Data Link Layer Design Issues • Error Detection and Correction • Elementary Data Link Protocols • Sliding Window Protocols • Example Data Link Protocols

Total Page:16

File Type:pdf, Size:1020Kb

Data Link Layer Design Issues • Error Detection and Correction • Elementary Data Link Protocols • Sliding Window Protocols • Example Data Link Protocols The Data Link Layer Chapter 3 • Data Link Layer Design Issues • Error Detection and Correction • Elementary Data Link Protocols • Sliding Window Protocols • Example Data Link Protocols Revised: August 2011 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 The Data Link Layer Application Responsible for delivering frames of information over a single link Transport Network • Handles transmission errors and Link regulates the flow of data Physical CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Data Link Layer Design Issues • Frames » • Possible services » • Framing methods » • Error control » • Flow control » CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Frames Link layer accepts packets from the network layer, and encapsulates them into frames that it sends using the physical layer; reception is the opposite process Network Link Virtual data path Physical Actual data path CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Possible Services Unacknowledged connectionless service • Frame is sent with no connection / error recovery • Ethernet is example Acknowledged connectionless service • Frame is sent with retransmissions if needed • Very unreliable channels; Example is 802.11 • NOTE: DL acknowledgement is an optimization to improve performance for unreliable channels, ACKs can also be done at higher layers Acknowledged connection-oriented service • Connection is set up; rare • Long unreliable channels such as satellites and long-distance telephone CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Framing Methods 1. Byte count » 2. Flag bytes with byte stuffing » 3. Flag bits with bit stuffing » 4. Physical layer coding violations − Use non-data symbol to indicate frame (e.g., for systems using 4B/5B line codes at the physical layer) Many DL protocols use a combination of the above framing methods for additional safety CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 1 Framing – Byte count Frame begins with a count of the number of bytes in it • Simple, but difficult to resynchronize after an error Expected case Error case CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 2 Framing – Byte stuffing Special flag bytes delimit frames; occurrences of flags in the data must be stuffed (escaped) • Longer, but easy to resynchronize after error Frame format Need to escape extra ESCAPE bytes too! Stuffing examples Example here is a simplification of PPP (point-to-point protocol) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 3 Framing – Bit stuffing Stuffing done at the bit level: • Frame flag has six consecutive 1s (not shown) • On transmit, after five 1s in the data, a 0 is added • On receive, a 0 after five 1s is deleted Data bits Transmitted bits with stuffing CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Error Control Error control repairs frames that are received in error • Requires errors to be detected at the receiver • Typically retransmit the unacknowledged frames • Timer protects against lost acknowledgements Detecting errors and retransmissions are next topics. CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Flow Control Prevents a fast sender from out-pacing a slow receiver • Receiver gives feedback on the data it can accept • Rare in the Link layer as NICs run at “wire speed” − Receiver can take data as fast as it can be sent Flow control is a topic addressed in the Data Link and higher layers. • DL uses feedback-based flow control • Transport uses both feedback-based flow control and rate-based flow control • Different behavior at the network layer (i.e., congestion control) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Error Detection and Correction Error codes add structured redundancy to data so errors can be either detected, or corrected. Error correction codes (used on wireless links = high error environments): • Hamming codes » • Binary convolutional codes » • Reed-Solomon and Low-Density Parity Check codes − Mathematically complex, widely used in real systems Error detection codes (used on fiber and high quality wire): • Parity » • Checksums » • Cyclic redundancy codes » CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Definitions • Error detection or correction codes add extra redundant bits to the message so that the message could be accurately reconstructed (or detected) at the remote peer node • m data (message) bits + r check bits • Let n = m + r; n = codeword; code rate is the fraction of the codeword that contains information that is not redundant = m/n 1. Block Code • r check