Chapter 5 Peer-To-Peer Protocols and Data Link Layer

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 5 Peer-To-Peer Protocols and Data Link Layer Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols Peer-to-Peer Protocols and Service Models ARQ Protocols and Reliable Data Transfer Flow Control Timing Recovery TCP Reliable Stream Service & Flow Control Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART II: Data Link Controls Framing Point-to-Point Protocol High-Level Data Link Control Link Sharing Using Statistical Multiplexing Chapter Overview z Peer-to-Peer protocols: many protocols involve the interaction between two peers z Service Models are discussed & examples given z Detailed discussion of ARQ provides example of development of peer-to-peer protocols z Flow control, TCP reliable stream, and timing recovery z Data Link Layer z Framing z PPP & HDLC protocols z Statistical multiplexing for link sharing Chapter 5 Peer-to-Peer Protocols and Data Link Layer Peer-to-Peer Protocols and Service Models Peer-to-Peer Protocols zzz zzz z Peer-to-Peer processes execute layer-n protocol to provide service to n + 1 peer process n + 1 peer process layer-(n+1) z Layer-(n+1) peer calls SDU SDU layer-n and passes PDU Service Data Units n peer process n peer process (SDUs) for transfer z Layer-n peers exchange Protocol Data Units (PDUs) to effect transfer n – 1 peer process n – 1 peer process z Layer-n delivers SDUs to destination layer-(n+1) peer zzz zzz Service Models z The service model specifies the information transfer service layer-n provides to layer-(n+1) z The most important distinction is whether the service is: z Connection-oriented z Connectionless z Service model possible features: z Arbitrary message size or structure z Sequencing and Reliability z Timing, Pacing, and Flow control z Multiplexing z Privacy, integrity, and authentication Connection-Oriented Transfer Service z Connection Establishment z Connection must be established between layer-(n+1) peers z Layer-n protocol must: Set initial parameters, e.g. sequence numbers; and Allocate resources, e.g. buffers z Message transfer phase z Exchange of SDUs z Disconnect phase z Example: TCP, PPP n + 1 peer process n + 1 peer process send receive SDU Layer n connection-oriented service SDU Connectionless Transfer Service z No Connection setup, simply send SDU z Each message send independently z Must provide all address information per message z Simple & quick z Example: UDP, IP n + 1 peer process n + 1 peer process send receive SDU Layer n connectionless service Message Size and Structure z What message size and structure will a service model accept? z Different services impose restrictions on size & structure of data it will transfer z Single bit? Block of bytes? Byte stream? z Ex: Transfer of voice mail = 1 long message z Ex: Transfer of voice call = byte stream 1 voice mail= 1 message = entire sequence of speech samples (a) 1 call = sequence of 1-byte messages (b) Segmentation & Blocking z To accommodate arbitrary message size, a layer may have to deal with messages that are too long or too short for its protocol z Segmentation & Reassembly: a layer breaks long messages into smaller blocks and reassembles these at the destination z Blocking & Unblocking: a layer combines small messages into bigger blocks prior to transfer 1 long message 2 or more short messages 2 or more blocks 1 block Reliability & Sequencing z Reliability: Are messages or information stream delivered error-free and without loss or duplication? z Sequencing: Are messages or information stream delivered in order? z ARQ protocols combine error detection, retransmission, and sequence numbering to provide reliability & sequencing z Examples: TCP and HDLC Pacing and Flow Control z Messages can be lost if receiving system does not have sufficient buffering to store arriving messages z If destination layer-(n+1) does not retrieve its information fast enough, destination layer-n buffers may overflow z Pacing & Flow Control provide backpressure mechanisms that control transfer according to availability of buffers at the destination z Examples: TCP and HDLC Timing z Applications involving voice and video generate units of information that are related temporally z Destination application must reconstruct temporal relation in voice/video units z Network transfer introduces delay & jitter z Timing Recovery protocols