Transmitter must go back and retransmit that frame and all subsequent frames

Go Back N - Damaged Frame Receiver detects error in frame i Receiver sends rejection i Transmitter gets rejection i Transmitter retransmits frame i and all subsequent

Go Back N - Lost Frame (1) Frame i lost Transmitter sends i+1 Receiver gets frame i+1 out of sequence Receiver sends reject i Transmitter goes back to frame i and retransmits

Go Back N - Lost Frame (2) Frame i lost and no additional frames sent Receiver gets nothing and returns neither acknowledgement nor rejection Transmitter times out and sends acknowledgement frame with P bit set to 1 Receiver interprets this as command which it acknowledges with the number of the next frame it expects (frame i ) Transmitter then retransmits frame i

Go Back N - Damaged Acknowledgement / Rejection Receiver gets frame i and sends acknowledgement (i+1) which is lost Acknowledgements are cumulative, so next acknowledgement (i+n) may arrive before transmitter times out on frame i If transmitter times out, it sends acknowledgement with P bit set as before This can be repeated a number of times before a reset procedure is initiated

Go Back N - Diagram

Selective Reject Also called selective retransmission Only rejected frames are retransmitted Subsequent frames are accepted by the receiver and buffered Minimizes retransmission Receiver must maintain large enough buffer More complex login in transmitter

Selective Reject - Diagram

High Level Data Link Control One of the more popular data link control protocols Similar to IBM’s SDLC but more flexible Many data link protocols are based on HDLC – thus if you learn HDLC, you will understand many others, such as all the LAP standards

HDLC Station Types Primary station Controls operation of link Frames issued are called commands Maintains separate logical link to each secondary station Secondary station Under control of primary station Frames issued called responses Combined station May issue commands and responses

HDLC Link Configurations Unbalanced One primary and one or more secondary stations Supports full duplex and half duplex Balanced Two combined stations Supports full duplex and half duplex

HDLC Transfer Modes (1) Normal Response Mode (NRM) Unbalanced configuration Primary initiates transfer to secondary Secondary may only transmit data in response to command from primary Used on multi-drop lines Host computer as primary Terminals as secondary

HDLC Transfer Modes (2) Asynchronous Balanced Mode (ABM) Balanced configuration Either station may initiate transmission without receiving permission Most widely used No polling overhead

HDLC Transfer Modes (3) Asynchronous Response Mode (ARM) Unbalanced configuration Secondary may initiate transmission without permission form primary Primary responsible for line Rarely used

Frame Structure Synchronous transmission All transmissions in frames Single frame format for all data and control exchanges

Frame Structure Diagram

Flag Fields Delimit frame at both ends May close one frame and open another Receiver hunts for flag sequence to synchronize Bit stuffing used to avoid confusion with data containing inserted after every sequence of five 1s If receiver detects five 1s it checks next bit If 0, it is deleted If 1 and seventh bit is 0, accept as flag If sixth and seventh bits 1, sender is indicating abort

Bit Stuffing Example with possible errors

Address Field Identifies secondary station that sent or will receive frame Usually 8 bits long May be extended to multiples of 7 bits LSB of each octet indicates that it is the last octet (1) or not (0) All ones ( ) is broadcast

Control Field Different for different frame type Information - data to be transmitted to user (next layer up) Flow and error control piggybacked on information frames Supervisory - ARQ when piggyback not used Unnumbered - supplementary link control First one or two bits of control field identify frame type

Control Field Diagram

Poll/Final Bit Use depends on context Command frame P bit 1 to solicit (poll) response from peer Response frame F bit 1 indicates response to soliciting command

Information Field Only in information and some unnumbered frames Must contain integral number of octets Variable length

Frame Check Sequence Field FCS Error detection 16 bit CRC Optional 32 bit CRC

HDLC Operation Exchange of information, supervisory and unnumbered frames Three phases Initialization Data transfer Disconnect

Examples of Operation (1)

Examples of Operation (2)

Other DLC Protocols (LAPB,LAPD) Link Access Procedure, Balanced (LAPB) Part of X.25 (ITU-T) Subset of HDLC - ABM Point to point link between system and packet switching network node Link Access Procedure, D-Channel ISDN (ITU-D) ABM Always 7-bit sequence numbers (no 3-bit) 16 bit address field contains two sub-addresses One for device and one for user (next layer up)

Other DLC Protocols (LLC) Logical Link Control (LLC) IEEE 802 Different frame format Link control split between medium access layer (MAC) and LLC (on top of MAC) No primary and secondary - all stations are peers Two addresses needed Sender and receiver Error detection at MAC layer 32 bit CRC Destination and source access points (DSAP, SSAP)

Other DLC Protocols (Frame Relay) (1) Streamlined capability over high speed packet witched networks Used in place of X.25 Uses Link Access Procedure for Frame-Mode Bearer Services (LAPF) Two protocols Control - similar to HDLC Core - subset of control

Other DLC Protocols (Frame Relay) (2) ABM 7-bit sequence numbers 16 bit CRC 2, 3 or 4 octet address field Data link connection identifier (DLCI) Identifies logical connection More on frame relay later

Other DLC Protocols (ATM) Asynchronous Transfer Mode Streamlined capability across high speed networks Not HDLC based Frame format called “cell” Fixed 53 octet (424 bit) Details later

Protocol Specification and Verification By creating a finite state model, it is possible to determine which states are reachable and which are not (reachability analysis) Incompleteness – If it is possible for a certain frame to occur in a certain state and the model does not say what to do next Deadlock – If there exists a set of states from which there is no exit or no progress Extraneous transition – Model tells how to handle an event in a state in which the event cannot occur

Protocol Specification and Verification Many different “tools” for protocol specification and verification Packages such as SPIN Finite state graphs Petri Nets

Bisync (BSC)

Review Questions 1.What is the utilization of stop and wait flow control? (Two stations 20 km apart, 1000 byte frames, 256 Kbps, UTP) 2.What is the utilization of a sliding window system where stations are 100 km apart, 500 byte frame, 1 Mbps, microwave, window size = 255? 3.Why is the window size always 2 n – 1? 4.What are differences between go-back-n and selective reject?

Review Questions 5. Ten frames sent, 5 th frame is lost. What happens with go-back-N? With selective reject? 6. What is normal response mode in HDLC? 7. How does bit stuffing work? 8. What is the difference between HDLC and SDLC?