Wireless and Mobile Networks (ELEC6219) Session 3: Theories of Data Communications. Data Link Layer. Adriana Wilde and Jeff Reeve 22 January 2015.

Slides:



Advertisements
Similar presentations
Chapter 3 The Data Link Layer.
Advertisements

The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
I N THE N AME OF G OD C OMPUTER N ETWORKS C HAPTER 3: T HE D ATA L INK L AYER Dr. Shahriar Bijani Shahed University March 2014.
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
Spring 2002CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 10 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao Cleveland State University
CSC 3352 Computer Communications Chapter 3&41 The Link Layer Has 2 main Components The Data Link Layer Medium Access Control (MAC) Examples:SLIP, PPP,
Fundamentals of Computer Networks ECE 478/578 Lecture #3: Encoding and Framing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
The Data Link Layer Chapter 3. Position of the data-link layer.
1 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
The OSI Reference Model
Bit and Byte Stuffing1. 2 Synchronous versus Asynchronous Transmissions There exists a hierarchy of synchronization tasks: –Bit level : recognizing the.
Circuit Switching (a) Circuit switching. (b) Packet switching.
Spring 2003CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Networks: Bit and Byte Stuffing
Adapted from Tanenbaum's Slides for Computer Networking, 4e The Data Link Layer Chapter 3.
Computer Networks: Bit and Byte Stuffing 1 Bit and Byte Stuffing.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
EE 122: Encoding And Framing Ion Stoica September 9, 2002.
CSE331: Introduction to Networks and Security Lecture 3 Fall 2002.
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
TOBB ETÜ ELE46/ELE563 Communications Networks Lecture 01 May 6, 2014 Fall 2011 Tuesday 10:30 – 12:20 (310) Thursday 15:30 – 17:20 (372) İsrafil Bahçeci.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
Chapter 3 THE DATA LINK LAYER
CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
27-Oct-15Computer Networks1 Outline Chapter 2: Direct Link Networks Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
Review:. Chapter 3: The Data Link Layer –achieve reliable, efficient communication between two physically connected machines. –Example problems to be.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
Data Link Layer. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Data Link Layer : Services, Framing, Error Detection and Correction2.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
The Data Link Layer. Functions of the Data Link Layer Provide service interface to the network layer Dealing with transmission errors Error detection.
The Data Link Layer. Functions of the Data Link Layer Provide service interface to the network layer Frame delineation Dealing with transmission errors.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 13.
1 Message Delineation Identify the start and end of messages by: Identify the start and end of messages by:
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
ELEC6113: Wireless and Mobile Networks Session 5: Data Link Protocols. Local Area Networks – Case Study Ethernet (I).
9-Jan-164/598N: Computer Networks Overview Performance metrics - Section 1.5 Direct link networks –Hardware building blocks - Section 2.1 –Encoding - Section.
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 6: Datalink layer problems Slides used.
Wireless and Mobile Networks (ELEC6219) Session 4: Efficiency of a link. Data Link Protocols. Adriana Wilde and Jeff Reeve 22 January 2015.
COMPUTER NETWORKS. Unit -2 Continue... Physical Layer Connection –Oriented Networks : X.25 Relay Frames Types of cables Co-axial Fiber optics Twisted.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
The Data Link Layer RIS 251 Dr. ir. S.S. Msanjila.
24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.
Chapter 3 The Data Link Layer.
Data Link Layer.
Data link layer (LLC).
Chapter 3 The Data Link Layer
Data Link Layer What does it do?
Overview Jaringan Komputer (2)
Net 221D : Computer Networks Fundamentals
Chapter 3 The Data Link Layer.
CS412 Introduction to Computer Networking & Telecommunication
Ion Stoica September 6, 2001 EE 122: Lecture 4 Ion Stoica September 6, 2001.
The Data Link Layer Chapter
Fundamentals of Computer Networks
Objectives of Today’s Lecture
Objectives of Today’s Lecture
UNIT-II The Data Link Layer.
ملاحظة: الكلام المسطر + الرسومات ذات السهم الاحمر*مهمة للمذاكرة
Networks: Bit and Byte Stuffing
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Wireless and Mobile Networks (ELEC6219) Session 3: Theories of Data Communications. Data Link Layer. Adriana Wilde and Jeff Reeve 22 January 2015

2 Plan for this lecture At the end of this lecture (and related activities), students should be able to : –… apply and compare several data encoding techniques –… consider design issues to ensure reliable delivery over an unreliable link –… reason why the data link layer adds control information as an overhead in the transmission

Review

How well do you think you can compare data encoding techniques? 4 1.Very well! 2.Quite well 3.Not very well 4.Help!

5 Review data encoding NRZ – Data ‘0’: negative voltage – Data ‘1’: positive voltage Manchester coding (original convention) – Data ‘0’: negative voltage changes from low to high – Data ‘1’: positive voltage changes from high to low NRZ-I – Data ‘0’: no transition – Data ‘1’: transition 4B/5B – 4 bits encoded in 5 transition bits (feedback from questions at the end of last lecture)

6 Review data encoding NRZ – Data ‘0’: negative voltage – Data ‘1’: positive voltage Manchester coding (original convention) – Data ‘0’: negative voltage changes from low to high – Data ‘1’: positive voltage changes from high to low NRZ-I – Data ‘0’: no transition – Data ‘1’: transition 4B/5B – 4 bits encoded in 5 transition bits (feedback from questions at the end of last lecture)

7 Review data encoding (feedback from questions at the end of last lecture) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall, 2011 p.275 (T. 4ed) p.146 (T. 5ed)

Talking point 8 Assuming NRZ-I encoding was used for the waveform below, what is the original bit sequence? A B C D E.None of the above

Talking point 9 Assuming Manchester encoding was used for the waveform below, what is the original bit sequence? A B C D E.None of the above

Are you now able to compare data encoding techniques? 10 1.Yes, very well! 2.Quite well 3.Not very well 4.Help!

Data Link Layer

12 Data Link Layer What is the data link layer for? What does it offer? What does it require? p (T. 4ed) p (T. 5ed) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

13 Services offered by the Data Link Layer What is the data link layer for? What does it offer? What does it require? p (T. 4ed) pp (T. 5ed)

14 Services offered by the Data Link Layer What is the data link layer for? What does it offer? What does it require? –This layer transforms a raw transmission facility into a line “free of errors” to the next layer –To achieve that, it makes the sender break up the data into sequential frames, which are acknowledged by the receiver –By doing so, it regulates the flow of data so that slow receivers are not swamped by fast senders p (T. 4ed) pp (T. 5ed)

15 Services offered by the Data Link Layer They can vary from protocol to protocol There are 3 possibilities: –Unacknowledged connectionless service –Acknowledged connectionless service –Acknowledged connection-oriented service pp (T. 4ed) pp (T. 5ed)

16 Services offered by the Data Link Layer They can vary from protocol to protocol There are 3 possibilities: –Unacknowledged connectionless service (Appropriate when the error rate is very low, e.g. Ethernet) –Acknowledged connectionless service (Next step in reliability, e.g (WiFi) –Acknowledged connection-oriented service (Appropriate over long, unreliable links, e.g. satellite channels or long distance telephone circuit) pp (T. 4ed) pp (T. 5ed)

17 Framing Breaks up the bit stream (the payload) into discrete frames and adds control information There are 4 methods: –Byte count –Flag bytes with byte stuffing –Flag bits with bit stuffing –Physical layer coding violations pp (T. 4ed) pp (T. 5ed)

18 Framing Breaks up the bit stream (the payload) into discrete frames and adds control information There are 4 methods: –Byte count –Flag bytes with byte stuffing –Flag bits with bit stuffing –Physical layer coding violations (e.g. using “unassigned” codes from the 4B/5B encoding for frame delimiters) p.191 (T. 4ed) p. 220 (T. 5ed)

Frame begins with a count of the number of bytes in it –Simple, but difficult to resynchronize after an error Framing – Byte count 19 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall, 2011 pp (T. 4ed) pp (T. 5ed)

Special flag bytes delimit frames; occurrences of flags in the data must be stuffed (escaped) – Longer, but easy to resynchronize after error Framing – Byte stuffing 20 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall, 2011 pp (T. 4ed) pp (T. 5ed)

Special flag bytes delimit frames; occurrences of flags in the data must be stuffed (escaped) – Longer, but easy to resynchronize after error Framing – Byte stuffing 21 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall, 2011 pp (T. 4ed) pp (T. 5ed)

Stuffing is done at the bit level: –Frame flag has six consecutive 1s (not shown) –On transmit, after five 1s in the data, a 0 is stuffed On receive, a 0 after five 1s is deleted Side effect (as in byte stuffing) is that the size of the frame depends on the data being sent! Framing – Bit stuffing 22 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall, 2011 pp (T. 4ed) pp (T. 5ed) Transmitted bits with stuffing Data bits

Standards: A case study “The nice thing about standards is that you have so many to choose from. Furthermore, if you do not like any of them, you can just wait for next year's model” Andrew S. Tanenbaum pp.235 (T. 4ed)

24 Case Study: HDLC High-Level Data Link Control –Precursor of the PPP - Point-to-Point Protocol –Originally an IBM protocol: SDLC (Synchronous Data Link Control) –Consider the frame overhead and the efficiency in the HDLC pp HDLC / pp PPP (T.4e) pp.219 HDLC / pp PPP (T.5e)

25 HDLC Frames Every frame is delimited at the start and end by the sequence 0x7E ( ), the “flag byte” (N.B. both sequences are part of the frame) Variable length 888… 16/32 8

26 The payload The “Data” field is the “payload” –i.e. the information we intend to communicate to the other end of the point-to-point link All other information is discarded at the receiver Variable length 888… 16/32 8

27 Talking point What if the flag byte occurs within the payload? pp.190 (T. 4ed) pp.219 (T. 5ed)

28 (Bit stuffing!) If the flag byte occurs within the payload: –When there are 5 consecutive “1” bits in the data, a “0” is stuffed automatically –When the receiver sees 5 consecutive incoming “1” bits : If followed by “0”, this is removed (it was data) If followed by “1”, this must be a flag byte! pp.190 (T. 4ed) pp.219 (T. 5ed)

29 Talking point: What size for N? Let's calculate the efficiency of the transmission in the following cases: –Sending one character per frame (N=8bits) –Sending a KB per frame (N=1024bytes) Variable length (N) 888… 16 8

30 Checking Learning Outcomes At the end of this lecture (and related activities), students should be able to : –… apply and compare several data encoding techniques –… consider design issues to ensure reliable delivery over an unreliable link –… reason why the data link layer adds control information as an overhead in the transmission