use timestamps & sequence numbering to control the delay & jitter in delivered information z Examples: RTP & associated protocols in Voice over IP Multiplexing z Multiplexing enables multiple layer-(n+1) users to share a layer-n service z A multiplexing tag is required to identify specific users at the destination z Examples: UDP, IP Privacy, Integrity, & Authentication z Privacy: ensuring that information transferred cannot be read by others z Integrity: ensuring that information is not altered during transfer z Authentication: verifying that sender and/or receiver are who they claim to be z Security protocols provide these services and are discussed in Chapter 11 z Examples: IPSec, SSL End-to-End vs. Hop-by-Hop z A service feature can be provided by implementing a protocol z end-to-end across the network z across every hop in the network z Example: z Perform error control at every hop in the network or only between the source and destination? z Perform flow control between every hop in the network or only between source & destination? z We next consider the tradeoffs between the two approaches Error control in Data Link Layer Packets Packets (a) z Data Link operates over wire-like, Data link Data link layer Frames layer directly-connected A Physical Physical B systems layer layer z Frames can be corrupted or lost, but arrive in order (b) 1 1 z Data link performs 2 2 error-checking & 1 2 3 2 1 1 2 3 2 1 Medium retransmission 2 z Ensures error-free 1 A B packet transfer 1 Physical layer entity between two systems 2 Data link layer entity 3 Network layer entity Error Control in Transport Layer z Transport layer protocol (e.g. TCP) sends segments across network and performs end-to-end error checking & retransmission z Underlying network is assumed to be unreliable Messages Messages Segments Transport Transport layer layer Network Network Network Network layer layer layer layer Data link Data link Data link Data link layer layer layer layer End system End system Physical Physical A Physical Physical B layer layer layer layer Network z Segments can experience long delays, can be lost, or arrive out-of-order because packets can follow different paths across network z End-to-end error control protocol more difficult 1 2 2 1 C 3 2 2 1 1 End System 1 End System α 1 1 2 2 2 β 4 3 2 1 1 2 3 2 1 1 2 3 2 1 1 2 3 4 Medium 2 A B 1 Network 3 Network layer entity 4 Transport layer entity End-to-End Approach Preferred Hop-by-hop Hop-by-hop cannot ensure E2E correctness Data Data Data Data 1 2 3 4 5 Faster recovery ACK/ ACK/ ACK/ ACK/ NAK NAK NAK NAK Simple End-to-end inside the ACK/NAK network More scalable 1 2 3 4 5 if complexity at Data Data Data Data the edge Chapter 5 Peer-to-Peer Protocols and Data Link Layer ARQ Protocols and Reliable Data Transfer Automatic Repeat Request (ARQ) z Purpose: to ensure a sequence of information packets is delivered in order and without errors or duplications despite transmission errors & losses z We will look at: z Stop-and-Wait ARQ z Go-Back N ARQ z Selective Repeat ARQ z Basic elements of ARQ: z Error-detecting code with high error coverage z ACKs (positive acknowledgments z NAKs (negative acknowlegments) z Timeout mechanism Stop-and-Wait ARQ Transmit a frame, wait for ACK Error-free Packet packet Information frame Transmitter Receiver Timer set after (Process A) (Process B) each frame transmission Control frame Header CRC Information Header packet CRC Information frame Control frame: ACKs Need for Sequence Numbers (a) Frame 1 lost Time-out Time A Frame Frame Frame Frame 0 1 1 2 ACK ACK B (b) ACK lost Time-out Time A Frame Frame Frame Frame 0 1 1 2 ACK ACK ACK B z In cases (a) & (b) the transmitting station A acts the same way z But in case (b) the receiving station B accepts frame 1 twice z Question: How is the receiver to know the second frame is also frame 1? z Answer: Add frame sequence number in header z Slast is sequence number of most recent transmitted frame Sequence Numbers (c) Premature Time-out Time-out Time A Frame 0 Frame Frame Frame ACK 0 1 2 ACK B z The transmitting station A misinterprets duplicate ACKs z Incorrectly assumes second ACK acknowledges Frame 1 z Question: How is the receiver to know second ACK is for frame 0? z Answer: Add frame sequence number in ACK header z Rnext is sequence number of next frame expected by the receiver z Implicitly acknowledges receipt of all prior frames 1-Bit