Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.

Slides:



Advertisements
Similar presentations
Chapter 3 The Data Link Layer.
Advertisements

The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
The Data Link Layer Chapter 3.
Chapter 3 The Data Link Layer.
CIS 725 Data Link Layer. Physical Layer Figure 3-1 B. Forouzan, TCP/IP Protocol Suite.
Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
C) All rights reserved by Professor Wen-Tsuen Chen1 Chapter 3 The Data link Layer ä For reliable, efficient communication between two adjacent machines.
Chapter 3: The Datalink Layer CS 455/555. Topics to be covered Design Issues Error detection and correction Elementary datalink protocols Sliding window.
The Data Link Layer Chapter 3.
The Data Link Layer 2 Chapter 3 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Data Link Layer Design Issues Error.
The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link.
I N THE N AME OF G OD C OMPUTER N ETWORKS C HAPTER 3: T HE D ATA L INK L AYER ( PART 3) Dr. Shahriar Bijani Shahed University March 2014.
Error-Detecting Codes Calculation of the polynomial code checksum.
Piggybacking A method to combine a data frame with ACK. Station A and B both have data to send. Instead of sending separately, station A sends a data frame.
Chapter 3 The Data Link Layer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 13 Introduction to Computer Networks.
The Data Link Layer Chapter 3. Position of the data-link layer.
The OSI Reference Model
Chapter 9: Data Link Control Business Data Communications, 4e.
Circuit Switching (a) Circuit switching. (b) Packet switching.
The Data Link Layer. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
CMPE 150 – Winter 2009 Lecture 6 January 22, 2009 P.E. Mantey.
CSC 450/550 Part 2: The Data Link Layer. CSC 450/550 Summary Part A Functions (1)Functions of the data link layer (2)Framing (3)Error control (3.1) Error.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
20101 The Data Link Layer Chapter Design Issues Controls communication between 2 machines directly connected by “wire”-like link Services Provided.
Adapted from Tanenbaum's Slides for Computer Networking, 4e The Data Link Layer Chapter 3.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
1 The Data Link Layer Chapter 3. 2 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent.
The Data Link Layer Chapter 3. Data Link Layer Design Issues a) Services Provided to the Network Layer b) Framing c) Error Control d) Flow Control.
TOBB ETÜ ELE46/ELE563 Communications Networks Lecture 01 May 6, 2014 Fall 2011 Tuesday 10:30 – 12:20 (310) Thursday 15:30 – 17:20 (372) İsrafil Bahçeci.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
Chapter 3 THE DATA LINK LAYER
CEN 4500 Data Communications Instructor: S. Masoud Sadjadi sadjadi At cs Dot fiu Dot edu Chapter 3: The Data Link.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
Data Link Layer : Services, Framing, Error Detection and Correction2.
The data link layer. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
The Data Link Layer. Functions of the Data Link Layer Provide service interface to the network layer Dealing with transmission errors Error detection.
The Data Link Layer. Functions of the Data Link Layer Provide service interface to the network layer Frame delineation Dealing with transmission errors.
The Data Link Layer Chapter 3 10/28/2015www.noteshit.com1.
Data Link Layer Savera Tanwir. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Chapter 11 Data Link Control
The Data Link Layer Chapter 3 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Data Link Layer Design Issues Error.
The Data Link Layer Chapter 3 1/21/2016www.ishuchita.com1.
COMPUTER NETWORKS. Unit -2 Continue... Physical Layer Connection –Oriented Networks : X.25 Relay Frames Types of cables Co-axial Fiber optics Twisted.
The Data Link Layer Chapter 3 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Data Link Layer Design Issues Error.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
Chapter 3 The Data Link Layer Computer Networks. The Data Link Layer Chapter 3 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D.
Distributed Systems 4. Data Link Layer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2015/2016.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 9: Data Link Control Business Data Communications, 4e.
Chapter 3 The Data Link Layer. Data Link Layer Describes how a shared communication channel can be accessed, and how a data frame can be reliably transmitted.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
The Data Link Layer RIS 251 Dr. ir. S.S. Msanjila.
Data Link LAYER Chapter 3. Services provided to network layer Unacknowledged connectionless service: Ethernet Acknowledged connectionless service: WiFi.
24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.
Chapter 3 The Data Link Layer.
The Data Link Layer Chapter
Chapter 3 Review on Data Link Layer
Chapter 3 – Part 1 The Data Link Layer.
ECE453 – Introduction to Computer Networks
Chapter 3 – Part 2 The Data Link Layer.
Overview Jaringan Komputer (2)
Chapter 3 The Data Link Layer.
The Data Link Layer Chapter
Presentation transcript:

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Data Link Layer Design Issues Network layer services Framing Error control Flow control

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packets and Frames Relationship between packets and frames.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Layer Services (a) Virtual communication. (b) Actual communication.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Possible Services Offered 1.Unacknowledged connectionless service. 2.Acknowledged connectionless service. 3.Acknowledged connection-oriented service.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Framing Methods 1.Byte count. 2.Flag bytes with byte stuffing. 3.Flag bits with bit stuffing. 4.Physical layer coding violations.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Framing (1) A byte stream. (a) Without errors. (b) With one error.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Framing (2) a)A frame delimited by flag bytes. b)Four examples of byte sequences before and after byte stuffing.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Framing (3) Bit stuffing. (a) The original data. (b) The data as they appear on the line. (c) The data as they are stored in the receiver’s memory after destuffing.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Error Detection Codes (1) 1.Hamming codes. 2.Binary convolutional codes. 3.Reed-Solomon codes. 4.Low-Density Parity Check codes.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Error Detection Codes (2) Example of an (11, 7) Hamming code correcting a single-bit error.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Error Detection Codes (3) The NASA binary convolutional code used in

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Error-Detecting Codes (1) Linear, systematic block codes 1.Parity. 2.Checksums. 3.Cyclic Redundancy Checks (CRCs).

