Review:. Chapter 3: The Data Link Layer –achieve reliable, efficient communication between two physically connected machines. –Example problems to be.

Slides:



Advertisements
Similar presentations
Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover.
Advertisements

The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Transport Layer3-1 Homework r Chapter 2#10,13-18 r Due Wed September 17.
Chapter 3 outline 3.1 transport-layer services
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
1 Outline r Transport-layer services r Multiplexing and demultiplexing r Connectionless transport: UDP r Principles of reliable data transfer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 10 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao Cleveland State University
CSC 3352 Computer Communications Chapter 3&41 The Link Layer Has 2 main Components The Data Link Layer Medium Access Control (MAC) Examples:SLIP, PPP,
Transport Layer3-1 Data Communication and Networks Lecture 6 Reliable Data Transfer October 12, 2006.
Announcement Project 1 due last night, how is that ? Project 2 almost ready, out tomorrow, will post online –Much harder than project 1, start early!
Announcement Project 1 due last night, how is that ? Homework 1 grade, comments out –Will be discussed in the next lecture Homework 2 out Project 2 almost.
The Data Link Layer Chapter 3. Position of the data-link layer.
The OSI Reference Model
Circuit Switching (a) Circuit switching. (b) Packet switching.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Some slides are in courtesy of J. Kurose and K. Ross Review of Previous Lecture r Transport-layer services r Multiplexing and demultiplexing r Connectionless.
20101 The Data Link Layer Chapter Design Issues Controls communication between 2 machines directly connected by “wire”-like link Services Provided.
1 Transport Layer goals: r understand principles behind transport layer services: m multiplexing/demultiplexing m reliable data transfer m flow control.
1 Reliable Data Transfer. 2 r Problem: Reliability  Want an abstraction of a reliable link even though packets can be corrupted or get lost r Solution:
Reliable Data Transfer#1#1 Reliable Data Transfer.
NETWORKING CONCEPTS. DATA LINK LAYER Data Link Control main functions of the data link layer are Data link control media access control. Data link control.
Principles of Reliable Data Transfer. Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver.
The Transport Layer  introduction  fundamental problems in networking  communicating reliably over an unreliable channel  congestion and flow control.
Transport Layer1 Reliable Transfer Ram Dantu (compiled from various text books)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
15-1 Last time □ Reliable Data Transfer ♦ Provide rdt over unreliable network layer ♦ FSM model ♦ rdt 1.0: rdt over reliable channels ♦ rdt 2.0: rdt over.
Chapter 3 THE DATA LINK LAYER
Chapt 3 Data Link Layer1 Data Link Layer Functions –Provides services to network layer Well-defined interface –Framing –Flow control – between adjacent.
1 Transport Layer Lecture 10 Imran Ahmed University of Management & Technology.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
Data Link Layer : Services, Framing, Error Detection and Correction2.
CS 453 Computer Networks Lecture 9 Layer 2 – Data Link Layer.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 13.
rdt2.2: a NAK-free protocol
Transport Layer Goals: Overview:
Transport Layer3-1 rdt2.1: sender, handles garbled ACK/NAKs Wait for call 0 from above sndpkt = make_pkt(0, data, checksum) udt_send(sndpkt) rdt_send(data)
Before The Canned Slides r What sort of things did you learn from Mikes talk on Friday? r Mini-homework this week: create a wiki page with cross-referenced.
Wireless and Mobile Networks (ELEC6219) Session 3: Theories of Data Communications. Data Link Layer. Adriana Wilde and Jeff Reeve 22 January 2015.
Transport Layer Our goals:
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Principles of reliable data transfer 0.
COMPUTER NETWORKS. Unit -2 Continue... Physical Layer Connection –Oriented Networks : X.25 Relay Frames Types of cables Co-axial Fiber optics Twisted.
Data Link Layer. Data link layer The communication between two machines that can directly communicate with each other. Basic property – If bit A is sent.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
Computer Networking Lecture 16 – Reliable Transport.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Data Link Control. The two main functions of the data link layer are data link control and media access control. The first, data link control, deals with.
Chapter 3: The Data Link Layer –to achieve reliable, efficient communication between two physically connected machines. –Design issues: services interface.
The Data Link Layer RIS 251 Dr. ir. S.S. Msanjila.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Data Link Layer.
Performance of rdt3.0 rdt3.0 works, but performance stinks
Data link layer (LLC).
Last time Reliable Data Transfer
Chapter 3 The Data Link Layer
Data Link Layer What does it do?
Reliable Data Transfer Reliable Data Transfer.
Data Link Layer.
Chapter 3 – Part 1 The Data Link Layer.
Overview Jaringan Komputer (2)
Chapter 3 The Data Link Layer.
CS412 Introduction to Computer Networking & Telecommunication
Ion Stoica September 6, 2001 EE 122: Lecture 4 Ion Stoica September 6, 2001.
rdt2.2: a NAK-free protocol
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
CS 5565 Network Architecture and Protocols
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Review:

Chapter 3: The Data Link Layer –achieve reliable, efficient communication between two physically connected machines. –Example problems to be addressed: Errors in the physical layer Two machines may have different speeds –Design issues: services interface to the network layer how to group bits into frames (framing) how to deal with errors (error control). how to deal with speed mismatch (flow control).

