Data Link Control Protocols. 2 Introduction Data link layer –Concerned with the transfer of data over a serial data link Link –Point-to-point physical.

Slides:



Advertisements
Similar presentations
CH. 7 Data Link Control. Requirements & Objectives of Data Link Control Frame Synchronization Flow Control Error Control Addressing Control and Data on.
Advertisements

Telecommunication Technologies
Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
HIGH-LEVEL DATA LINK CONTROL (HDLC) HDLC was defined by ISO for use on both point-to-point and multipoint data links. It supports full-duplex communication.
William Stallings Data and Computer Communications 7th Edition
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 – Data Link Control Protocols.
Chapter 11 Data Link Control (DLC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 11 Data Link Control (DLC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data and Computer Communications Updated: 2/9/2009.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Data Link Control Slide 1 Data Link Control Chapter 7.
Piggybacking A method to combine a data frame with ACK. Station A and B both have data to send. Instead of sending separately, station A sends a data frame.
1 Data Transmission and Computer Networks Data Link Control Protocols.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
Data Link Control Protocols Data link control protocol Provides a layer of control between systems on a transmission medium referred to as data link. DLC.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 10 Data Link Control Protocols. Agenda Definition Functions Attributes Concepts Types Conversion.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Data Link Protocols Asynchronous Protocols Synchronous Protocols
Gursharan Singh Tatla DATA LINK PROTOCOLS 24-Mar
HDLC and PPP. The Data Link Layer in the Internet A home personal computer acting as an internet host. Technology like Ethernet cannot provide “high-level”
MODULE I NETWORKING CONCEPTS.
Network Technology CSE Network Technology CSE3020 Week 6.
Data and Computer Communications Eighth & Ninth Edition by William Stallings Chapter 7 – Data Link Control Protocols.
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
Data and Computer Communications Ninth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data and Computer Communications, Ninth Edition.
Open Systems and Data Link Protocols November 7, 2002.
Link Layer Protocols Martin Weiss. Slide 2 Objectives of this Meeting u Explain what a protocol is u Compare connection-oriented with connectionless protocol.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Control and Protocols.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
1 Kyung Hee University Data Link Protocols. 2 Kyung Hee University 11 장 Data Link Control and Protocols 11.1 Flow and Error Control 11.2 Stop-and-Wait.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
Lecture 12 X.25. X.25 is a packet switching wide area network developed by ITU-T in Originally it was designed for private use Definition : X.25.
Chapter 11 Data Link Protocols A data link protocol is a set of specifications used to implement the data link layer [A protocol is the set of rules or.
Chapter 11 Data Link Control
Data Link Protocols Prof. Choong Seon HONG.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
DATA LINK CONTROL PROTOCOLS. 2 Introduction Data link control layer – often abbreviated simply to data link layer – is concerned with the transfer of.
CIS : Data Link Control. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow Transmission.
Data Link Protocols ผศ.ดร. อนันต์ ผลเพิ่ม
1 Reliable stream service--TCP 1.TCP accepts byte stream, segments 2.It is over IP, so out-of-sequence is very common --lost or error frame results in.
FIT – Monash University High-Level Data Link Control
1 Copyright © Monash University ECS5365 Lecture 2 ISDN Protocols and Standards Philip Branch Centre for Telecommunications and Information Engineering.
Ch. 6 Digital Data Communication Techniques. 6.1Asynchronous & Synchronous Transmission Asynchronous Transmission: transmission in which each information.
Data and Computer Communications Data Link Control Protocols.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 9: Data Link Control Business Data Communications, 4e.
Data and Computer Communications Data Link Control Protocols.
Data Communications Data Link Layer.
PROTOCOL BASICS. 2 Introduction In chapter 3: Circuits and techniques can be employed to transmit a frame of information between 2 DTEs Error detection.
24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.
Data Link Control Protocols  need layer of logic above Physical  to manage exchange of data over a link frame synchronization frame synchronization flow.
High level Data Link Layer Protocol - HDLC
HDLC and PPP.
Chapter 9: Data Link Control
Chapter 11 Data Link Control (DLC)
CIS 321 Data Communications & Networking
Protocol Basics.
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Error control.
Instructor Mazhar Hussain
Jiying Zhao SITE, University of Ottawa Canada.
Data Link Control (DLC) Services
William Stallings Data and Computer Communications
Chapter 9: Data Link Control
Presentation transcript:

