Unit-Iii Datalink Layer: Error Detection and Correction

Total Page:16

File Type:pdf, Size:1020Kb

Unit-Iii Datalink Layer: Error Detection and Correction UNIT-III DATALINK LAYER: ERROR DETECTION AND CORRECTION Error-Correcting Codes Error control in computer networks is typically achieved by error detecting using cyclic redundancy check (CRC), which is the checksum inside a frame, combined with retransmission For this purpose, systematic cyclic or polynomial generated codes are often used, which are special linear block codesSome basic concepts in error control coding are first reviewedAn n-bit frame, which consists of m-bit data and r check bits, is called a codeword. AllCode words form the codebook Hamming distance between two code words is number of bits in which two code words differ For example, 10001001 and 10110001 have a Hamming distance of 3, where is bit-wise exclusive OR (modulo 2) The minimum Hamming distance d min of a codebook is the smallest Hamming distance between any pair of code words in the codebook A codebook with dmin can detect up to dmin − 1 errors and correct up to (dmin − 1)/2 errors in each codeword. Use of a Hamming code to correct burst errors Hamming codes can only correct single errors. However, there is a trick that can be used to permit Hamming codes to correct burst errors. A sequence of k consecutive codewords is arranged as a matrix, one codeword per row. Normally, the data would be transmitted one codeword at a time, from left to right. To correct burst errors, the data should be transmitted one column at a time, starting with the leftmost column. When all k bits have been sent, the second column is sent, and so on. 2.6.2 Error-Detecting Codes Error detection is most commonly realized using a suitable hash function (or checksum algorithm). A hash function adds a fixed-length tag to a message, which enables receivers to verify the delivered message by recomputing the tag and comparing it with the one provided. There exists a vast variety of different hash function designs. However, some are of particularly widespread use because of either their simplicity or their suitability for detecting certain kinds of errors A repetition code is a coding scheme that repeats the bits across a channel to achieve error-free communication. Given a stream of data to be transmitted, the data is divided into blocks of bits. Each block is transmitted some predetermined number of times. For example, to send the bit pattern "1011", the four-bit block can be repeated three times, thus producing "1011 1011 1011". However, if this twelve-bit pattern was received as "1010 1011 1011" – where the first block is unlike the other two – it can be determined that an error has occurred. A parity bit is a bit that is added to a group of source bits to ensure that the number of set bits (i.e., bits with value 1) in the outcome is even or odd. It is a very simple scheme that can be used to detect single or any other odd number (i.e., three, five, etc.) of errors in the output. An even number of flipped bits will make the parity bit appear correct even though the data is erroneous. A checksum of a message is a modular arithmetic sum of message code words of a fixed word length (e.g., byte values). The sum may be negated by means of a ones'- complement operation prior to transmission to detect errors resulting in all-zero messages. A cyclic redundancy check (CRC) is a single-burst-error-detecting cyclic code and non- secure hash function designed to detect accidental changes to digital data in computer networks. It is not suitable for detecting maliciously introduced errors. It is characterized by specification of a so-called generator polynomial, which is used as the divisor in a polynomial long division over a finite field, taking the input data as the dividend, and where the remainder becomes the result. ELEMENTARY DATA LINK PROTOCOLS 1. Physical, data link, and network layer are independent processes that communicate by passing messages - Each layer can operate simultaneously with the other. 2. A reliable, connection-oriented service between machines is desired - Essentially, the network layers of two machines can communicate on the assumption that whatever sent is received correctly (i.e. same sequence, no duplicates, no other errors). 3. The sender always has an infinite supply of data to send - When the data link layer of the sender asks for data, the network layer always has some available. 4. Data link assumes that the entire packet from network layer is data - When the data link layer receives a network layer packet it only need add header information for communication with the receiving machine's data link layer. Communication between A and B machines physically occurs vertically through the network, data link, and physical layers but logically through the virtual connections between peer layers. Transmitting the message "Hello" from A to B network layer is illustrated in the following diagram, note the header information added to the message at each layer for communication with its peer. An Unrestricted Simplex Protocol - Protocol 1 Assumptions 1. Simplex - Communication is one direction only. 2. Reliable channel - The communication channel never introduces errors (i.e. no duplicate, no missing, or damaged frames). 