Sequence Numbering Suffices 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Rnext Slast Timer Transmitter Slast Receiver A B Rnext Global State: Error-free frame 0 (0,0) (0,1) (Slast, Rnext) arrives at receiver ACK for ACK for frame 0 frame 1 arrives at arrives at transmitter transmitter Error-free frame 1 arrives at receiver (1,0) (1,1) Stop-and-Wait ARQ Transmitter Receiver Ready state Always in Ready State z Await request from higher layer for z Wait for arrival of new frame packet transfer z When frame arrives, check for errors z When request arrives, transmit z If no errors detected and sequence frame with updated S and CRC last number is correct (Slast=Rnext), then z Go to Wait State z accept frame, Wait state z update Rnext, z Wait for ACK or timer to expire; z send ACK frame with Rnext, block requests from higher layer z deliver packet to higher layer z If timeout expires z If no errors
Recommended publications
  • Solutions to Chapter 2
    CS413 Computer Networks ASN 4 Solutions Solutions to Assignment #4 3. What difference does it make to the network layer if the underlying data link layer provides a connection-oriented service versus a connectionless service? [4 marks] Solution: If the data link layer provides a connection-oriented service to the network layer, then the network layer must precede all transfer of information with a connection setup procedure (2). If the connection-oriented service includes assurances that frames of information are transferred correctly and in sequence by the data link layer, the network layer can then assume that the packets it sends to its neighbor traverse an error-free pipe. On the other hand, if the data link layer is connectionless, then each frame is sent independently through the data link, probably in unconfirmed manner (without acknowledgments or retransmissions). In this case the network layer cannot make assumptions about the sequencing or correctness of the packets it exchanges with its neighbors (2). The Ethernet local area network provides an example of connectionless transfer of data link frames. The transfer of frames using "Type 2" service in Logical Link Control (discussed in Chapter 6) provides a connection-oriented data link control example. 4. Suppose transmission channels become virtually error-free. Is the data link layer still needed? [2 marks – 1 for the answer and 1 for explanation] Solution: The data link layer is still needed(1) for framing the data and for flow control over the transmission channel. In a multiple access medium such as a LAN, the data link layer is required to coordinate access to the shared medium among the multiple users (1).
    [Show full text]
  • Data Networks
    Second Ed ition Data Networks DIMITRI BERTSEKAS Massachusetts Institute of Technology ROBERT GALLAGER Massachusetts Institute ofTechnology PRENTICE HALL, Englewood Cliffs, New Jersey 07632 2 Node A Node B Time at B --------- Packet 0 Point-to-Point Protocols and Links 2.1 INTRODUCTION This chapter first provides an introduction to the physical communication links that constitute the building blocks of data networks. The major focus of the chapter is then data link control (i.e., the point-to-point protocols needed to control the passage of data over a communication link). Finally, a number of point-to-point protocols at the network, transport, and physical layers are discussed. There are many similarities between the point-to-point protocols at these different layers, and it is desirable to discuss them together before addressing the more complex network-wide protocols for routing, flow control, and multiaccess control. The treatment of physical links in Section 2.2 is a brief introduction to a very large topic. The reason for the brevity is not that the subject lacks importance or inherent interest, but rather, that a thorough understanding requires a background in linear system theory, random processes, and modem communication theory. In this section we pro­ vide a sufficient overview for those lacking this background and provide a review and perspective for those with more background. 37 38 Point-to-Point Protocols and Links Chap. 2 In dealing with the physical layer in Section 2.2, we discuss both the actual com­ munication channels used by the network and whatever interface modules are required at the ends of the channels to transmit and receive digital data (see Fig 2.1).