Data Link Control Protocols

2 Introduction Data link layer –Concerned with the transfer of data over a serial data link Link –Point-to-point physical circuit –Radio-based channel –Physical or logical link through a switched network

3 Introduction (cont ’ d) User service (depending on application) –Best-try (connectionless) service –Reliable (connected- oriented) service

4 Introduction (cont ’ d) Connectionless service –Although error check bits are used to detect errors –Any frames that are found to contain transmission errors are simply discarded –Unacknowledged service

5 Introduction (cont ’ d) Connection-oriented service –employs the error and flow control procedures –A high probability that the data will be error free without duplicates and that messages will be delivered in the same sequence as they were submitted

6 Application environments End-to-end basis –The data link protocols are located in the two communications DTEs computers Logical significance –It operates over the local link connecting

7 Application environments (cont ’ d)

8 Point-to-point circuit –Operates on an end-to-end basis –A reliable connection-oriented service is normally used –Kermit and X-modem Multipoint topology –Such architectures are normally used in applications that involve a single master computer communicating with a distributed community of slave computers

9 Application environments (cont ’ d) –A connection-oriented data link protocol WANs (fig 5.2.c) –The link protocol has only local significance and operates between the DTE and the local DCE LANs (fig 5.2.d) –The user of relatively short, low bit error rate links that operate at high bit rates

10 Application environments (cont ’ d) –Errors are relatively infrequent and the end-to-end frame transfer time is very fast –It operates in a connectionless, best-try mode –All retransmission and flow control functions are left to a higher protocol layer in two DTEs

11 Character-oriented protocols Selected transmission control characters –To perform the various transmission control functions associated with link management, start-of-frame and end-of- frame delimiting, error control, and data transparency

12 Simplex protocols Kermit –It is used extensively for the transfer of the contents of a specified file or group of files from one computer to another over a point-to-point data link –Link A circuit set up through the switched telephone network using modems A pair of twisted-pair lines –Synchronous transmission is used –Idle RW protocol

13 Simplex protocols (cont ’ d) If modems are being used –Originate mode –Answer mode

14 Simplex protocols (cont ’ d) Kermit is not simply data link protocol –It performs a number of additional functions –Such as file reading/writing and file segmentation and reassembly

15 Simplex protocols (cont ’ d) Frame format –Fig 5.4 The contents of a text file are sent as a sequence of 80 character blocks The binary files are sent simply as a string of 8-bit bytes

16 Simplex protocols (cont ’ d)

17 Half-duplex protocols Most character-oriented protocols –Operate character-oriented protocols operate in the half-duplex, stop-and-wait mode BSC (Binary Synchronous Control) –Developed by IBM –Be used with a synchronous control scheme –Be used in multipoint applications

18 Half-duplex protocols (cont ’ d) –Topology Multipoint network Multidrop bus network

19 Half-duplex protocols (cont ’ d) Transmission control characters –Table 5.1

20 Half-duplex protocols (cont ’ d) Data transparency –The use of DLE character –When transmitting pure binary data rather than character strings –DLE/STX, DLE/ETX –Difference when operating in the transparent mode is error control Instead of a simple 8-bit longitudinal parity check per block A mode sophisticated polynomial code with each block terminated by a 16-bit CEC rather than an 8-bit BCC

21 Half-duplex protocols (cont ’ d) The master computer –Scheduling all transmissions on each shared data link –Poll control message Be used to request a specific slave computer to send any waiting data message it may have –Select control message Be used to ask the selected slave whether it is ready to receive a data message

22 Half-duplex protocols (cont ’ d) Retransmission –ACK, NACK 에 의해 결정 Timeout mechanism – 전송 data 가 완전히 파괴된 경우에 사용 Sequence number –Sending site Only increment –Receiving site Modulo-2

23 Half-duplex protocols (cont ’ d)

24 Half-duplex protocols (cont ’ d) User Interface –It is important to discriminate between the services provided by the link layer and the detailed operation of the link layer protocol entity

25 Half-duplex protocols (cont ’ d) Protocol Performance –An important performance parameter The average time taken to poll or select all the slave stations on a link –In practice Because of the low link utilization of idle RQ Message transmitting time is the dominant time in a poll or select sequence

26 Half-duplex protocols (cont ’ d) Example –Average message : 1000 bits –Control message : 30 bits –Transmission rate : 10kbps »Message transmit time : 0.1s »Control message transmit time : 0.003s

27 Duplex protocols Duplex protocol –Be used in the early ARPANET –It operated over the point-to-point duplex link –The transmission of information in both directions simultaneously –It utilizes a continuous RQ transmission control scheme for both directions

28 Duplex protocols (cont ’ d) –It operates with an effective send window of either 8 for terrestrial links or 16 for satellite links –To ensure a continuous flow of frames, 8(or 16 for satellite) separate stop-and-wait information flows can be in progress at any instant

29 Duplex protocols (cont ’ d) Each frame is treated as a separate entity –On receipt of a frame to be forwarded, the sending data link protocol simply scans the busy/idle bit associated with each logical channel Whether a channel is free

30 Duplex protocols (cont ’ d) –If so inserts the appropriate send sequence number and the logical channel number in the frame header Starts a timer for the frame and initiates its transmission –If channel is not free The frame is left in the input queue to wait for a free channel Bit-oriented protocols –Protocols defines bit patterns rather than transmission control characters to signal the start and end of a frame –Frame delimiting »Unique start-of-frame and end-of-frame bit patterns as flags ( ) »A unique start-of-frame bit pattern, known as the start delimiter( ), and a length(byte) count in the header at the start of the frame

31 Bit-oriented protocols (cont ’ d) –Unique start-of-frame and end-of-frame delimiters that include bit encoding violations

32 High-level data link control HDLC –An international standard by ISO –For use on both point-to-point and multipoint data links –It supports full-duplex, transparent-mode operations

33 HDLC (cont ’ d) 3 operational mode –NRM Normal response mode It is used in unbalanced configurations Slave stations can transmit only when specifically instructed by the master station

34 HDLC (cont ’ d) –ARM Asynchronous response mode It is used in unbalanced configurations It allows a secondary to initiate a transmission without receiving permission from the primary –ABM Asynchronous balanced mode It is used mainly on duplex point-to-point links Each station has an equal status and performs both primary and secondary functions

35 HDLC (cont ’ d) Frame formats –3 class Unnumbered frames –Be used for such functions as link setup and disconnections –They do not contain any acknowledgement information, which is contained in sequence numbers

36 HDLC (cont ’ d) Information frames –It carries the actual information or data and are normally referred to simply as I-frames –I-frames can be used to piggyback acknowledgement information relating to the flow of I-frames in the reverse direction when the link is being operated in ABM or ARM Supervisory frames –It is used for error and flow control and hence contain send and receive sequence numbers

37 HDLC (cont ’ d) Flag –Start-of-frame and end-of-frame delimiter FCS –16-bit CRC for complete contents enclosed between the two flag delimiters Address field –Depend on the mode of operation (group address, broadcast address)

38 HDLC (cont ’ d) Frame types –Unnumbered frames are used for link management SNRM and SABM-frames are used both to set up a logical link between the primary and a secondary station and to inform the secondary station of the mode of operation to be used –To clear a logical link, send a DISC frame