3. Receiver never gets behind, it can process incoming data infinitely fast (no need for flow control). Important points of note are: 1. Independent processes - Both sender and receiver are independent processes whether running on different or the same machine. 2. Infinite execution - Both processes are assumed to start at the same time (in reality, receiver B must start before sender A to avoid missing frames sent by A), and run forever due the while(true) execution loop in each. 3. Frame - The data link layer passes frames between the physical layer. A frame contains a network layer packet. 4. Packet - The data link layer passes packets between the network layer. A packet is network layer data. The frame sent uses only an info field containing the network packet: A Simplex Stop-and-Wait Protocol - Protocol 2 The key assumptions are: 1. Simplex - Communication is one direction only. 2. Reliable channel - The communication channel never introduces errors (i.e. no duplicate, no missing, or damaged frames). 3. The most unrealistic assumption that is dropped: Receiver never gets behind, it can process incoming data infinitely fast. The main problem then is to prevent the sender from overwhelming the receiver, this is commonly known as flow control. A simple solution is to require that the sender never transmits a new frame until the receiver has confirmed it has processed the previous frame. Data is still only sent in one direction but an empty frame is transmitted by the receiver as confirmation requiring the sender to wait before sending another data frame. sender frame uses only the info field containing the network packet: receiver frame sent is empty: Improvements: 1. Flow control by requiring sender to wait for a confirmation from receiver. Problems: 1. Deadlock when either transmit or confirmation frame lost. No way to stop waiting on either sender2 or receiver2. 2. Delay while sender2 waits for confirmation, under-utilizing the channel. A Simplex Protocol for a Noisy Channel - Protocol 3 The assumption is: Simplex - Data communication is one direction only. The assumption dropped: Reliable channel - The communication channel never introduces errors (i.e. no duplicate, no missing, or damaged frames). Deadlock was possible in Protocol 2 over an unreliable channel where lost frames can occur. Protocol 3 does not deadlock in the face of errors but does still force the sender to wait until a confirmation arrives. There are two essential implications: 1. After a fixed wait the sender will timeout and retransmit the data. This avoids deadlock when frames are lost. 2. Each frame sent is numbered 0 or 1 and a new data frame is not sent until the previous frame is confirmed. This prevents lost or out of sequence data frames. Sender frame - The seq and info field are used : Receiver frame - The ack field is used : Improvements: 1. No deadlock due to the use of a timer on the sender. If the sender does not receive a confirmation within the allocated time, the same frame is resent. 2. No duplicates due to the use of sequence numbers (0 and 1). If the sender receives a confirmation to a frame sequence number different than the most recently transmitted, the same frame is resent. Using a binary sequence number allows only one outstanding frame at a time. Problems: 1. With only one outstanding frame, the utilization of the channel is not optimal (below 100%). 2. Timeout should be longer than the round trip time (the time a frame travels to the receiver and a confirmation returns). Otherwise, time wasted sending duplicate messages unnecessarily. 2.8 SLIDING WINDOW PROTOCOLS The main problem addressed by sliding window protocols is the poor channel utilization due to the need of the sender to await confirmation to the one outstanding frame before another can be transmitted. The solution is to have several frames outstanding at a time rather than only one, the optimum number dependent upon the round trip time for the frame to travel from the sender and its acknowledgement to return. For example, if the full round trip time was 10 seconds and only a single frame was outstanding at a time, the wait would be 10 seconds for the acknowledgement to fully arrive, utilization would be only 10% for a frame of one second duration. With multiple outstanding frames and acknowledgments, for one second long frames the channel could hold 5 one second long frames from the sender and 5 acknowledgments coming back to completely fill the channel, utilization would be 100%.