    [Show full text]
  • Data Link Layer
    Data link layer Goals: ❒ Principles behind data link layer services ❍ Error detection, correction ❍ Sharing a broadcast channel: Multiple access ❍ Link layer addressing ❍ Reliable data transfer, flow control: Done! ❒ Example link layer technology: Ethernet Link layer services Framing and link access ❍ Encapsulate datagram: Frame adds header, trailer ❍ Channel access – if shared medium ❍ Frame headers use ‘physical addresses’ = “MAC” to identify source and destination • Different from IP address! Reliable delivery (between adjacent nodes) ❍ Seldom used on low bit error links (fiber optic, co-axial cable and some twisted pairs) ❍ Sometimes used on high error rate links (e.g., wireless links) Link layer services (2.) Flow Control ❍ Pacing between sending and receiving nodes Error Detection ❍ Errors are caused by signal attenuation and noise. ❍ Receiver detects presence of errors signals sender for retrans. or drops frame Error Correction ❍ Receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex ❍ With half duplex, nodes at both ends of link can transmit, but not at same time Multiple access links / protocols Two types of “links”: ❒ Point-to-point ❍ PPP for dial-up access ❍ Point-to-point link between Ethernet switch and host ❒ Broadcast (shared wire or medium) ❍ Traditional Ethernet ❍ Upstream HFC ❍ 802.11 wireless LAN MAC protocols: Three broad classes ❒ Channel Partitioning ❍ Divide channel into smaller “pieces” (time slots, frequency) ❍ Allocate piece to node for exclusive use ❒ Random
    [Show full text]
  • Technical Characteristics for a VHF Data Exchange System in the VHF Maritime Mobile Band
    Recommendation ITU-R M.2092-0 (10/2015) Technical characteristics for a VHF data exchange system in the VHF maritime mobile band M Series Mobile, radiodetermination, amateur and related satellite services ii Rec. ITU-R M.2092-0 Foreword The role of the Radiocommunication Sector is to ensure the rational, equitable, efficient and economical use of the radio- frequency spectrum by all radiocommunication services, including satellite services, and carry out studies without limit of frequency range on the basis of which Recommendations are adopted. The regulatory and policy functions of the Radiocommunication Sector are performed by World and Regional Radiocommunication Conferences and Radiocommunication Assemblies supported by Study Groups. Policy on Intellectual Property Right (IPR) ITU-R policy on IPR is described in the Common Patent Policy for ITU-T/ITU-R/ISO/IEC referenced in Annex 1 of Resolution ITU-R 1. Forms to be used for the submission of patent statements and licensing declarations by patent holders are available from http://www.itu.int/ITU-R/go/patents/en where the Guidelines for Implementation of the Common Patent Policy for ITU-T/ITU-R/ISO/IEC and the ITU-R patent information database can also be found. Series of ITU-R Recommendations (Also available online at http://www.itu.int/publ/R-REC/en) Series Title BO Satellite delivery BR Recording for production, archival and play-out; film for television BS Broadcasting service (sound) BT Broadcasting service (television) F Fixed service M Mobile, radiodetermination, amateur and related satellite services P Radiowave propagation RA Radio astronomy RS Remote sensing systems S Fixed-satellite service SA Space applications and meteorology SF Frequency sharing and coordination between fixed-satellite and fixed service systems SM Spectrum management SNG Satellite news gathering TF Time signals and frequency standards emissions V Vocabulary and related subjects Note: This ITU-R Recommendation was approved in English under the procedure detailed in Resolution ITU-R 1.
