Sliding window protocols:  Window: subset of consecutive frames  only frames in window can be sent.

Slides:



Advertisements
Similar presentations
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 14 Introduction to Computer Networks.
Advertisements

Data Link Layer (cont’d)
William Stallings Data and Computer Communications 7th Edition
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
11-1 FRAMING The data link layer needs to pack bits into frames, so that each frame is distinguishable from another. Our postal system practices a type.
Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames (denoted as f0, f1, f2, f3, f4). Show the flow of.
Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
HIGH-LEVEL DATA LINK CONTROL (HDLC) HDLC was defined by ISO for use on both point-to-point and multipoint data links. It supports full-duplex communication.
William Stallings Data and Computer Communications 7th Edition
Data Link Control We want to minimize the amount of error correcting and detecting we need to do.
Chapter 11 Data Link Control
Data and Computer Communications Updated: 2/9/2009.
Data link control. Data Link Control –Flow Control how much data may sent –Error Control How can error be detected and corrected.
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
11-5 NOISY CHANNELS Although the Stop-and-Wait Protocol gives us an idea of how to add flow control to its predecessor, noiseless channels are nonexistent.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Gursharan Singh Tatla DATA LINK PROTOCOLS 24-Mar
Data and Computer Communications Eighth & Ninth Edition by William Stallings Chapter 7 – Data Link Control Protocols.
Data Link Control Protocols
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 11: Flow Control – can occur at layer 2 (data link) and at layer 4 (transport)  You saw the need in the most recent assignment.  Data packets.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Control and Protocols.
CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
Chapter 11 Data Link Control
Eighth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CIS : Data Link Control. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow Transmission.
Data Link Layer Flow and Error Control. Flow Control Flow Control Flow Control Specifies the amount of data can be transmitted by sender before receiving.
1 Flow&Error Control R. Supakorn. 2 Flow Control Flow control refers to a set of procedure used to restrict the amount of data that the sender can send.
Telecommunications & Networking Lesson 3. ISO Open System Interconnect (OSI) Application Presentation Session Transport Network Data Link Physical Application.
Part III. Data Link Layer Chapter 11. Data Link Control COMP 3270 Computer Networks Computing Science Thompson Rivers University.
Chapter 11 Data Link Control and Protocols Flow and Error Control Flow Control Error Control.
Data and Computer Communications Data Link Control Protocols.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS ( NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS (PRACTICAL PART) Tutorial 4 : Chapter 7 Data & computer.
Data Link Layer.
Chapter 3: The Data Link Layer –to achieve reliable, efficient communication between two physically connected machines. –Design issues: services interface.
Data Link Control Protocols  need layer of logic above Physical  to manage exchange of data over a link frame synchronization frame synchronization flow.
2.10 Flow and Error Control Before that ...
HDLC and PPP.
Data Link Layer Flow Control.
Data Link Layer - 3 Dr. Sanjay P. Ahuja, Ph.D.
March 21, 2001 Recall we have talked about the Sliding Window Protocol for Flow Control Review this protocol A window of size I can contain at most I.
Part III Datalink Layer 10.
UNIT 4 Data Link Control Line Discipline Flow Control Error Control
Instructor Mazhar Hussain
3.2 Data Link Layer : Error & Flow Control
Data Link Layer What does it do?
CIS 321 Data Communications & Networking
Flow Control.
Flow and Error Control.
Overview Jaringan Komputer (2)
Chapter 11 Data Link Control and Protocols.
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Error control.
Chapter 11 Data Link Control
Protocols and the TCP/IP Suite ECE405- Computer Networks
Presentation transcript:

Sliding window protocols:  Window: subset of consecutive frames  only frames in window can be sent

 Typical frame format:  If seq field is m bits then seq nos are between 0 and 2 m -1  Ack is the frame # being ack’d. this is a piggyback acknowledgment, providing an acknowledgment in a data frame.  Useful for full duplex communication  Type can be data/nak/ack

Go-Back-n sliding window protocol  Receiver expects frames to arrive in order. Out-of-order or damaged frames discarded and a nak may be sent  Does not ack each frame explicitly. Uses piggyback (frame.ack field in a frame) or maybe a special ack timer to send separate ack.  Ack number means all frames up to that number are received OK.  Sender buffers frames in window

 Frame timer (1 for each frame) no ack arrives in a specified time resend all frames in window Rationale: 1 st frame not ack’d  receiver probably ignored all others.