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Error-Detecting Codes (2) Interleaving of parity bits to detect a burst error.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Error-Detecting Codes (3) Example calculation of the CRC

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Elementary Data Link Protocols (1) Utopian Simplex Protocol Simplex Stop-and-Wait Protocol Error-Free Channel Simplex Stop-and-Wait Protocol Noisy Channel

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Elementary Data Link Protocols (2) Implementation of the physical, data link, and network layers.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Elementary Data Link Protocols (3) Some definitions needed in the protocols to follow. These definitions are located in the file protocol.h....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Elementary Data Link Protocols (4) Some definitions needed in the protocols to follow. These definitions are located in the file protocol.h....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Elementary Data Link Protocols (5) Some definitions needed in the protocols to follow. These definitions are located in the file protocol.h.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Utopian Simplex Protocol (1) A utopian simplex protocol....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Utopian Simplex Protocol (2) A utopian simplex protocol.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Simplex Stop-and-Wait Protocol for a Noisy Channel (1) A simplex stop-and-wait protocol....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Simplex Stop-and-Wait Protocol for a Noisy Channel (2) A simplex stop-and-wait protocol.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Sliding Window Protocols (1) A positive acknowledgement with retransmission protocol....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Sliding Window Protocols (2) A positive acknowledgement with retransmission protocol....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Sliding Window Protocols (3) A positive acknowledgement with retransmission protocol.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Sliding Window Protocols (4) A sliding window of size 1, with a 3-bit sequence number. (a) Initially. (b) After the first frame has been sent.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Sliding Window Protocols (5) A sliding window of size 1, with a 3-bit sequence number (c) After the first frame has been received. (d) After the first acknowledgement has been received.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 One-Bit Sliding Window Protocol (1) A 1-bit sliding window protocol....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 One-Bit Sliding Window Protocol (2) A 1-bit sliding window protocol....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 One-Bit Sliding Window Protocol (3) A 1-bit sliding window protocol.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 One-Bit Sliding Window Protocol (4) Two scenarios for protocol 4. (a) Normal case. (b) Abnormal case. The notation is (seq, ack, packet number). An asterisk indicates where a network layer accepts a packet

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (1) Pipelining and error recovery. Effect of an error when (a) receiver’s window size is 1

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (2) Pipelining and error recovery. Effect of an error when (b) receiver’s window size is large.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (3) A sliding window protocol using go-back-n....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (4) A sliding window protocol using go-back-n....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (5) A sliding window protocol using go-back-n....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (6) A sliding window protocol using go-back-n....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (7) A sliding window protocol using go-back-n....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (8) A sliding window protocol using go-back-n....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (9) A sliding window protocol using go-back-n.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Go-Back-N (10) Simulation of multiple timers in software. (a) The queued timeouts (b) The situation after the first timeout has expired.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (1) A sliding window protocol using selective repeat....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (2) A sliding window protocol using selective repeat....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (3) A sliding window protocol using selective repeat....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (4) A sliding window protocol using selective repeat....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (5) A sliding window protocol using selective repeat....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (6) A sliding window protocol using selective repeat....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (7) A sliding window protocol using selective repeat....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (8) A sliding window protocol using selective repeat....

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (9) A sliding window protocol using selective repeat.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol Using Selective Repeat (10) a)Initial situation with a window of size7 b)After 7 frames sent and received but not acknowledged. c)Initial situation with a window size of 4. d)After 4 frames sent and received but not acknowledged.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Example Data Link Protocols HDLC – High-Level Data Link Control The Data Link Layer in the Internet

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 High-Level Data Link Control Frame format for bit-oriented protocols.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 High-Level Data Link Control (2) Control field of (a) An information frame. (b) A supervisory frame. (c) An unnumbered frame.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Supervisory Frames Receive Not Ready10 Receive Ready00 Reject01 Selective Reject11

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Unnumbered Frames DISC SNRM SABM FRMR SABME and SNRME UA and UI

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Example Data Link Protocols 1.Packet over SONET 2.ADSL (Asymmetric Digital Subscriber Loop)

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet over SONET (1) Packet over SONET. (a) A protocol stack. (b) Frame relationships

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet over SONET (2) PPP Features 1.Separate packets, error detection 2.Link Control Protocol 3.Network Control Protocol

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet over SONET (3) The PPP full frame format for unnumbered mode operation

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet over SONET (4) State diagram for bringing a PPP link up and down

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 ADSL (Asymmetric Digital Subscriber Loop) (1) ADSL protocol stacks.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 ADSL (Asymmetric Digital Subscriber Loop) (1) AAL5 frame carrying PPP data

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 End Chapter 3