    [Show full text]
  • OSI Data Link Layer
    OSI Data Link Layer Network Fundamentals – Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission on network media. Describe the different types of media access control methods. Identify several common logical network topologies and describe how the logical topology determines the media access control method for that network. Explain the purpose of encapsulating packets into frames to facilitate media access. Describe the Layer 2 frame structure and identify generic fields. Explain the role of key frame header and trailer fields including addressing, QoS, type of protocol and Frame Check Sequence. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Data Link Layer – Accessing the Media Describe the service the Data Link Layer provides as it prepares communication for transmission on specific media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Data Link Layer – Accessing the Media Describe why Data Link layer protocols are required to control media access © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4 Data Link Layer – Accessing the Media Describe the role of framing in preparing a packet for transmission on a given media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5 Data Link Layer – Accessing the Media Describe the role the Data Link layer plays in linking the software and hardware layers © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6 Data Link Layer – Accessing the Media Identify several sources for the protocols and standards used by the Data Link layer © 2007 Cisco Systems, Inc.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • SELECTION of CYCLIC REDUNDANCY CODE and CHECKSUM March 2015 ALGORITHMS to ENSURE CRITICAL DATA INTEGRITY 6
    DOT/FAA/TC-14/49 Selection of Federal Aviation Administration William J. Hughes Technical Center Cyclic Redundancy Code and Aviation Research Division Atlantic City International Airport New Jersey 08405 Checksum Algorithms to Ensure Critical Data Integrity March 2015 Final Report This document is available to the U.S. public through the National Technical Information Services (NTIS), Springfield, Virginia 22161. U.S. Department of Transportation Federal Aviation Administration NOTICE This document is disseminated under the sponsorship of the U.S. Department of Transportation in the interest of information exchange. The U.S. Government assumes no liability for the contents or use thereof. The U.S. Government does not endorse products or manufacturers. Trade or manufacturers’ names appear herein solely because they are considered essential to the objective of this report. The findings and conclusions in this report are those of the author(s) and do not necessarily represent the views of the funding agency. This document does not constitute FAA policy. Consult the FAA sponsoring organization listed on the Technical Documentation page as to its use. This report is available at the Federal Aviation Administration William J. Hughes Technical Center’s Full-Text Technical Reports page: actlibrary.tc.faa.gov in Adobe Acrobat portable document format (PDF). Technical Report Documentation Page 1. Report No. 2. Government Accession No. 3. Recipient's Catalog No. DOT/FAA/TC-14/49 4. Title and Subitle 5. Report Date SELECTION OF CYCLIC REDUNDANCY CODE AND CHECKSUM March 2015 ALGORITHMS TO ENSURE CRITICAL DATA INTEGRITY 6. Performing Organization Code 220410 7. Author(s) 8. Performing Organization Report No.
    [Show full text]
  • IEEE Std 802.3™-2012 New York, NY 10016-5997 (Revision of USA IEEE Std 802.3-2008)
    IEEE Standard for Ethernet IEEE Computer Society Sponsored by the LAN/MAN Standards Committee IEEE 3 Park Avenue IEEE Std 802.3™-2012 New York, NY 10016-5997 (Revision of USA IEEE Std 802.3-2008) 28 December 2012 IEEE Std 802.3™-2012 (Revision of IEEE Std 802.3-2008) IEEE Standard for Ethernet Sponsor LAN/MAN Standards Committee of the IEEE Computer Society Approved 30 August 2012 IEEE-SA Standard Board Abstract: Ethernet local area network operation is specified for selected speeds of operation from 1 Mb/s to 100 Gb/s using a common media access control (MAC) specification and management information base (MIB). The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) MAC protocol specifies shared medium (half duplex) operation, as well as full duplex operation. Speed specific Media Independent Interfaces (MIIs) allow use of selected Physical Layer devices (PHY) for operation over coaxial, twisted-pair or fiber optic cables. System considerations for multisegment shared access networks describe the use of Repeaters that are defined for operational speeds up to 1000 Mb/s. Local Area Network (LAN) operation is supported at all speeds. Other specified capabilities include various PHY types for access networks, PHYs suitable for metropolitan area network applications, and the provision of power over selected twisted-pair PHY types. Keywords: 10BASE; 100BASE; 1000BASE; 10GBASE; 40GBASE; 100GBASE; 10 Gigabit Ethernet; 40 Gigabit Ethernet; 100 Gigabit Ethernet; attachment unit interface; AUI; Auto Negotiation; Backplane Ethernet; data processing; DTE Power via the MDI; EPON; Ethernet; Ethernet in the First Mile; Ethernet passive optical network; Fast Ethernet; Gigabit Ethernet; GMII; information exchange; IEEE 802.3; local area network; management; medium dependent interface; media independent interface; MDI; MIB; MII; PHY; physical coding sublayer; Physical Layer; physical medium attachment; PMA; Power over Ethernet; repeater; type field; VLAN TAG; XGMII The Institute of Electrical and Electronics Engineers, Inc.
