T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 6: Datalink layer problems Slides used.

Slides:



Advertisements
Similar presentations
CSCI-1680 Physical Layer Link Layer I Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Advertisements

Lecture 3, 1Spring 2003, COM1337/3501CCN: Direct Link Networks Direct Link Networks Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie,
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
CS 4700 / CS 5700 Network Fundamentals Lecture 5: Physical Layer (The layer for EE majors…) Revised 1/14/13.
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
Spring 2002CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
Fundamentals of Computer Networks ECE 478/578 Lecture #3: Encoding and Framing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Physical Layer: Data Encoding & Transmission. 2 Network Interface Card (NIC) LL in part, PL in total are implemented in NIC –Ethernet card, card,
1 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
The OSI Reference Model
Bit and Byte Stuffing1. 2 Synchronous versus Asynchronous Transmissions There exists a hierarchy of synchronization tasks: –Bit level : recognizing the.
1 Hardware Building Blocks Five Issues –Encoding –Framing –Error Detection –Reliable delivery –Access Mediation Direct Link Networks.
Spring 2004 EE4272 Direct Link Networks (I) Hardware Building Blocks (nodes & links) 5 Issues before Exchanging Packets  Encoding  Framing  Error Detection.
Spring 2003CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
CS 164: Slide Set 3: Chapter 2 Direct Link Networks.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
Networks: Bit and Byte Stuffing
Framing and Encoding EECS 122: Lecture 26 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Katz, Stoica F04 EE122: Encoding & Framing November 17, 2003.
Computer Networks: Bit and Byte Stuffing 1 Bit and Byte Stuffing.
NETWORKING CONCEPTS. DATA LINK LAYER Data Link Control main functions of the data link layer are Data link control media access control. Data link control.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
EE 122: Encoding And Framing Ion Stoica September 9, 2002.
ECE 4450:427/527 - Computer Networks Spring 2015
CSCI-1680 Physical Layer Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
CSE331: Introduction to Networks and Security Lecture 3 Fall 2002.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 4: Fundamental network design issues Slides.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
Lecture 6: Framing and Error Detection-Data Link Layer Functions
27-Oct-15Computer Networks1 Outline Chapter 2: Direct Link Networks Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
Review:. Chapter 3: The Data Link Layer –achieve reliable, efficient communication between two physically connected machines. –Example problems to be.
CSE 461: Bits and Bandwidth Next Topic  Focus: How do we send a message across a wire?  The physical / link layers: 1. Different kinds of media 2.
Data Link Layer : Services, Framing, Error Detection and Correction2.
Fall 2000Datacom 11 Outline Hardware Building Blocks Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
CS 4700 / CS 5700 Network Fundamentals
1 CHAPTER 2 HARDWARE BUILDING BLOCK ENCODING FRAMING ERROR DETECTION.
Link Layer Dr. Mozafar Bag-Mohammadi Ilam University.
CSCI-1680 Physical Layer Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
9-Jan-164/598N: Computer Networks Overview Performance metrics - Section 1.5 Direct link networks –Hardware building blocks - Section 2.1 –Encoding - Section.
Physical Layer Issues and Methods Outline Physical Layer Overview Non-Return to Zero Manchester 4B/5B.
Wireless and Mobile Networks (ELEC6219) Session 3: Theories of Data Communications. Data Link Layer. Adriana Wilde and Jeff Reeve 22 January 2015.
Point-to-Point Links: Framing
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
Physical Layer Issues and Methods Outline Physical Layer Ethernet Technology Physical Layer Encoding Final Exam Review - ??
1 Chapter 2: Direct Link Networks (Part One) Dr. Rocky K. C. Chang 30 January 2004.
Univ. of TehranIntroduction to Computer Network1 An Introduction to Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1 Hardware Building Blocks Five Issues –Encoding –Framing –Error Detection –Reliable delivery –Access Media Direct Link Networks.
1 Point-to-Point Links: Encoding Encoding: Section 2.2 (Section 2.1 read on your own)
Lect-10-2: Physical Layer Computer Networks : An Introduction to Computer Networks Handout #12: Physical Layer Signaling, Coding and Clocking.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Getting Connected (Chapter 2 Part 1)
The University of Adelaide, School of Computer Science
CS 3700 Networks and Distributed Systems
CSCI-1680 Physical Layer Link Layer I
Lecture 1 Line Encoding 2nd semester
CS 3700 Networks and Distributed Systems
CS412 Introduction to Computer Networking & Telecommunication
Point-to-Point Links Outline Encoding Framing Error Detection
NET301 Lecture 5 10/18/2015 Lect5 NET301.
NET301 Lecture 5 10/18/2015 Lect5 NET301.
Ion Stoica September 6, 2001 EE 122: Lecture 4 Ion Stoica September 6, 2001.
CS 4700 / CS 5700 Network Fundamentals
Fundamentals of Computer Networks
Data Transmission And Digital Communication
Hardware Building Blocks
Home work project #1 Develop and fully debug your program on the Cushing 208 lab. Machines - planet lab machines may not have good development environment.
Networks: Bit and Byte Stuffing
EECS 122: EE122: Error Detection and Reliable Transmission
Presentation transcript:

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 6: Datalink layer problems Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University2 Bit Stream Encoding Specify how bits are represented in the analog signal –This service is provided by the physical layer Challenges: –Efficiency: ideally, bit rate is maximized –Robust: avoid de-synchronization between sender and receiver when there is a large sequence of 1’s or 0’s

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University3 Assumptions We use two discrete signals, high and low, to encode 1 and 0 The transmission is synchronous, i.e., there is a clock used to sample the signal If the amplitude and duration of the signals is large enough, the receiver can do a reasonable job of looking at the distorted signal and estimating what was sent.

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University4 Non-Return to Zero (NRZ) 1  high signal; 0  low signal NRZ (non-return to zero) Clock Disadvantages: when there is a long sequence of 1’s or 0’s –Sensitive to clock skew, i.e., difficult to do clock recovery

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University5 Non-Return to Zero Inverted (NRZI) 1  make transition; 0  stay at the same level Solve previous problems for long sequences of 1’s, but not for 0’s Clock NRZI (non-return to zero inverted)

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University6 Manchester 1  high-to-low transition; 0  low-to-high transition Addresses clock recovery problems Disadvantage: signal transition rate doubled –I.e. useful data rate on same physical medium halved –Efficiency of 50% Clock Manchester

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University7 4-bit/5-bit (100Mb/s Ethernet) Goal: address inefficiency of Manchester encoding, while avoiding long periods of low signals Solution: –Use 5 bits to encode every sequence of four bits such that no 5 bit code has more than one leading 0 and two trailing 0’s –Use NRZI to encode the 5 bit codes –Efficiency is 80% bit 5-bit

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University8 Framing Specify how blocks of data are transmitted between two nodes connected on the same physical media –This service is provided by the data link layer Challenges –Decide when a frame starts/ends –If use special delimiters, differentiate between the true frame delimiters and delimiters appearing in the payload data

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University9 Byte-Oriented Protocols: Sentinel Approach STX – start of text ETX – end of text Problem: what if ETX appears in the data portion of the frame? Solution –If ETX appears in the data, introduce a special character DLE (Data Link Escape) before it –If DLE appears in the text, introduce another DLE character before it –Like in C programming, “Say \”Hello\””, (\ is the escape character) Text (Data)STXETX 8 8

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University10 Byte-Oriented Protocols: Byte Counting Approach Sender: insert the length of the data (in bytes) at the beginning of the frame, i.e., in the frame header Receiver: extract this length and decrement it every time a byte is read. When this counter becomes zero, we are done

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University11 Bit-Oriented Protocols Both start and end sequence can be the same –E.g., in HDLC (High-level Data Link Protocol) Sender: in data portion inserts a 0 after five consecutive 1s –“Bit stuffing” Receiver: when it sees five 1s makes decision on the next two bits –If next bit 0 (this is a stuffed bit), remove it –If next bit 1, look at the next bit If 0 this is end-of-frame (receiver has seen ) If 1 this is an error, discard the frame (receiver has seen ) Text (Data) Start sequence 8 8 End sequence

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University12 Clock-Based Framing (SONET) SONET (Synchronous Optical NETwork) Developed to transmit data over optical links –Example: SONET STS-1: Mbps SONET maintains clock synchronization across several adjacent links to form a path

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University13 STS-1 Frame First two bytes of each frame contain a special bit pattern that allows to determine where the frame starts No bit-stuffing is used, frame is fixed size Receiver looks for the special bit pattern every 810 bytes –Size of frame = 9x90 = 810 bytes 90 columns 9 rows Data (payload) overhead SONET STS-1 Frame

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University14 Clock-Based Framing (SONET) Details: –Bits are encoded using NRZ –To avoid long sequences of 0’s or 1’s the payload is XOR- ed with a special 127-bit pattern with many transitions from 1 to 0