CSE 461 University of Washington1 Where we are in the Course Finishing off the Link Layer! – Builds on the physical layer to transfer frames over connected.

Slides:



Advertisements
Similar presentations
EIE325: Telecommunication TechnologiesMaciej J. Ogorza ł ek, PolyU, EIE Telecommunication Technologies Week 8 Flow Control Error Control.
Advertisements

William Stallings Data and Computer Communications 7th Edition
Chapter 11 Data Link Control
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
11-5 NOISY CHANNELS Although the Stop-and-Wait Protocol gives us an idea of how to add flow control to its predecessor, noiseless channels are nonexistent.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
I N THE N AME OF G OD C OMPUTER N ETWORKS C HAPTER 3: T HE D ATA L INK L AYER ( PART 3) Dr. Shahriar Bijani Shahed University March 2014.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 13 Introduction to Computer Networks.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
18-Aug-154/598N: Computer Networks Overview Direct link networks –Error detection - Section 2.4 –Reliable transmission - Section 2.5.
Lect11.ppt - 03/15/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 11 Link-Level Flow and Error Control by Zornitza Genova Prodanoff.
Link-Level Flow and Error Control
Principles of Reliable Data Transfer. Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver.
Network Technologies essentials Week 8: TCP congestion control Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University.
CSE 461 University of Washington1 Topic The sliding window algorithm – Pipelining and reliability – Building on Stop-and-Wait Yeah! Network.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
CS 4396 Computer Networks Lab
ARQ Mechanisms Rudra Dutta ECE/CSC Fall 2010, Section 001, 601.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
Transport over Wireless Networks Myungchul Kim
Chapter 3 THE DATA LINK LAYER
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
1 Transport Layer Lecture 10 Imran Ahmed University of Management & Technology.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
1 TCP III - Error Control TCP Error Control. 2 ARQ Error Control Two types of errors: –Lost packets –Damaged packets Most Error Control techniques are.
Network Technologies essentials Week 3: Retransmission, sharing links, switching Compilation made by Tim Moors, UNSW Australia Original slides by David.
Computer Networks Lecture 3: Data Link - part II Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Chapter 3: Channel Coding (part 3). Automatic repeat request (ARQ) protocols ▫Used in combination with error detection/correction ▫Block of data with.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Transport Layer: Sliding Window Reliability
11.1 Flow and Error Control Flow Control Error Control.
Failure detection The design of fault-tolerant systems will be easier if failures can be detected. Depends on the 1. System model, and 2. The type of failures.
Data Link Layer Flow and Error Control. Flow Control Flow Control Flow Control Specifies the amount of data can be transmitted by sender before receiving.
CSE/EE 461 Sliding Windows and ARQ. 2 Last Time We finished up the Network layer –Internetworks (IP) –Routing (DV/RIP, LS/OSPF) It was all about routing:
1 Direct Link Networks: Reliable Transmission Sections 2.5.
CSCI 465 D ata Communications and Networks Lecture 11 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Part III. Data Link Layer Chapter 11. Data Link Control COMP 3270 Computer Networks Computing Science Thompson Rivers University.
CSE331: Introduction to Networks and Security Lecture 4 Fall 2002.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Networking Lecture 16 – Reliable Transport.
Data Link Layer.
Data Link Layer Flow Control.
Data Link Layer - 3 Dr. Sanjay P. Ahuja, Ph.D.
Topic Multiplexing is the network word for the sharing of a resource
Chap. 4 Data link layer 2.
Instructor Mazhar Hussain
Computer Networks Lecture 3: Data Link - part II
Introduction of Transport Protocols
Data Link Layer: Data Link Control
Overview Jaringan Komputer (2)
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Data Link Layer (cont’d)
Overview Jaringan Komputer (3)
Communication Networks NETW 501
Advanced Computer Networks
Data Link Layer (cont’d)
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Error detection: Outline
Presentation transcript:

CSE 461 University of Washington1 Where we are in the Course Finishing off the Link Layer! – Builds on the physical layer to transfer frames over connected links Physical Link Network Transport Application

CSE 461 University of Washington2 Topics 1.Framing – Delimiting start/end of frames 2.Error detection/correction – Handling errors Done DSL

CSE 461 University of Washington3 Topics (2) 3.Retransmissions – Handling loss 4.Multiple Access – Classic Ethernet, Switching – Modern Ethernet

CSE 461 University of Washington4 Topic Two strategies to handle errors: 1.Detect errors and retransmit frame (Automatic Repeat reQuest, ARQ) 2.Correct errors with an error correcting code Done this

CSE 461 University of Washington5 Context on Reliability Where in the stack should we place reliability functions? Physical Link Network Transport Application

CSE 461 University of Washington6 Context on Reliability (2) Everywhere! It is a key issue – Different layers contribute differently Physical Link Network Transport Application Recover actions (correctness) Mask errors (performance optimization)

CSE 461 University of Washington7 ARQ ARQ often used when errors are common or must be corrected – E.g., WiFi, and TCP (later) Rules at sender and receiver: – Receiver automatically acknowledges correct frames with an ACK – Sender automatically resends after a timeout, until an ACK is received

