Presentation is loading. Please wait.

Presentation is loading. Please wait.

William Stallings Data and Computer Communications 7th Edition

Similar presentations


Presentation on theme: "William Stallings Data and Computer Communications 7th Edition"— Presentation transcript:

1 William Stallings Data and Computer Communications 7th Edition
Chapter 7 Data Link Control Protocols

2 Flow Control Ensuring the sending entity does not overwhelm the receiving entity Preventing buffer overflow Transmission time Time taken to emit all bits into medium Propagation time Time for a bit to traverse the link

3 Model of Frame Transmission

4 Stop and Wait Source transmits frame
Destination receives frame and replies with acknowledgement Source waits for ACK before sending next frame Destination can stop flow by not sending ACK Works well for a few large frames Figure 7.2 utilization vs. throughput 1250B frame 100Mbps, coaxial cable, tx time: 0.1ms 1km: 0.5*10-5 s, 20km: 0.1ms

5 Fragmentation Large block of data may be split into small frames
Limited buffer size Errors detected sooner (when whole frame received) On error, retransmission of smaller frames is needed Prevents one station occupying medium for long periods Stop and wait becomes inadequate

6 Stop and Wait Link Utilization

7 Sliding Windows Flow Control
Allow multiple frames to be in transit Receiver has buffer W long Transmitter can send up to W frames without ACK Each frame is numbered ACK includes number of next frame expected Sequence number bounded by size of field (k) Frames are numbered modulo 2k

8 Sliding Window Diagram
Why window 7?

9 Example Sliding Window

10 Sliding Window Enhancements
Receiver can acknowledge frames without permitting further transmission (Receive Not Ready) Must send a normal acknowledge to resume If duplex, use piggybacking If no data to send, use acknowledgement frame If data but no acknowledgement to send, send last acknowledgement number again, or have ACK valid flag (TCP)

11 Error Detection Additional bits added by transmitter for error detection code Parity Value of parity bit is such that character has even (even parity) or odd (odd parity) number of ones Even number of bit errors goes undetected

12 Cyclic Redundancy Check
For a block of k bits transmitter generates n bit sequence Transmit k+n bits which is exactly divisible by some number Receive divides frame by that number If no remainder, assume no error For math, see Stallings chapter 6

13 Error Control Detection and correction of errors Lost frames
Damaged frames Automatic repeat request Error detection Positive acknowledgment Retransmission after timeout Negative acknowledgement and retransmission

14 Types of Errors Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. There are two types of errors: Single-Bit Error Burst Error

15 Single-bit Error In a single-bit error, only one bit in the data unit has changed.

16 Burst Error of length 5 A burst error means that 2 or more bits in the data unit have changed.

17 Error Detection Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Detection Methods Parity Check Cyclic Redundancy Check (CRC) Checksum (All have redundancy in data)

18 Parity Checking In even parity checking, a parity bit is added to every data unit so that the total number of 1’s is even. In odd parity checking, a parity bit is added to every data unit so that the total number of 1’s is odd. Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd.

19 Even Parity Concept

20 Even Parity Example Suppose the sender wants to send the word world. In ASCII the five characters are coded as The following shows the actual bits sent:

21 Even Parity Example Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission. The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.

22 Even Parity Error Example
Now suppose the word world in Example 1 is corrupted during transmission. The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted (the odd counts), discards them, and asks for retransmission.

23 Two-dimensional Parity
In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block.

24 Two-dimensional parity

25 Two-dimensional parity
Suppose the following block is sent: However, it is hit by a burst noise of length 8, and some bits are corrupted. When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded.

26 Cyclic Redundancy Checksum
The CRC error detection method treats the packet of data to be transmitted as a large polynomial. The transmitter takes the message polynomial and using polynomial arithmetic, divides it by a given generating polynomial. The quotient is discarded but the remainder is “attached” to the end of the message. TDC 361

27 CRC generator and checker

28 Cyclic Redundancy Checksum
The message (with the remainder) is transmitted to the receiver. The receiver divides the message and remainder by the same generating polynomial. If a remainder not equal to zero results, there was an error during transmission. If a remainder of zero results, there was no error during transmission. TDC 361

29 Cyclic Redundancy Checksum
M(x) = Original data message P(x) = Generator polynomial n = Number of bits in P(x) - 1 CRC = remainder [ M(x) * 2n ] / P(x)

30 Cyclic Redundancy Checksum
M(x) = Original data message 100100 P(x) = Generator polynomial 1101 n = Number of bits in P(x) – 1 3 CRC = remainder [ M(x) * 2n ] / P(x) [ * 23 ] / 1101 / 1101

31 Binary division in a CRC generator

32 Binary division in a CRC checker

33 A Polynomial

34 A Polynomial Representing a Divisor

35 Standard Polynomials Name Polynomial Application CRC-8 x8 + x2 + x + 1
ATM header CRC-10 x10 + x9 + x5 + x4 + x 2 + 1 ATM AAL ITU-16 x16 + x12 + x5 + 1 HDLC ITU-32 x32 + x26 + x23 + x22 + x16 + x12 + x11 + x10 + x8 + x7 + x5 + x4 + x2 + x + 1 LANs

36 Cyclic Redundancy Checksum Example
101011 1001 101 000 1010 110 1100 Remainder = CRC

37 Cyclic Redundancy Checksum Example
Transmit: M(x) * 2n xor CRC = * 23 xor 011 = xor 011 = Data CRC

38 Cyclic Redundancy Checksum Example
Receive: Divide by P(x) = Generator polynomial = 1001 If result = 0, transmission is error free. If result <> 0, an error occurred in transmission.