Recommended publications
  • Gigabit Ethernet - CH 3 - Ethernet, Fast Ethernet, and Gigabit Ethern
    Switched, Fast, and Gigabit Ethernet - CH 3 - Ethernet, Fast Ethernet, and Gigabit Ethern.. Page 1 of 36 [Figures are not included in this sample chapter] Switched, Fast, and Gigabit Ethernet - 3 - Ethernet, Fast Ethernet, and Gigabit Ethernet Standards This chapter discusses the theory and standards of the three versions of Ethernet around today: regular 10Mbps Ethernet, 100Mbps Fast Ethernet, and 1000Mbps Gigabit Ethernet. The goal of this chapter is to educate you as a LAN manager or IT professional about essential differences between shared 10Mbps Ethernet and these newer technologies. This chapter focuses on aspects of Fast Ethernet and Gigabit Ethernet that are relevant to you and doesn’t get into too much technical detail. Read this chapter and the following two (Chapter 4, "Layer 2 Ethernet Switching," and Chapter 5, "VLANs and Layer 3 Switching") together. This chapter focuses on the different Ethernet MAC and PHY standards, as well as repeaters, also known as hubs. Chapter 4 examines Ethernet bridging, also known as Layer 2 switching. Chapter 5 discusses VLANs, some basics of routing, and Layer 3 switching. These three chapters serve as a precursor to the second half of this book, namely the hands-on implementation in Chapters 8 through 12. After you understand the key differences between yesterday’s shared Ethernet and today’s Switched, Fast, and Gigabit Ethernet, evaluating products and building a network with these products should be relatively straightforward. The chapter is split into seven sections: l "Ethernet and the OSI Reference Model" discusses the OSI Reference Model and how Ethernet relates to the physical (PHY) and Media Access Control (MAC) layers of the OSI model.
    [Show full text]
  • Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications
    tv '2s.\--qq T! Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications Theodore V. Buot B.S.Eng (Electro&Comm), M.Eng (Telecomm) Thesis submitted for the degree of Doctor of Philosophy 1n The University of Adelaide Faculty of Engineering Department of Electrical and Electronic Engineering August 1997 Contents Abstract IY Declaration Y Acknowledgments YI List of Publications Yrt List of Abbreviations Ylu Symbols and Notations xi Preface xtv L.Introduction 1 Background, Problems and Trends in Personal Communications and description of this work 2. Literature Review t2 2.1 ALOHA and Random Access Protocols I4 2.1.1 Improvements of the ALOHA Protocol 15 2.1.2 Other RMA Algorithms t6 2.1.3 Random Access Protocols with Channel Sensing 16 2.1.4 Spread Spectrum Multiple Access I7 2.2Fixed Assignment and DAMA Protocols 18 2.3 Protocols for Future Wireless Communications I9 2.3.1 Packet Voice Communications t9 2.3.2Reservation based Protocols for Packet Switching 20 2.3.3 Voice and Data Integration in TDMA Systems 23 3. Teletraffic Source Models for R-TDMA 25 3.1 Arrival Process 26 3.2 Message Length Distribution 29 3.3 Smoothing Effect of Buffered Users 30 3.4 Speech Packet Generation 32 3.4.1 Model for Fast SAD with Hangover 35 3.4.2Bffect of Hangover to the Speech Quality 38 3.5 Video Traffic Models 40 3.5.1 Infinite State Markovian Video Source Model 41 3.5.2 AutoRegressive Video Source Model 43 3.5.3 VBR Source with Channel Load Feedback 43 3.6 Summary 46 4.