CSE 461 University of Washington8 ARQ (2) Normal operation (no loss) Frame ACK Timeout Time SenderReceiver

CSE 461 University of Washington9 ARQ (3) Loss and retransmission Frame Timeout Time SenderReceiver Frame ACK X

CSE 461 University of Washington10 So What’s Tricky About ARQ? Two non-trivial issues: – How long to set the timeout? » – How to avoid accepting duplicate frames as new frames » Want performance in the common case and correctness always

CSE 461 University of Washington11 Timeouts Timeout should be: – Not too big (link goes idle) – Not too small (spurious resend) Fairly easy on a LAN – Clear worst case, little variation Fairly difficult over the Internet – Much variation, no obvious bound – We’ll revisit this with TCP (later)

CSE 461 University of Washington12 Duplicates What happens if an ACK is lost? X Frame ACK Timeout SenderReceiver New Frame?

CSE 461 University of Washington13 Duplicates (2) What happens if an ACK is lost? Frame ACK X Frame ACK Timeout SenderReceiver New Frame? New Frame??

CSE 461 University of Washington14 Duplicates (3) Or the timeout is early? ACK Frame Timeout SenderReceiver New Frame?

CSE 461 University of Washington15 Duplicates (4) Or the timeout is early? Frame ACK Frame ACK Timeout SenderReceiver New Frame? New Frame??

CSE 461 University of Washington16 Sequence Numbers Frames and ACKs must both carry sequence numbers for correctness To distinguish the current frame from the next one, a single bit (two numbers) is sufficient – Called Stop-and-Wait

CSE 461 University of Washington17 Stop-and-Wait In the normal case: Time SenderReceiver

CSE 461 University of Washington18 Stop-and-Wait (2) In the normal case: Frame 0 ACK 0 Timeout Time SenderReceiver Frame 1 ACK 1

CSE 461 University of Washington19 Stop-and-Wait (3) With ACK loss: X Frame 0 ACK 0 Timeout SenderReceiver New Frame?

CSE 461 University of Washington20 Stop-and-Wait (4) With ACK loss: Frame 0 ACK 0 X Frame 0 ACK 0 Timeout SenderReceiver New Frame? It’s a Resend!

CSE 461 University of Washington21 Stop-and-Wait (5) With early timeout: ACK 0 Frame 0 Timeout SenderReceiver New Frame?

CSE 461 University of Washington22 Stop-and-Wait (6) With early timeout: Frame 0 ACK 0 Frame 0 ACK 0 Timeout SenderReceiver New Frame? It’s a Resend OK …

CSE 461 University of Washington23 Limitation of Stop-and-Wait It allows only a single frame to be outstanding from the sender: – Good for LAN, not efficient for high BD Ex: R=1 Mbps, D = 50 ms – How many frames/sec? If R=10 Mbps?

CSE 461 University of Washington24 Sliding Window Generalization of stop-and-wait – Allows W frames to be outstanding – Can send W frames per RTT (=2D) – Various options for numbering frames/ACKs and handling loss Will look at along with TCP (later)

Topic Multiplexing is the network word for the sharing of a resource Classic scenario is sharing a link among different users – Time Division Multiplexing (TDM) » – Frequency Division Multiplexing (FDM) » CSE 461 University of Washington25

Time Division Multiplexing (TDM) Users take turns on a fixed schedule CSE 461 University of Washington

Frequency Division Multiplexing (FDM) Put different users on different frequency bands CSE 461 University of Washington27 Overall FDM channel

CSE 461 University of Washington28 TDM versus FDM In TDM a user sends at a high rate a fraction of the time; in FDM, a user sends at a low rate all the time Rate Time FDM TDM

CSE 461 University of Washington29 TDM versus FDM (2) In TDM a user sends at a high rate a fraction of the time; in FDM, a user sends at a low rate all the time Rate Time FDM TDM

CSE 461 University of Washington30 TDM/FDM Usage Statically divide a resource – Suited for continuous traffic, fixed number of users Widely used in telecommunications – TV and radio stations (FDM) – GSM (2G cellular) allocates calls using TDM within FDM

CSE 461 University of Washington31 Multiplexing Network Traffic Network traffic is bursty – ON/OFF sources – Load varies greatly over time Rate Time Rate Time

CSE 461 University of Washington32 Multiplexing Network Traffic (2) Network traffic is bursty – Inefficient to always allocate user their ON needs with TDM/FDM Rate Time Rate Time R R

Multiplexing Network Traffic (3) Multiple access schemes multiplex users according to their demands – for gains of statistical multiplexing CSE 461 University of Washington33 Rate Time Rate Time Rate Time R R R’<2R Two users, each need R Together they need R’ < 2R

CSE 461 University of Washington34 Multiple Access We will look at two kinds of multiple access protocols 1.Randomized. Nodes randomize their resource access attempts – Good for low load situations 2.Contention-free. Nodes order their resource access attempts – Good for high load or guaranteed quality of service situations

END © 2013 D. Wetherall Slide material from: TANENBAUM, ANDREW S.; WETHERALL, DAVID J., COMPUTER NETWORKS, 5th Edition, © Electronically reproduced by permission of Pearson Education, Inc., Upper Saddle River, New Jersey CSE 461 University of Washington35