bits are computed solely as a function of the m data bits with which they are associated; operates on a predetermined message size and encoding boundary 2. Systematic Code • m data bits sent directly along with the check bits rather than being encoded themselves before they are sent 3. Linear Code • r check bits are computed as a linear function of the m data bits (e.g., XOR or modulo 2 addition). This means that encoding can be done with operations such as matrix multiplication or simple logic circuits. Hamming Codes, Reed-Solomon Code, Low Density Parity Check, Parity, Checksum, and CRC are all linear, systematic block codes CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Error Bounds – Hamming distance Example of bit errors: Transmitted 10001001 Received 10110001 #bit errors 3 = XOR difference and count the 1s in the result Hamming distance is the number of bit positions by which two codewords differ. − If codewords are a Hamming distance of d apart, it will require d single-bit errors to convert one to the other • Example of a universe comprising 4 valid codewords of 10 bits (m=2, r=8): − 0000000000, 0000011111, 1111100000, and 1111111111 − Hamming distance of this example is 5 • Error-detecting and error-correcting properties of a block code depend upon its Hamming Distance (d = bit error difference between two codes) Correction/Detection Bounds for a code with errors: • Correction: 2d + 1 – can correct d errors where 2d + 1 <= Hamming Distance − 2 errors in the example above; i.e., solve for 2d+1 <=5) • Detection: d + 1 – can detect d errors where d + 1 <= Hamming Distance − 4 errors in example above; i.e., solve for d + 1 <= 5 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 1 Error Correction – Hamming code Hamming code gives a simple way to add check bits and correct up to a single bit error: • Check bits are parity over subsets of the codeword − Bit positions that are powers of 2 are check bits (1, 2, 4, 8, 16,…) − Rest of bit positions are message bits − Msg bits checked by adding together parity bits for its position; e.g., 3 = 1 + 2, 5 = 1 + 4, 6 = 2 + 4, 7 = 1 + 2 + 4, 9 = 1 + 8, 10 = 2 + 8, 11 = 1 + 2 + 8, … • Recomputing the parity sums (error syndrome) gives the position of the error to flip, or 0 if there is no error Bug – should be a 0 (11, 7) Hamming code adds 4 check bits w a Hamming Distance of 3; it can correct 1 error CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 There is a Bug in example 2 Error Correction – Convolutional codes Operates on a stream of bits, keeping internal state • Output stream is a function of all preceding input bits • Bits are decoded with the Viterbi algorithm (not covered) … 0 1 1 … 1 1 1 1 0 1 XOR sums Popular NASA binary convolutional code (rate = ½; i.e., 1 input produces 2 outputs) used in 802.11 and NASA Convolutional codes also used for GSM and SatCom CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 1 Error Detection – Parity (1) Parity bit is added as the modulo 2 sum of data bits • Equivalent to XOR; this is even parity • Ex: 1110000 11100001 • Detection checks if the sum is wrong (an error) Simple way to detect an odd number of errors • Ex: 1 error, 11100101; detected, sum is wrong • Ex: 3 errors, 11011001; detected sum is wrong • Ex: 2 errors, 11101101; not detected, sum is right! • Error can also be in the parity bit itself • Random errors are detected with probability ½ CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Error Detection – Parity (2) Interleaving of N parity bits detects burst errors up to N • Each parity sum is made over non-adjacent bits • An even burst of up to N errors will not cause it to fail CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 2 Error Detection – Checksums Checksum treats data as N-bit words and adds N check bits that are the modulo 2N sum of the words • Ex: Internet 16-bit 1s complement checksum • (Restated: Sum of the msg bits divided into 16 bit words) Properties: • Checksum often placed at end of the message (IP uses a 16-bit header checksum) • Improved error detection over parity bits • Detects bursts up to N errors • Vulnerable to systematic errors, e.g., added zeros • Can be combined with parity to better detect errors – parity operates on bits, checksums on words CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 3 Error Detection – CRCs (1) More powerful than parity or checksum to find errors at the DL Layer Divides the message (frame) by a generator polynomial. Adds bits so that transmitted frame is evenly divisible by that generator polynomial. Start by adding 0s to frame and try dividing Sender & Receiver agree on generator polynomial value in + and - for advance. In this example they modulo 2 arithmetic have agreed upon x4 + x + 1 is identical to XOR Offset by any reminder to make it evenly divisible CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D.