    [Show full text]
  • 2009 IEEE 70Th Vehicular Technology Conference Fall
    2009 IEEE 70th Vehicular Technology Conference Fall (VTC 2009-Fall) Anchorage, Alaska, USA 20 – 23 September 2009 Pages 1-485 IEEE Catalog Number: CFP09VTF-PRT ISBN: 978-1-4244-2514-3 TABLE OF CONTENTS PORTABLE 2009 OPENING KEYNOTE SELF-ORGANIZING NETWORKS IN 3GPP LTE..........................................................................................................1 Seppo Hämäläinen 22W: ELECTRICAL DESIGN II NONINVASIVE CONTINUOUS BLOOD PRESSURE MEASUREMENT AND GPS POSITION MONITORING OF PATIENTS ..........................................................................................................................................3 Ondrej Krejcar, Zdenek Slanina, Jan Stambachr, Petr Silber And Robert Frischer NUMERICAL INVESTIGATION OF ALGORITHMS FOR MULTI-ANTENNA RADIOLOCATION ..............................................................................................................................................................8 Danko Antolovic WBAN MEETS WBAN: SMART MOBILE SPACE OVER WIRELESS BODY AREA NETWORKS.................... 13 Dae-Young Kim And Jinsung Cho AN ALGORITHM FOR SIMULTANEOUS RADIOLOCATION OF MULTIPLE SOURCES................................. 18 Danko Antolovic 2W: PHYSICAL DESIGN MICRO AND NANO ELECTRO MECHANICAL SYSTEMS (MEMS/NEMS) FOR MOBILE COMPUTING SYSTEMS .................................................................................................................................................. 23 M. Abdelmoneum, D. Browning, T. Arabi And Waleed Khalil BATTERY-SENSING INTRUSION PROTECTION SYSTEM
    [Show full text]
  • Ethernet and Wifi
    Ethernet and WiFi hp://xkcd.com/466/ CSCI 466: Networks • Keith Vertanen • Fall 2011 Overview • Mul?ple access networks – Ethernet • Long history • Dominant wired technology – 802.11 • Dominant wireless technology 2 Classic Ethernet • Ethernet – luminferous ether through which electromagne?c radiaon once thought to propagate – Carrier Sense, Mul?ple Access with Collision Detec?on (CSMA/CD) – IEEE 802.3 Robert Metcalfe, co- inventor of Ethernet 3 Classic Ethernet • Ethernet – Xerox Ethernet standardized as IEEE 802.3 in 1983 – Xerox not interested in commercializing – Metcalfe leaves and forms 3Com 4 Ethernet connec?vity • Shared medium – All hosts hear all traffic on cable – Hosts tapped the cable – 2500m maximum length – May include repeaters amplifying signal – 10 Mbps bandwidth 5 Classic Ethernet cabling Cable aSer being "vampire" tapped. Thick Ethernet cable (yellow), 10BASE-5 transceivers, cable tapping tool (orange), 500m maximum length. Thin Ethernet cable (10BASE2) with BNC T- connector, 185m maximum length. 6 Ethernet addressing • Media Access Control address (MAC) – 48-bit globally unique address • 281,474,976,710,656 possible addresses • Should last ?ll 2100 • e.g. 01:23:45:67:89:ab – Address of all 1's is broadcast • FF:FF:FF:FF:FF:FF 7 Ethernet frame format • Frame format – Manchester encoded – Preamble products 10-Mhz square wave • Allows clock synch between sender & receiver – Pad to at least 64-bytes (collision detec?on) Ethernet 802.3 AlternaWng 0's 48-bit MAC and 1's (except addresses SoF of 11) 8 Ethernet receivers • Hosts listens to medium – Deliver to host: • Any frame with host's MAC address • All broadcast frames (all 1's) • Mul?cast frames (if subscribed to) • Or all frames if in promiscuous mode 9 MAC sublayer • Media Access Control (MAC) sublayer – Who goes next on a shared medium – Ethernet hosts can sense if medium in use – Algorithm for sending data: 1.
    [Show full text]
  • Ethernet by T.S.R.K
    L8 – Ethernet by T.S.R.K. Prasad EA C451 Internetworking Technologies 02/02/2013 References / Acknowledgements Sec 4.3, 4.8: Computer Networks, Andrew Tanenbaum Sec 5.4 – 5.6: [Kurose] Sec 2.6: [Peterson] References EA C451 INET TECH Optional Readings [Shenker-ETH] Scott Shenker, L18- Ethernet, EE122, Fall 2012, Dept of EECS, University of California, Berkeley. http://inst.eecs.berkeley.edu/~ee122/ [Kurose] Chapter 5: The Link Layer and Local Area Networks, Computer Networking, Kurose & Ross Optional Readings EA C451 INET TECH Optional Readings [Tanenbaum] Chapters 3: Data Link Layer and Chapter 4: MAC Sublayer, Computer Networks, Andrew Tanenbaum, 4th Edition. [Peterson] Chapter 2: Getting Connected, Computer Networks, Peterson & Davie. IEEE 802 Project Look Ma – NO RFCs!!! Optional Readings EA C451 INET TECH Self-Study Topics Spanning tree protocol Self-Study EA C451 INET TECH IEEE 802 Project Network Layer Network LLC 802.2 Layer Logical Link Control (LLC) Data Link 802.3 MAC CSMA/CD 802.11a 802.11b 802.11g 802.15 802.16 Layer Ethernet Wireless LAN / Wi-Fi Bluetooth WiMax Physical QAM / Manchester OFDM HR-DSSS OFDM FHSS Physical Layer QPSK IEEE Standard OSI Model Note: This is not the complete model; IEEE 802 standard has 20 sub-committees formulating the details of the Data link layer standards. IEEE 802 Project EA C451 INET TECH You Said It If something comes along to replace Ethernet, it will be called “Ethernet”, so therefore Ethernet will never die. - Attributed to Bob Metcalfe by Ken Thompson You Said It EA C451 INET TECH Presentation Overview Conclusion Deployment Scenarios Gigabit Ethernet Classic Ethernet Introduction Lecture Outline EA C451 INET TECH Presentation Overview Conclusion Deployment Scenarios Gigabit Ethernet Classic Ethernet Introduction Lecture Outline EA C451 INET TECH Ethernet “dominant” wired LAN technology: • cheap Rs.
