McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 5 Data Link Layer.

Slides:



Advertisements
Similar presentations
William Stallings Data and Computer Communications 7th Edition
Advertisements

Chapter 11 Data Link Control
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Topic 5: Data Link Layer - Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 7 – Data Link Control Protocols
PART III DATA LINK LAYER. Position of the Data-Link Layer.
1 Data Link Layer Lesson 6 NETS2150/ Position of the data-link layer McGraw-Hill © The McGraw-Hill Companies, Inc., 2004.
The Data Link Layer Chapter 3. Position of the data-link layer.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 6 Errors, Error Detection, and Error Control
Chapter 10 Error Detection and Correction
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 5 Data Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
Chapter 5 Data Link Layer.
Data Link Control Protocols
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 11: Flow Control – can occur at layer 2 (data link) and at layer 4 (transport)  You saw the need in the most recent assignment.  Data packets.
1 Kyung Hee University Data Link Layer PART III. 2 Kyung Hee University Position of the data-link layer.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Control and Protocols.
Chapter 3 THE DATA LINK LAYER
McGraw-Hill©The McGraw-Hill Companies, Inc. Chapter 9 Local Area Networks Part I: Basic Concepts and Wired Ethernet LANs.
Unit 5 Lecture 2 Error Control Error Detection & Error Correction.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Chapter 6: Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Third Edition.
Chapter 11 Data Link Control
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Eighth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange.
Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.
CHAPTER 3: DATA LINK CONTROL Flow control, Error detection – two dimensional parity checks, Internet checksum, CRC, Error control, Transmission efficiency.
Error Detection.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Error Detection & Correction  Data can be corrupted during transmission.  For reliable transmission, errors must be detected and corrected.  Error detection.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Telecommunications & Networking Lesson 3. ISO Open System Interconnect (OSI) Application Presentation Session Transport Network Data Link Physical Application.
McGraw-Hill©2003 The McGraw-Hill Companies, Inc. Chapter 3 Transport Layer.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
Chapter 9: Data Link Control Business Data Communications, 4e.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS ( NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS (PRACTICAL PART) Tutorial 4 : Chapter 7 Data & computer.
Data Link Layer.
Data Link Control. The two main functions of the data link layer are data link control and media access control. The first, data link control, deals with.
Computer Communication & Networks
Chapter 9: Data Link Control
Part III Datalink Layer 10.
ERROR DETECTION AND CORRECTION
Data Link Layer.
Part III. Data Link Layer
CIS 321 Data Communications & Networking
Chap. 4 Data link layer 2.
Chapter 10 Data Link Control
Chapter 7 Error Detection and Correction
Lecture 5- Data Link Layer
Error Detection and Correction
Chapter 9: Data Link Control
Data Link Layer. Position of the data-link layer.
Presentation transcript:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 5 Data Link Layer

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Understand the functions of the data link layer. Understand the concept of the hop-to-hop delivery compared to host-to-host delivery and application-to-application delivery. Understand the concept of access method and define different access methods used in LANs and WANs. After reading this chapter, the reader should be able to: O BJECTIVES Understand the addressing mechanism used in the data link layer and how network layer addresses are mapped to data layer addresses. Understand how error control is handled at the data link layer.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 DUTIES OF THE DATA LINK LAYER DUTIES OF THE DATA LINK LAYER 5.1

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-1 Data link layer in the Internet model

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-2 Data-link layer duties

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 HOP-TO-HOPDELIVERYHOP-TO-HOPDELIVERY 5.2

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-3 Hop-to-hop delivery

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PACKETIZINGPACKETIZING 5.3

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 ADDRESSINGADDRESSING 5.4

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Technical Focus: Addresses in Local Area Networks The physical address for most computers on local area networks is imprinted on the network card that is installed in the computer. If the user or network manager changes the network card (because of a failure, for example), the physical address of the computer is changed. In most cases, changing the network card requires reconfiguration of the computer.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-4 ARP operation

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 ERROR CONTROL 5.5

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Data can be corrupted during transmission. For reliable communication, errors must be prevented, or detected and corrected. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 In a single-bit error, only 1 bit in the data unit has changed. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-5 Single-bit error

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A burst error means that two or more bits in the data unit have changed. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-6 Burst error of length five

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-7 Redundancy

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-8 Detection methods

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 In vertical redundancy check (VRC), a parity bit is added to every data unit so that the total number of 1s becomes even. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-9 Even parity VRC concept

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-10 LRC

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 In longitudinal redundancy check (LRC), a block of bits is divided into rows and a redundant row of bits is added to the whole block. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-11 CRC

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-12 Stop and wait ARQ

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Technical Focus: Procedure for Stop-And-Wait ARQ The sending device keeps a copy of the last frame transmitted until it receives an acknowledgment for that frame Both data frames and ACK frames are numbered 0 and 1 alternately. A data 0 frame is acknowledged by an ACK 1 frame. If an error is discovered in a data frame, a negative acknowledgment (NAK) frame is returned. If an expected acknowledgment is not received within an allotted time period, the sender assumes that the last data frame was lost in transit and sends it again.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-13 Sliding-window ARQ

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Technical Focus: Procedure for Sliding-Window ARQ The sending device keeps copies of all transmitted frames until they have been acknowledged. In addition to ACK frames, a receiver can return a NAK frame if the data have been received damaged. The NAK frame tells the sender to retransmit a damaged frame. Like stop-and-wait ARQ, the sending device in sliding-window ARQ is equipped with a timer to enable it to handle lost acknowledgments.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 FLOW CONTROL 5.6

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Flow control refers to a set of procedures used to restrict the amount of data the sender can send before waiting for acknowledgment. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 MEDIUM ACCESS CONTROL CONTROL 5.1

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-14 Medium access methods

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-15 Select

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-16 Poll

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 The poll/select method is mostly used in time-sharing systems when a central computer is used to control other computers. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 5-17 Token passing network

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Token passing is used mostly by local area networks (LANs). We discuss LANs in Chapter 9. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CSMA/CD is used in the Ethernet LAN discussed in Chapter 9. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CSMA/CA is used in the wireless LANs discussed in Chapter 10. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 DATA LINK PROTOCOLS PROTOCOLS 5.8

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A data link protocol is a set of specifications used to implement the data link layer. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 In a character-oriented protocol, the frame is interpreted as a series of characters. In a bit- oriented protocol, the frame or packet is interpreted as a series of bits. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 All bit-oriented protocols are related to high-level data link control (HDLC), a bit-oriented protocol. Note: