William Stallings Data and Computer Communications 7th Edition

Slides:



Advertisements
Similar presentations
William Stallings Data and Computer Communications 7th Edition
Advertisements

CH. 7 Data Link Control. Requirements & Objectives of Data Link Control Frame Synchronization Flow Control Error Control Addressing Control and Data on.
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Telecommunication Technologies
Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
HIGH-LEVEL DATA LINK CONTROL (HDLC) HDLC was defined by ISO for use on both point-to-point and multipoint data links. It supports full-duplex communication.
Chapter 14: Data Link Control
EIE325: Telecommunication TechnologiesMaciej J. Ogorza ł ek, PolyU, EIE Telecommunication Technologies Week 8 Flow Control Error Control.
William Stallings Data and Computer Communications 7th Edition
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 – Data Link Control Protocols.
Data and Computer Communications Updated: 2/9/2009.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Data Link Control Slide 1 Data Link Control Chapter 7.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 – Data Link Control Protocols.
Piggybacking A method to combine a data frame with ACK. Station A and B both have data to send. Instead of sending separately, station A sends a data frame.
Chapter 7 – Data Link Control Protocols
PART III DATA LINK LAYER. Position of the Data-Link Layer.
Data Link Control Protocols Data link control protocol Provides a layer of control between systems on a transmission medium referred to as data link. DLC.
1 Data Link Layer Lesson 6 NETS2150/ Position of the data-link layer McGraw-Hill © The McGraw-Hill Companies, Inc., 2004.
The Data Link Layer Chapter 3. Position of the data-link layer.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Chapter 9: Data Link Control Business Data Communications, 4e.
Semester EEE449 Computer Networks The Data Link Layer En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK) Room.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
Chapter 6 Errors, Error Detection, and Error Control
Semester Copyright USM EEE442 Computer Networks The Data Link / Network Layer Functions: Flow Control and Error Control En. Mohd Nazri Mahmud.
Data Communications Data Link Control. What Is Data Link Control? The Data Link layer of a model typically has the following responsibilities: 1. Creates.
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
Network Technology CSE Network Technology CSE3020 Week 6.
Data and Computer Communications Eighth & Ninth Edition by William Stallings Chapter 7 – Data Link Control Protocols.
Data Link Control Protocols
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
Data and Computer Communications Ninth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data and Computer Communications, Ninth Edition.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Chapter 3 THE DATA LINK LAYER
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Eighth Edition by William Stallings Chapter 7 – Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange.
CIS : Data Link Control. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow Transmission.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
FIT – Monash University High-Level Data Link Control
Data and Computer Communications Data Link Control Protocols.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
Chapter 9: Data Link Control Business Data Communications, 4e.
Data and Computer Communications Data Link Control Protocols.
William Stallings Data and Computer Communications Chapter 7 Data Link Control.
Data Link Control Protocols  need layer of logic above Physical  to manage exchange of data over a link frame synchronization frame synchronization flow.
High level Data Link Layer Protocol - HDLC
Chapter 9: Data Link Control
William Stallings Data and Computer Communications 7th Edition
The Data Link Layer Supplementery Slides
Chap. 4 Data link layer 2.
CIS 321 Data Communications & Networking
Chapter 14: Data Link Control
Digital Data Communications Techniques
Chapter 14: Data Link Control
Chapter 14: Data Link Control
Chapter 14: Data Link Control
William Stallings Data and Computer Communications
Chapter 9: Data Link Control
Protocols and the TCP/IP Suite ECE405- Computer Networks
Presentation transcript:

William Stallings Data and Computer Communications 7th Edition Chapter 7 Data Link Control Protocols

Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time Time taken to emit all bits into medium Propagation time Time for a bit to traverse the link

Model of Frame Transmission

Stop and Wait Source transmits frame Destination receives frame and replies with acknowledgement Source waits for ACK before sending next frame Destination can stop flow by not sending ACK Works well for a few large frames Figure 7.2 utilization vs. throughput 1250B frame 100Mbps, coaxial cable, tx time: 0.1ms 1km: 0.5*10-5 s, 20km: 0.1ms

Fragmentation Large block of data may be split into small frames Limited buffer size Errors detected sooner (when whole frame received) On error, retransmission of smaller frames is needed Prevents one station occupying medium for long periods Stop and wait becomes inadequate

Stop and Wait Link Utilization

Sliding Windows Flow Control Allow multiple frames to be in transit Receiver has buffer W long Transmitter can send up to W frames without ACK Each frame is numbered ACK includes number of next frame expected Sequence number bounded by size of field (k) Frames are numbered modulo 2k

Sliding Window Diagram Why window 7?