    [Show full text]
  • (19) United States (12) Patent Application Publication (10) Pub
    US 20140071868A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2014/0071868 A1 Bergquist et al. (43) Pub. Date: Mar. 13, 2014 (54) APPARATUSES AND METHODS FOR Publication Classi?cation MANAGING PENDING HARQ RETRANSMISSIONS (51) Int. Cl. H04W 76/04 (2006.01) (71) Applicants:Gunnar Bergquist, Kista (SE); Riikka H04L 1/18 (2006.01) Susitaival, Helsinki (Fl); Anders Ohlsson, Jarfalla (SE); Mikael (52) US. Cl. Wittberg, Uppsala (SE) CPC ......... .. H04W 76/048 (2013.01); H04L 1/1803 (2013.01) (72) Inventors: Gunnar Bergquist, Kista (SE); Riikka USPC ......................................... .. 370/311; 370/328 Susitaival, Helsinki (Fl); Anders Ohlsson, Jarfalla (SE); Mikael Wittberg, Uppsala (SE) (57) ABSTRACT (73) Assignee: Telefonaktiebolaget L M Ericsson (publ), Stockholm (SE) Methods and systems present solutions to, for example, the (21) Appl. No .: 13/825,462 problem of unnecessary preparedness for suspended retrans missions in the user equipment (UE) Which contributes to (22) PCT Filed: Nov. 9, 2012 poWer drain in the device battery. One method for monitoring a Physical DoWnlink Control Channel (PDCCH) for adaptive PCT No.: PCT/SE2012/051225 (86) retransmission grants in a radio communication system § 371 (0X1), includes: monitoring, by a user equipment (U E), the PDCCH (2), (4) Date: Mar. 21, 2013 for adaptive retransmission grants; receiving, by the UE, a Related US. Application Data hybrid automatic repeat request (HARQ) acknowledge (ACK) message, and ceasing, by the UE, to monitor the (60) Provisional application No. 61/646,757, ?led on May PDCCH for adaptive retransmission grants after receipt of the 14, 2012. HARQ ACK message. -------- -- RADIO BEARERS BCCH PCCH SEGM.