Recommended publications
  • Solutions to Chapter 2
    CS413 Computer Networks ASN 4 Solutions Solutions to Assignment #4 3. What difference does it make to the network layer if the underlying data link layer provides a connection-oriented service versus a connectionless service? [4 marks] Solution: If the data link layer provides a connection-oriented service to the network layer, then the network layer must precede all transfer of information with a connection setup procedure (2). If the connection-oriented service includes assurances that frames of information are transferred correctly and in sequence by the data link layer, the network layer can then assume that the packets it sends to its neighbor traverse an error-free pipe. On the other hand, if the data link layer is connectionless, then each frame is sent independently through the data link, probably in unconfirmed manner (without acknowledgments or retransmissions). In this case the network layer cannot make assumptions about the sequencing or correctness of the packets it exchanges with its neighbors (2). The Ethernet local area network provides an example of connectionless transfer of data link frames. The transfer of frames using "Type 2" service in Logical Link Control (discussed in Chapter 6) provides a connection-oriented data link control example. 4. Suppose transmission channels become virtually error-free. Is the data link layer still needed? [2 marks – 1 for the answer and 1 for explanation] Solution: The data link layer is still needed(1) for framing the data and for flow control over the transmission channel. In a multiple access medium such as a LAN, the data link layer is required to coordinate access to the shared medium among the multiple users (1).
    [Show full text]
  • Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks
    ICST Transactions on Mobile Communications and Applications Research Article Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks Jun Li ∗, Mylene` Toulgoat, Yifeng Zhou, and Louise Lamont Communications Research Centre Canada, 3701 Carling Avenue, Ottawa, ON. K2H 8S2 Canada Abstract With recent developments in terrestrial wireless networks and advances in acoustic communications, multichannel technologies have been proposed to be used in underwater networks to increase data transmission rate over bandwidth-limited underwater channels. Due to high bit error rates in underwater networks, an efficient error control technique is critical in the logical link control (LLC) sublayer to establish reliable data communications over intrinsically unreliable underwater channels. In this paper, we propose a novel protocol stack architecture featuring cross-layer design of LLC sublayer and more efficient packet- to-channel scheduling for multichannel underwater sensor networks. In the proposed stack architecture, a selective-repeat automatic repeat request (SR-ARQ) based error control protocol is combined with a dynamic channel scheduling policy at the LLC sublayer. The dynamic channel scheduling policy uses the channel state information provided via cross-layer design. It is demonstrated that the proposed protocol stack architecture leads to more efficient transmission of multiple packets over parallel channels. Simulation studies are conducted to evaluate the packet delay performance of the proposed cross-layer protocol stack architecture with two different scheduling policies: the proposed dynamic channel scheduling and a static channel scheduling. Simulation results show that the dynamic channel scheduling used in the cross-layer protocol stack outperforms the static channel scheduling. It is observed that, when the dynamic channel scheduling is used, the number of parallel channels has only an insignificant impact on the average packet delay.
    [Show full text]
  • Physical Layer Overview
    ELEC3030 (EL336) Computer Networks S Chen Physical Layer Overview • Physical layer forms the basis of all networks, and we will first revisit some of fundamental limits imposed on communication media by nature Recall a medium or physical channel has finite Spectrum bandwidth and is noisy, and this imposes a limit Channel bandwidth: on information rate over the channel → This H Hz is a fundamental consideration when designing f network speed or data rate 0 H Type of medium determines network technology → compare wireless network with optic network • Transmission media can be guided or unguided, and we will have a brief review of a variety of transmission media • Communication networks can be classified as switched and broadcast networks, and we will discuss a few examples • The term “physical layer protocol” as such is not used, but we will attempt to draw some common design considerations and exams a few “physical layer standards” 13 ELEC3030 (EL336) Computer Networks S Chen Rate Limit • A medium or channel is defined by its bandwidth H (Hz) and noise level which is specified by the signal-to-noise ratio S/N (dB) • Capability of a medium is determined by a physical quantity called channel capacity, defined as C = H log2(1 + S/N) bps • Network speed is usually given as data or information rate in bps, and every one wants a higher speed network: for example, with a 10 Mbps network, you may ask yourself why not 10 Gbps? • Given data rate fd (bps), the actual transmission or baud rate fb (Hz) over the medium is often different to fd • This is for
    [Show full text]
  • Communications
    The Essentials of Datalink Communications The origins and course of Air-to-Ground Messaging The Essentials of Datalink Communications Contents international Trip Support | international Trip The Technology that HR Created 02 Inmarsat Satellite 06 Growing into an Operational Necessity 03 Iridium Satellite 07 UAS Communications Mechanisms 04 Upcoming Regulations 10 VHF Radio 05 The Future of ACARS 11 © Copyright 2016 Page 1/12 The Technology that HR Created t one time in the not-so-distant past, pilots and other ARINC’s solution was an automated system, called the A flight crew members were paid different rates for the ARINC Communications Addressing and Reporting System, time they were airborne versus the time they were performing or ACARS for short, which sent short text data from the ground operations. Events like aircraft pushback, taxi, takeoff, avionics of the aircraft directly to the ground-based entities landing, and gate arrival were transmitted via voice over radio through Very High Frequency (VHF) radio frequencies frequencies to operators who would relay this information back without any crewmember involvement. The aircraft was to the airlines. The pilots were responsible for self-reporting programmed to take advantage of switches and automation their own times and movements. Understanding that people points on the aircraft, resulting in the creation of a set of can sometimes be forgetful, or worse, willfully manipulative, messages referred to as the OOOI report. An OOOI report is the major airlines began searching for a solution that tracked any of four messages: Out, Off, On and In. Still in wide-scale crewmember pay in a more structured and accurate way.