39 HDLC (cont ’ d) –UA frame is used as a acknowledgement –Supervisory frame RR, RNR –Be used in both NRM and ABM REJ and SREJ-frame –Be used only in ABM which permits simultaneous two-way communication across a point-to-point link SREJ-frame –Be used with a selective repeat transmission procedure REJ-frame –Be used with a go-back-N procedure

40 HDLC (cont ’ d) Protocol operation –Link management Before any information may be transmitted –A logical connection between the two communicating parties must be established –This is accomplished by the exchange of two unnumbered frames

41 Link management Connection establishment –SNRM(multidrop link) –SARM(point-to-point link) Clear link –DISC frame Acknowledgement –UA frame

42 HDLC (cont ’ d) –Data transfer The unnumbered poll(UP) frame with the P bit set to 1 if normally used by the primary to poll a secondary Error control –It uses a continuous RQ procedure with either a selective repeat or a go-back-N retransmission strategy Flow control –It is based on a window mechanism

43 Data transfer

44 Data transfer (cont ’ d)

45 HDLC (cont ’ d) –User interface

46 Link access procedure version B LAPB –A subset of HDLC –It is used to control the transfer of I-frames across a point-to-point duplex data link –An extended version of LAPA(link access procedure version A)

47 LAPB (cont ’ d) Applicability –In fig 5.2.c –LAPB is used to control the transfer of information frames across the local DTE-DCE interface –It has local significance Frames –RR- and REJ-frames are used for error control –RNR is used flow control

48 LAPB (cont ’ d)

49 Multilink procedure HDLC –Controls the transfer of information frames across a single duplex link –As a SLP(single link procedure) MLP –It simply treats the set of single link procedures as a pool of links available to transfer user information

50 Multilink procedure (cont ’ d) Additional control field –MLC field –Add to the head of each frame –It receives for transmission prior to passing the frame to an SLP –Two octets –Contains a 12-bit sequence number

51 Link access procedure for modems LAPM –The protocol used in error correction modems such as the V.32 modem Each modem comprises two functional units –User interface part (UIP) –Error correcting part (ECP)

52 LAPM (cont ’ d) XID (exchange identification) –The operational parameter values are negotiated when the two ECPs exchange two special unnumbered frames –One as a command and the other as a response

53 Link access procedure D-channel LAPD –The HDLC subset for use with the ISDN –It has been defined to control the flow of I- frames associated with the signaling channel(D-channel) –Two types of service Unacknowledged (best-try) service Acknowledged (connection-oriented) service

54 LAPD (cont ’ d)

55 LAPD (cont ’ d)

56 Logical link control LLC –The HDLC derivative used with LANs –With LANS The data link layer is comprised of two sublayers –MAC(medium access control) sublayer »It implements the distributed access control algorithm –LLC sublayer

57 LLC (cont ’ d) User services –Unacknowledged connectionless service It allows the user to initiate the transfer of service data units with a minimum of protocol overheads –Connection-oriented services It allow the user to establish a link-level logical connection before initiating the transfer of any service data units and, if required, to implement error recovery and sequencing of the flow of these units across an established connection

58 LLC (cont ’ d) –Acknowledged connectionless service Obtain reply service –It allows an item of data to be requested from a remote user without a connection first being established

59 LLC (cont ’ d) Protocol operations –Frame Address fields refer to the LLC service access point only No FCS field The complete LLC frame is passed to the MAC sublayer in the form of a primitive MAC sublayer handles the network addressing and error-detection functions

60 Protocol operations(cont ’ d) Two types of operation –Type 1 To support the unacknowledged connectionless service –Type 2 To support the connection-oriented service

61 LLC (cont ’ d) MAC services –User service primitives MA_UNITDATA.request MA_NITDATA.indication MA_UNITDATA.confirmation

62 MAC services (cont ’ d)