    [Show full text]
  • Flow Control and ARQ Media Access Physical
    Data Link Layer The Data Link layer can be further subdivided into: Computer Networks application 1. Logical Link Control (LLC): provides flow and error control transport • different link protocols may provide different services, e.g., Ethernet doesn’t provide reliable network delivery (error recovery) Lecture 26: 2. Media Access Control (MAC): framing and LLC MAC Flow Control and ARQ media access physical Link Layer Services Flow Control Flow Control: What is flow control? • pacing between adjacent sending and receiving nodes • receiver telling sender to slow down Error Control: Why do you need flow control? • errors caused by signal attenuation, noise • ARQ: receiver detects presence of errors and asks sender for retransmission Flow control protocols at data link layer (single hop): • FEC: receiver identifies and corrects bit error(s), • XON/XOFF without resorting to retransmission • Stop & Wait Protocol • Sliding Window Protocol Reliable delivery between adjacent nodes • seldom used on low bit error links (fiber, some twisted pair) Similar issues and mechanisms apply at the • plays an important role in wireless links with high error rates transport layer (end-to-end) • Q: why do we need both link-level and end-end reliability? XON/XOFF Stop and Wait (S&W) Protocol ! : propagation After sending a packet, sender must wait for delay SR acknowledgment (ACK) before sending the next packet sender receiver Sender Receiver S R round-trip Algorithm: time (rtt) t • S sends stream of data Time ! : propagation • R sends XOFF, S stops transmission pkt
    [Show full text]
  • Networking Fundamentals
    SMB University: Selling Cisco SMB Foundation Solutions Networking Fundamentals © 2006 Cisco Systems, Inc. All rights reserved. SMBUF-1 Objectives • Describe the function and operation of a hub, a switch and a router • Describe the function and operation of a firewall and a gateway • Describe the function and operation of Layer 2 switching, Layer 3 switching, and routing • Identify the layers of the OSI model • Describe the functionality of LAN, MAN, and WAN networks • Identify the possible media types for LAN and WAN connections © 2006 Cisco Systems, Inc. All rights reserved. SMBUF-2 What is a Network? • A network refers to two or more connected computers that can share resources such as data, a printer, an Internet connection, applications, or a combination of these resources. © 2006 Cisco Systems, Inc. All rights reserved. SMBUF-3 Types of Networks Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) © 2006 Cisco Systems, Inc. All rights reserved. SMBUF-4 WAN Technologies Leased Line Synchronous serial Circuit-switched TELEPHONE COMPANY Asynchronous serial. ISDN Layer 1 © 2006 Cisco Systems, Inc. All rights reserved. SMBUF-5 WAN Technologies (Cont.) Frame-Relay Synchronous serial SERVICE PROVIDER Broadband Access SERVICE PROVIDER Cable, DSL, Wireless WAN © 2006 Cisco Systems, Inc. All rights reserved. SMBUF-6 Network Topologies: Bus Topology SEGMENT Terminator Terminator © 2006 Cisco Systems, Inc. All rights reserved. SMBUF-7 Network Topologies: Star Topology Hub © 2006 Cisco Systems, Inc. All rights reserved. SMBUF-8 Network Topologies: Extended Star Topology © 2006 Cisco Systems, Inc. All rights reserved. SMBUF-9 The OSI Model— Why a Layered Network Model? • Reduces complexity Application 7 • Standardizes interfaces Presentation • 6 Facilitates modular engineering • Ensures interoperable technology Session 5 • Accelerates evolution Transport • 4 Simplifies teaching and learning Network 3 Data Link 2 Physical 1 © 2006 Cisco Systems, Inc.
    [Show full text]
  • Master's Thesis
    MASTER'S THESIS Analysis of UDP-based Reliable Transport using Network Emulation Andreas Vernersson 2015 Master of Science in Engineering Technology Computer Science and Engineering Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract The TCP protocol is the foundation of the Internet of yesterday and today. In most cases it simply works and is both robust and versatile. However, in recent years there has been a renewed interest in building new reliable transport protocols based on UDP to handle certain problems and situations better, such as head-of-line blocking and IP address changes. The first part of the thesis starts with a study of a few existing reliable UDP-based transport protocols, SCTP which can also be used natively on IP, QUIC and uTP, to see what they can offer and how they work, in terms of features and underlying mechanisms. The second part consists of performance and congestion tests of QUIC and uTP imple- mentations. The emulation framework Mininet was used to perform these tests using controllable network properties. While easy to get started with, a number of issues were found in Mininet that had to be resolved to improve the accuracy of emulation. The tests of QUIC have shown performance improvements since a similar test in 2013 by Connectify, while new tests have identified specific areas that might require further analysis such as QUIC’s fairness to TCP and performance impact of delay jitter. The tests of two different uTP implementations have shown that they are very similar, but also a few differences such as slow-start growth and back-off handling.
    [Show full text]