Service interface: unreliable connectionless service reliable connectionless service reliable connection-oriented service –Advantages of each service type: –Unreliable connectionless: »Efficient when error rate is very low, »Ideal for real time traffic –acknowledged connectionless: »Error rate is high, less retries are needed –acknowledged connection-oriented »guarantee order, upper level software is simpler

Framing (break the bit stream into frames) –Why framing? Raw bit stream cannot provide any error detection capability. –Bits may change (lightning strikes). –Bits may get lost (clock drift). Cut the raw bit stream into frames -> can then compute the checksum for the frame. Misunderstanding of the two parties will result in an unmatched checksum. –How to do framing? –Character count –Starting and ending characters with character stuffing –starting and ending flags with bit stuffing –physical level code violation.

Character count. Frame: Count + frame data E.g Problem: what if a count is altered during transmission?

Byte oriented framing. –Each frame is a sequence of bytes. Use special characters to signal the start and end of a frame. –E.g STX: start of text, ETX: end of text. Frames: STX frame_data ETX STX frame_data ETX. PROBLEM: WHAT IF frame_data = ETX Solution: Byte stuff the character ETX Introduce another escape character: DLE: data link escape. Characters that need to be stuffed? Example: frame data = STX DLE ETX frame = ??? –Advantage: can recover frames. –Limitation: ties to a particular character set.

Bit oriented framing. –A frame is a sequence of bits, using special bit patterns to signal the start and end of a frame. –E.g: special pattern Frames: frame_data PROBLEM: WHAT IF frame_data = Solution: Bit stuffing: make sure that such bit pattern will not occur in the frame data --> after 5 1’s add a 0 automatically. Example: The sender always adds a 0 after five1’s, the receiver always deletes the 0 after five 1’s. Example: frame_data=

Physical layer coding violation. –Use special symbol (that never occur in the data) for the frame boundary. –E.g: Manchester code 1: low to high, 0: high to low. Frame boundary symbol: high-high or low-low.

Error control –How to make sure that each frame is eventually delivered to the destination (reliable service)? –Reliability through acknowledgement Sender knows that the frame is delivered when it gets the acknowledgement. –Sender sends, resends when NACK. –Receiver sends ACK when the checksum is correct, NACK when incorrect. Problem? What if the whole packet gets lost? –Solution: timeout. Problem? –Need to do more.

Flow control –To avoid swamping the slow receiver. –Use a feedback mechanism to make sure that the sender knows the status of the receiver. “send me N frames and no more until I tell you to continue”

Data link layer protocols: P0 - Nothing Sender –get a packet from the network layer –Add frame header, send the frame to the physical layer. Receiver –get a frame from the physical layer –strip the header –pass the packet to the network layer.

P1: Stop and wait (flow control) Assumption: no lost packets Sender –get a packet from the network layer –Add frame header, send the frame to the physical layer. –Wait for ACK Receiver –get a frame from the physical layer –strip the header –pass the packet to the network layer. –Send ACK.

P2: stop and wait + timeout + sequence number ( flow control + error control ) Sender –get a packet from the network layer –Add frame header (seq), send the frame to the physical layer. –Wait for ACK till timeout –If timeout, resend the packet, back to waiting Receiver –get a frame from the physical layer –strip the header –if (seq = expected) pass to the network layer. Send ACK –Else send ACK

Stop and Wait in action

Stop-and-wait operation first packet bit transmitted, t = 0 senderreceiver RTT last packet bit transmitted, t = L / R first packet bit arrives last packet bit arrives, send ACK ACK arrives, send next packet, t = RTT + L / R

Performance of Stop-and-Wait rdt3.0 works, but performance stinks example: 1 Gbps link, 15 ms e-e prop. delay, 1KB packet: T transmit = 8kb/pkt 10**9 b/sec = 8 microsec –U sender : utilization – fraction of time sender busy sending –1KB pkt every 30 msec -> 33kB/sec thruput over 1 Gbps link –network protocol limits use of physical resources! L (packet length in bits) R (transmission rate, bps) =