 Window size: m-bit sequence field  size  2 m (to avoid duplicate nos).

 Possible failure if size = 2 m Sender sends 0-7 receiver gets 0-7 and acks 7 ack gets lost sender resends 0-7 Since receiver is expecting 0 resent frames accepted as new.

 If size = 2 m -1 Sender sends 0-6 receiver gets 0-6 and acks 6 ack gets lost sender resends 0-6 Since receiver is expecting 7 resent frames are rejected.

11.8 In Go-Back-N ARQ, the size of the send window must be less than 2 m ; the size of the receiver window is always 1. Note

11.9 Figure Window size for Go-Back-N ARQ

11.10 Algorithm 11.8 Go-Back-N receiver algorithm  If corrupted, could also send a NAK so sender does not have to wait for a timer to expire

11.11 Algorithm 11.7 Go-Back-N sender algorithm (continued)

11.12 Algorithm 11.7 Go-Back-N sender algorithm (continued)  If corrupted, could also resend all frames in the window

 Do some examples: Data frame lost or delayed Ack frame lost or delayed Data frame damaged. ALWAYS error check each frame and at least ignore bad frames.

11.14 Figure Flow diagram for Example 11.6

11.15 Figure Flow diagram for Example 11.7

Selective repeat:  Receiver will accept frames out of order and buffer them.

 Accept any frame in window and buffer. Deliver all received frames in consecutive slots starting with rw.  Receiver acknowledges the last frame delivered, not necessarily the last one received  Frame arrives out of order – if in window, buffer it but might send a nak for expected frame (attempt to speed things up), but not required.  Sender: frame timer expires, send only that frame

Window size with m-bit sequence field (assume m=3).  Sender window=4 and receiver window=5 Sender sends 0-3 Receiver gets 0-3 and advances window to Receiver sends ack Ack is lost sender resends 0-3 Receiver accepts 0 as new.  Similar if sender window=5 and receiver window=4.

 Sender window=4 and receiver window=4 Sender sends 0-3 Receiver gets 0-3, delivers, and advances window to Receiver sends ack Ack is lost sender resends 0-3 New frames are rejected.

11.20 Figure Selective Repeat ARQ, window size

 Sender window size + receiver window size = 2 m.  Typically both can be 2 m-1.

11.22 Algorithm Receiver-site Selective Repeat algorithm

11.23 Algorithm Receiver-site Selective Repeat algorithm

11.24 Algorithm 11.9 Sender-site Selective Repeat algorithm (continued)

11.25 Algorithm 11.9 Sender-site Selective Repeat algorithm (continued)

11.26 Algorithm 11.9 Sender-site Selective Repeat algorithm (continued)

 Do some examples

HDLC (High-Level Data Link Protocol): ISO standard  IBM developed SDLC (Synchronous Data Link Control Protocol), submitted it to ISO who made changes and called it HDLC.  IBM also submitted to ANSI who made changes and called it ADCCP (Advanced Data Communication Control Protocol)

 CCITT (now ITU) adopted HDLC and modified it to become LAP (Link Access Protocol) for its X.25 networks.  IEEE created LLC (Logical Link Control-802.2) another variant on HDLC  [ trol_and_Derivatives] trol_and_Derivatives]  [  [

 Frame format

 Flag – bit pattern to mark beginning and end of frame. To prevent pattern from appearing in data, use bit stuffing. Insert a bogus “0” after five consecutive 1’s.

 N(S) – sequence number  P/F – (request if sent by a primary device, last frame indicator if sent by a secondary device)  N(R) – acknowledgment;  S – 2-bit value indicating receive ready (ready to receive frames), REJ (like nak for go-back-n), receive not ready (stop incoming frames), SREJ (like nak for selective repeat).  Can read book for more info.

 Will skip section 7 – Point-to-Point protocols