    [Show full text]
  • Data Networks
    Second Ed ition Data Networks DIMITRI BERTSEKAS Massachusetts Institute of Technology ROBERT GALLAGER Massachusetts Institute ofTechnology PRENTICE HALL, Englewood Cliffs, New Jersey 07632 2 Node A Node B Time at B --------- Packet 0 Point-to-Point Protocols and Links 2.1 INTRODUCTION This chapter first provides an introduction to the physical communication links that constitute the building blocks of data networks. The major focus of the chapter is then data link control (i.e., the point-to-point protocols needed to control the passage of data over a communication link). Finally, a number of point-to-point protocols at the network, transport, and physical layers are discussed. There are many similarities between the point-to-point protocols at these different layers, and it is desirable to discuss them together before addressing the more complex network-wide protocols for routing, flow control, and multiaccess control. The treatment of physical links in Section 2.2 is a brief introduction to a very large topic. The reason for the brevity is not that the subject lacks importance or inherent interest, but rather, that a thorough understanding requires a background in linear system theory, random processes, and modem communication theory. In this section we pro­ vide a sufficient overview for those lacking this background and provide a review and perspective for those with more background. 37 38 Point-to-Point Protocols and Links Chap. 2 In dealing with the physical layer in Section 2.2, we discuss both the actual com­ munication channels used by the network and whatever interface modules are required at the ends of the channels to transmit and receive digital data (see Fig 2.1).
    [Show full text]
  • Telematics Chapter 3: Physical Layer
    Telematics User Server watching with video Chapter 3: Physical Layer video clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Data Link Layer Data Link Layer Data Link Layer Physical Layer Physical Layer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Computer Systems and Telematics (CST) Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Theoretical Basis for Data Communication ● Analog Data and Digital Signals ● Data Encoding ● Transmission Media ● Guided Transmission Media ● Wireless Transmission (see Mobile Communications) ● The Last Mile Problem ● Multiplexing ● Integrated Services Digital Network (ISDN) ● Digital Subscriber Line (DSL) ● Mobile Telephone System Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.3 Design Issues ● Connection parameters ● mechanical OSI Reference Model ● electric and electronic Application Layer ● functional and procedural Presentation Layer ● More detailed ● Physical transmission medium (copper cable, Session Layer optical fiber, radio, ...) ● Pin usage in network connectors Transport Layer ● Representation of raw bits (code, voltage,…) Network Layer ● Data rate ● Control of bit flow: Data Link Layer ● serial or parallel transmission of bits Physical Layer ● synchronous or asynchronous transmission ● simplex, half-duplex, or full-duplex transmission mode Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.4 Design Issues Transmitter Receiver Source Transmission System Destination NIC NIC Input Abcdef djasdja dak jd ashda kshd akjsd asdkjhasjd as kdjh askjda Univ.-Prof.