Example Sliding Window

Sliding Window Enhancements Receiver can acknowledge frames without permitting further transmission (Receive Not Ready) Must send a normal acknowledge to resume If duplex, use piggybacking If no data to send, use acknowledgement frame If data but no acknowledgement to send, send last acknowledgement number again, or have ACK valid flag (TCP)

Error Detection Additional bits added by transmitter for error detection code Parity Value of parity bit is such that character has even (even parity) or odd (odd parity) number of ones Even number of bit errors goes undetected

Cyclic Redundancy Check For a block of k bits transmitter generates n bit sequence Transmit k+n bits which is exactly divisible by some number Receive divides frame by that number If no remainder, assume no error For math, see Stallings chapter 6

Error Control Detection and correction of errors Lost frames Damaged frames Automatic repeat request Error detection Positive acknowledgment Retransmission after timeout Negative acknowledgement and retransmission

Types of Errors Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. There are two types of errors: Single-Bit Error Burst Error

Single-bit Error In a single-bit error, only one bit in the data unit has changed.

Burst Error of length 5 A burst error means that 2 or more bits in the data unit have changed.

Error Detection Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Detection Methods Parity Check Cyclic Redundancy Check (CRC) Checksum (All have redundancy in data)

Parity Checking In even parity checking, a parity bit is added to every data unit so that the total number of 1’s is even. In odd parity checking, a parity bit is added to every data unit so that the total number of 1’s is odd. Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd.

Even Parity Concept

Even Parity Example Suppose the sender wants to send the word world. In ASCII the five characters are coded as 1110111 1101111 1110010 1101100 1100100 The following shows the actual bits sent: 11101110 11011110 11100100 11011000 11001001

Even Parity Example Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission. 11101110 11011110 11100100 11011000 11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.

Even Parity Error Example Now suppose the word world in Example 1 is corrupted during transmission. 11111110 11011110 11101100 11011000 11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted (the odd counts), discards them, and asks for retransmission.

Two-dimensional Parity In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block.

Two-dimensional parity

Two-dimensional parity Suppose the following block is sent: 10101001 00111001 11011101 11100111 10101010 However, it is hit by a burst noise of length 8, and some bits are corrupted. 10100011 10001001 11011101 11100111 10101010 When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded.

Cyclic Redundancy Checksum The CRC error detection method treats the packet of data to be transmitted as a large polynomial. The transmitter takes the message polynomial and using polynomial arithmetic, divides it by a given generating polynomial. The quotient is discarded but the remainder is “attached” to the end of the message. TDC 361

CRC generator and checker

Cyclic Redundancy Checksum The message (with the remainder) is transmitted to the receiver. The receiver divides the message and remainder by the same generating polynomial. If a remainder not equal to zero results, there was an error during transmission. If a remainder of zero results, there was no error during transmission. TDC 361

Cyclic Redundancy Checksum M(x) = Original data message P(x) = Generator polynomial n = Number of bits in P(x) - 1 CRC = remainder [ M(x) * 2n ] / P(x)

Cyclic Redundancy Checksum M(x) = Original data message 100100 P(x) = Generator polynomial 1101 n = Number of bits in P(x) – 1 3 CRC = remainder [ M(x) * 2n ] / P(x) [ 100100 * 23 ] / 1101 100100000 / 1101

Binary division in a CRC generator

Binary division in a CRC checker

A Polynomial

A Polynomial Representing a Divisor

Standard Polynomials Name Polynomial Application CRC-8 x8 + x2 + x + 1 ATM header CRC-10 x10 + x9 + x5 + x4 + x 2 + 1 ATM AAL ITU-16 x16 + x12 + x5 + 1 HDLC ITU-32 x32 + x26 + x23 + x22 + x16 + x12 + x11 + x10 + x8 + x7 + x5 + x4 + x2 + x + 1 LANs

Cyclic Redundancy Checksum Example 101011 1001 101110000 1001 101 000 1010 110 1100 011 Remainder = CRC

Cyclic Redundancy Checksum Example Transmit: M(x) * 2n xor CRC = 101110 * 23 xor 011 = 101110000 xor 011 = 101110011 Data CRC

Cyclic Redundancy Checksum Example Receive: 101110011 Divide by P(x) = Generator polynomial = 1001 If result = 0, transmission is error free. If result <> 0, an error occurred in transmission.

Cyclic Redundancy Checksum Example 101011 1001 101110011 1001 101 000 1010 110 1101 000 Remainder = 0 = Error Free

Cyclic Redundancy Checksum Example 101011 1001 101110001 1001 101 000 1010 110 1100 1011 10 Remainder = 10 = Error!!!