39 Cyclic Redundancy Checksum Example
101011 1001 101 000 1010 110 1101 Remainder = 0 = Error Free

40 Cyclic Redundancy Checksum Example
101011 1001 101 000 1010 110 1100 1011 10 Remainder = 10 = Error!!!

41 CRC Performance TDC 361

42 Automatic Repeat Request (ARQ)
Stop and wait Go back N Selective reject (selective retransmission)

43 Stop and Wait Source transmits single frame Wait for ACK
If received frame damaged, discard it Transmitter has timeout If no ACK within timeout, retransmit If ACK damaged,transmitter will not recognize it Transmitter will retransmit Receive gets two copies of frame Use ACK0 and ACK1 What if no sequence number?

44 Stop and Wait - Diagram

45 Stop and Wait - Pros and Cons
Simple Inefficient

46 Go Back N (1) Based on sliding window
If no error, ACK as usual with next frame expected Use window to control number of outstanding frames If error, reply with rejection Discard that frame and all future frames until error frame received correctly Transmitter must go back and retransmit that frame and all subsequent frames

47 Go Back N - Damaged Frame
Receiver detects error in frame i Receiver sends rejection-i Transmitter gets rejection-i Transmitter retransmits frame i and all subsequent

48 Go Back N - Lost Frame (1) Frame i lost Transmitter sends i+1
Receiver gets frame i+1 out of sequence Receiver send reject i Transmitter goes back to frame i and retransmits

49 Go Back N - Lost Frame (2) Frame i lost and no additional frame sent
Receiver gets nothing and returns neither acknowledgement nor rejection Transmitter times out and sends acknowledgement frame with P bit set to 1 Receiver interprets this as command which it acknowledges with the number of the next frame it expects (frame i ) Transmitter then retransmits frame i

50 Go Back N - Damaged Acknowledgement
Receiver gets frame i and sends acknowledgement (i+1) which is lost Acknowledgements are cumulative, so next acknowledgement (i+n) may arrive before transmitter times out on frame i If transmitter times out, it sends acknowledgement with P bit set as before This can be repeated a number of times before a reset procedure is initiated

51 Go Back N - Damaged Rejection
As for lost frame (2)

52 Go Back N - Diagram

53 Selective Reject Also called selective retransmission
Only rejected frames are retransmitted Subsequent frames are accepted by the receiver and buffered Minimizes retransmission Receiver must maintain large enough buffer More complex login in transmitter

54 Selective Reject - Diagram

55 High Level Data Link Control
HDLC ISO 33009, ISO 4335

56 HDLC Station Types Primary station Secondary station Combined station
Controls operation of link Frames issued are called commands Maintains separate logical link to each secondary station Secondary station Under control of primary station Frames issued called responses Combined station May issue commands and responses

57 HDLC Link Configurations
Unbalanced One primary and one or more secondary stations Supports full duplex and half duplex Balanced Two combined stations

58 HDLC Transfer Modes (1) Normal Response Mode (NRM)
Unbalanced configuration Primary initiates transfer to secondary Secondary may only transmit data in response to command from primary Used on multi-drop lines Host computer as primary Terminals as secondary

59 HDLC Transfer Modes (2) Asynchronous Balanced Mode (ABM)
Balanced configuration Either station may initiate transmission without receiving permission Most widely used No polling overhead

60 HDLC Transfer Modes (3) Asynchronous Response Mode (ARM)
Unbalanced configuration Secondary may initiate transmission without permission form primary Primary responsible for line rarely used

61 Frame Structure Synchronous transmission All transmissions in frames
Single frame format for all data and control exchanges

62 Frame Structure

63 Flag Fields Delimit frame at both ends 01111110
May close one frame and open another Receiver hunts for flag sequence to synchronize Bit stuffing used to avoid confusion with data containing 0 inserted after every sequence of five 1s If receiver detects five 1s it checks next bit If 0, it is deleted If 1 and seventh bit is 0, accept as flag If sixth and seventh bits 1, sender is indicating abort

64 Bit Stuffing Example with possible errors

65 Address Field Identifies secondary station that sent or will receive frame Usually 8 bits long May be extended to multiples of 7 bits LSB of each octet indicates that it is the last octet (1) or not (0) All ones ( ) is broadcast

66 Control Field Different for different frame type
Information (I) - data to be transmitted to user (next layer up) Flow and error control piggybacked on information frames Supervisory (S) - ARQ when piggyback not used Unnumbered (U) - supplementary link control First one or two bits of control field identify frame type Remaining bits explained later

67 Control Field Diagram

68 Poll/Final Bit Use depends on context Command frame Response frame
P bit 1 to solicit (poll) response from peer Response frame F bit 1 indicates response to soliciting command

69 Information Field Only in information and some unnumbered frames
Must contain integral number of octets Variable length

70 Frame Check Sequence Field
FCS Error detection 16 bit CRC Optional 32 bit CRC

71 HDLC Operation Exchange of information, supervisory and unnumbered frames Three phases Initialization Data transfer Disconnect

72 Examples of Operation (1)

73 Examples of Operation (2)


Download ppt "William Stallings Data and Computer Communications 7th Edition"

Similar presentations


Ads by Google