    [Show full text]
  • Application Protocol Data Unit Meaning
    Application Protocol Data Unit Meaning Oracular and self Walter ponces her prunelle amity enshrined and clubbings jauntily. Uniformed and flattering Wait often uniting some instinct up-country or allows injuriously. Pixilated and trichitic Stanleigh always strum hurtlessly and unstepping his extensity. NXP SE05x T1 Over I2C Specification NXP Semiconductors. The session layer provides the mechanism for opening closing and managing a session between end-user application processes ie a semi-permanent dialogue. Uses MAC addresses to connect devices and define permissions to leather and commit data 1. What are Layer 7 in networking? What eating the application protocols? Application Level Protocols Department of Computer Science. The present invention pertains to the convert of Protocol Data Unit PDU session. Network protocols often stay to transport large chunks of physician which are layer in. The term packet denotes an information unit whose box and tranquil is remote network-layer entity. What is application level security? What does APDU stand or Hop sound to rot the meaning of APDU The Acronym AbbreviationSlang APDU means application-layer protocol data system by. In the context of smart cards an application protocol data unit APDU is the communication unit or a bin card reader and a smart all The structure of the APDU is defined by ISOIEC 716-4 Organization. Application level security is also known target end-to-end security or message level security. PDU Protocol Data Unit Definition TechTerms. TCPIP vs OSI What's the Difference Between his Two Models. The OSI Model Cengage. As an APDU Application Protocol Data Unit which omit the communication unit advance a.
    [Show full text]
  • Radio Communications in the Digital Age
    Radio Communications In the Digital Age Volume 1 HF TECHNOLOGY Edition 2 First Edition: September 1996 Second Edition: October 2005 © Harris Corporation 2005 All rights reserved Library of Congress Catalog Card Number: 96-94476 Harris Corporation, RF Communications Division Radio Communications in the Digital Age Volume One: HF Technology, Edition 2 Printed in USA © 10/05 R.O. 10K B1006A All Harris RF Communications products and systems included herein are registered trademarks of the Harris Corporation. TABLE OF CONTENTS INTRODUCTION...............................................................................1 CHAPTER 1 PRINCIPLES OF RADIO COMMUNICATIONS .....................................6 CHAPTER 2 THE IONOSPHERE AND HF RADIO PROPAGATION..........................16 CHAPTER 3 ELEMENTS IN AN HF RADIO ..........................................................24 CHAPTER 4 NOISE AND INTERFERENCE............................................................36 CHAPTER 5 HF MODEMS .................................................................................40 CHAPTER 6 AUTOMATIC LINK ESTABLISHMENT (ALE) TECHNOLOGY...............48 CHAPTER 7 DIGITAL VOICE ..............................................................................55 CHAPTER 8 DATA SYSTEMS .............................................................................59 CHAPTER 9 SECURING COMMUNICATIONS.....................................................71 CHAPTER 10 FUTURE DIRECTIONS .....................................................................77 APPENDIX A STANDARDS
    [Show full text]
  • Data Link Layer
    Data link layer Goals: ❒ Principles behind data link layer services ❍ Error detection, correction ❍ Sharing a broadcast channel: Multiple access ❍ Link layer addressing ❍ Reliable data transfer, flow control: Done! ❒ Example link layer technology: Ethernet Link layer services Framing and link access ❍ Encapsulate datagram: Frame adds header, trailer ❍ Channel access – if shared medium ❍ Frame headers use ‘physical addresses’ = “MAC” to identify source and destination • Different from IP address! Reliable delivery (between adjacent nodes) ❍ Seldom used on low bit error links (fiber optic, co-axial cable and some twisted pairs) ❍ Sometimes used on high error rate links (e.g., wireless links) Link layer services (2.) Flow Control ❍ Pacing between sending and receiving nodes Error Detection ❍ Errors are caused by signal attenuation and noise. ❍ Receiver detects presence of errors signals sender for retrans. or drops frame Error Correction ❍ Receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex ❍ With half duplex, nodes at both ends of link can transmit, but not at same time Multiple access links / protocols Two types of “links”: ❒ Point-to-point ❍ PPP for dial-up access ❍ Point-to-point link between Ethernet switch and host ❒ Broadcast (shared wire or medium) ❍ Traditional Ethernet ❍ Upstream HFC ❍ 802.11 wireless LAN MAC protocols: Three broad classes ❒ Channel Partitioning ❍ Divide channel into smaller “pieces” (time slots, frequency) ❍ Allocate piece to node for exclusive use ❒ Random
    [Show full text]
  • Global Operational Data Link Document (GOLD)