CRC Performance TDC 361

Automatic Repeat Request (ARQ) Stop and wait Go back N Selective reject (selective retransmission)

Stop and Wait Source transmits single frame Wait for ACK If received frame damaged, discard it Transmitter has timeout If no ACK within timeout, retransmit If ACK damaged,transmitter will not recognize it Transmitter will retransmit Receive gets two copies of frame Use ACK0 and ACK1 What if no sequence number?

Stop and Wait - Diagram

Stop and Wait - Pros and Cons Simple Inefficient

Go Back N (1) Based on sliding window If no error, ACK as usual with next frame expected Use window to control number of outstanding frames If error, reply with rejection Discard that frame and all future frames until error frame received correctly Transmitter must go back and retransmit that frame and all subsequent frames

Go Back N - Damaged Frame Receiver detects error in frame i Receiver sends rejection-i Transmitter gets rejection-i Transmitter retransmits frame i and all subsequent

Go Back N - Lost Frame (1) Frame i lost Transmitter sends i+1 Receiver gets frame i+1 out of sequence Receiver send reject i Transmitter goes back to frame i and retransmits

Go Back N - Lost Frame (2) Frame i lost and no additional frame sent Receiver gets nothing and returns neither acknowledgement nor rejection Transmitter times out and sends acknowledgement frame with P bit set to 1 Receiver interprets this as command which it acknowledges with the number of the next frame it expects (frame i ) Transmitter then retransmits frame i

Go Back N - Damaged Acknowledgement Receiver gets frame i and sends acknowledgement (i+1) which is lost Acknowledgements are cumulative, so next acknowledgement (i+n) may arrive before transmitter times out on frame i If transmitter times out, it sends acknowledgement with P bit set as before This can be repeated a number of times before a reset procedure is initiated

Go Back N - Damaged Rejection As for lost frame (2)

Go Back N - Diagram

Selective Reject Also called selective retransmission Only rejected frames are retransmitted Subsequent frames are accepted by the receiver and buffered Minimizes retransmission Receiver must maintain large enough buffer More complex login in transmitter

Selective Reject - Diagram

High Level Data Link Control HDLC ISO 33009, ISO 4335

HDLC Station Types Primary station Secondary station Combined station Controls operation of link Frames issued are called commands Maintains separate logical link to each secondary station Secondary station Under control of primary station Frames issued called responses Combined station May issue commands and responses

HDLC Link Configurations Unbalanced One primary and one or more secondary stations Supports full duplex and half duplex Balanced Two combined stations

HDLC Transfer Modes (1) Normal Response Mode (NRM) Unbalanced configuration Primary initiates transfer to secondary Secondary may only transmit data in response to command from primary Used on multi-drop lines Host computer as primary Terminals as secondary

HDLC Transfer Modes (2) Asynchronous Balanced Mode (ABM) Balanced configuration Either station may initiate transmission without receiving permission Most widely used No polling overhead

HDLC Transfer Modes (3) Asynchronous Response Mode (ARM) Unbalanced configuration Secondary may initiate transmission without permission form primary Primary responsible for line rarely used

Frame Structure Synchronous transmission All transmissions in frames Single frame format for all data and control exchanges

Frame Structure

Flag Fields Delimit frame at both ends 01111110 May close one frame and open another Receiver hunts for flag sequence to synchronize Bit stuffing used to avoid confusion with data containing 01111110 0 inserted after every sequence of five 1s If receiver detects five 1s it checks next bit If 0, it is deleted If 1 and seventh bit is 0, accept as flag If sixth and seventh bits 1, sender is indicating abort

Bit Stuffing Example with possible errors

Address Field Identifies secondary station that sent or will receive frame Usually 8 bits long May be extended to multiples of 7 bits LSB of each octet indicates that it is the last octet (1) or not (0) All ones (11111111) is broadcast

Control Field Different for different frame type Information (I) - data to be transmitted to user (next layer up) Flow and error control piggybacked on information frames Supervisory (S) - ARQ when piggyback not used Unnumbered (U) - supplementary link control First one or two bits of control field identify frame type Remaining bits explained later

Control Field Diagram

Poll/Final Bit Use depends on context Command frame Response frame P bit 1 to solicit (poll) response from peer Response frame F bit 1 indicates response to soliciting command

Information Field Only in information and some unnumbered frames Must contain integral number of octets Variable length

Frame Check Sequence Field FCS Error detection 16 bit CRC Optional 32 bit CRC

HDLC Operation Exchange of information, supervisory and unnumbered frames Three phases Initialization Data transfer Disconnect

Examples of Operation (1)

Examples of Operation (2)