    Global Operational Data Link Document (GOLD) This edition has been issued by the GOLD ad hoc Working Group for the Asia/Pacific Air Navigation Planning and Implementation Regional Group (APANPIRG), the North Atlantic Systems Planning Group (NAT SPG), the European Air Navigation Planning Group (EANPG), the South American Region Implementation Group (SAM/IG) and the African-Indian Ocean Planning and Implementation Regional Group (APIRG). Second Edition — 26 April 2013 International Civil Aviation Organization GOLD (1) Second Edition — 26 April 2013 This document is available by accessing any of the following ICAO regional websites. Asia and Pacific (APAC) Office http://www.icao.int/apac Eastern and Southern African (ESAF) Office www.icao.int/esaf European and North Atlantic (EUR/NAT) Office http://www.paris.icao.int Middle East (MID) Office www.icao.int/mid North American, Central American and Caribbean (NACC) Office http://www.mexico.icao.int South American (SAM) Office http://www.lima.icao.int Western and Central African (WACAF) Office http://www.icao.int/wacaf For more information, contact the ICAO regional office. Global Operational Data Link Document (GOLD) This edition has been issued by the GOLD ad hoc Working Group for the Asia/Pacific Air Navigation Planning and Implementation Regional Group (APANPIRG), the North Atlantic Systems Planning Group (NAT SPG), the European Air Navigation Planning Group (EANPG), the South American Region Implementation Group (SAM/IG) and the African-Indian Ocean Planning and Implementation Regional Group (APIRG). Second Edition — 26 April 2013 International Civil Aviation Organization GOLD (i) Second Edition — 26 April 2013 (ii) Global Operational Data Link Document (GOLD) AMENDMENTS The issue of amendments is announced by the ICAO Regional Offices concerned, which holders of this publication should consult.
    [Show full text]
  • OSI Data Link Layer
    OSI Data Link Layer Network Fundamentals – Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission on network media. Describe the different types of media access control methods. Identify several common logical network topologies and describe how the logical topology determines the media access control method for that network. Explain the purpose of encapsulating packets into frames to facilitate media access. Describe the Layer 2 frame structure and identify generic fields. Explain the role of key frame header and trailer fields including addressing, QoS, type of protocol and Frame Check Sequence. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Data Link Layer – Accessing the Media Describe the service the Data Link Layer provides as it prepares communication for transmission on specific media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Data Link Layer – Accessing the Media Describe why Data Link layer protocols are required to control media access © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4 Data Link Layer – Accessing the Media Describe the role of framing in preparing a packet for transmission on a given media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5 Data Link Layer – Accessing the Media Describe the role the Data Link layer plays in linking the software and hardware layers © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6 Data Link Layer – Accessing the Media Identify several sources for the protocols and standards used by the Data Link layer © 2007 Cisco Systems, Inc.
    [Show full text]
  • OSI Model and Network Protocols
    CHAPTER4 FOUR OSI Model and Network Protocols Objectives 1.1 Explain the function of common networking protocols . TCP . FTP . UDP . TCP/IP suite . DHCP . TFTP . DNS . HTTP(S) . ARP . SIP (VoIP) . RTP (VoIP) . SSH . POP3 . NTP . IMAP4 . Telnet . SMTP . SNMP2/3 . ICMP . IGMP . TLS 134 Chapter 4: OSI Model and Network Protocols 4.1 Explain the function of each layer of the OSI model . Layer 1 – physical . Layer 2 – data link . Layer 3 – network . Layer 4 – transport . Layer 5 – session . Layer 6 – presentation . Layer 7 – application What You Need To Know . Identify the seven layers of the OSI model. Identify the function of each layer of the OSI model. Identify the layer at which networking devices function. Identify the function of various networking protocols. Introduction One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual model, created by the International Organization for Standardization (ISO) in 1978 and revised in 1984, describes a network architecture that allows data to be passed between computer systems. This chapter looks at the OSI model and describes how it relates to real-world networking. It also examines how common network devices relate to the OSI model. Even though the OSI model is conceptual, an appreciation of its purpose and function can help you better understand how protocol suites and network architectures work in practical applications. The OSI Seven-Layer Model As shown in Figure 4.1, the OSI reference model is built, bottom to top, in the following order: physical, data link, network, transport, session, presentation, and application.
    [Show full text]