    [Show full text]
  • Etsi Tr 102 862 V1.1.1 (2011-12)
    ETSI TR 102 862 V1.1.1 (2011-12) Technical Report Intelligent Transport Systems (ITS); Performance Evaluation of Self-Organizing TDMA as Medium Access Control Method Applied to ITS; Access Layer Part 2 ETSI TR 102 862 V1.1.1 (2011-12) Reference DTR/ITS-0040021 Keywords ITS, MAC, TDMA ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Self-Stabilizing TDMA Algorithms for Wireless Ad-Hoc Networks Without External Reference
    2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET) Self-stabilizing TDMA Algorithms for Wireless Ad-hoc Networks without External Reference (Extended Abstract) Thomas Petig, Elad M. Schiller, Philippas Tsigas {petig, elad, tsigas}@chalmers.se Department of Computer Science and Engineering Chalmers University of Technology, Sweden Abstract—Time division multiple access (TDMA) is a method needed MAC protocol properties, using limited radio and clock for sharing communication media. In wireless communications, settings, i.e., no external reference for collision detection, time TDMA algorithms often divide the radio time into timeslots of or position. Note that ad hoc networks often do not consider uniform size, ξ, and then combine them into frames of uniform size, τ. We consider TDMA algorithms that allocate at least collision detection mechanisms, and external references are one timeslot in every frame to every node. Given a maximal subject to signal loss. For these settings, we demonstrate node degree, δ, and no access to external references for collision that there is no solution for the studied problem when the detection, time or position, we consider the problem of collision- frame size is τ<max{2δ, χ2}, where δ is the maximal free self-stabilizing TDMA algorithms that use constant frame node degree, and χ2 is the chromatic number for distance-2 size. We demonstrate that this problem has no solution when vertex coloring. The main result is the existence of collision- the frame size is τ<max{2δ, χ2}, where χ2 is the chromatic free self-stabilizing TDMA algorithms that use constant frame number for distance-2 vertex coloring.
    [Show full text]
  • Network Architectures
    Dr. Beinschróth József Telecommunication informatics I. Part 4 ÓE-KVK Budapest, 2019. Dr. Beinschróth József: Telecommunication informatics I. Content Network architectures: collection of recommendations The Physical Layer: transporting bits The Data Link Layer: Logical Link Control and Media Access Control Examles for technologies based on the Data Link Layer The Network Layer 1: functions and protocols The Network Layer 2: routing Examle for technology based on the Network Layer The Transport Layer The Application Layer Criptography IPSec, VPN and border protection QoS and multimedia Additional chapters Dr. Beinschróth József: Telecommunication informatics I. 2 The content of this chapter Wired LAN-s Wireless LAN-s Bluetooth PLC, BPL (Power Line Communication, Broadband over Power Lines) DOCSIS Dr. Beinschróth József: Telecommunication informatics I. 3 The LAN (Local Area Network) architecture covers the first two layer of the model The LAN technology is very widespread Covers the first two layer of the model, The data link layer plays a decisive role in the LAN architecture. Wired LAN-s Dr. Beinschróth József: Telecommunication informatics I. 4 The LAN is implemented in buildings or buildings close to each other (1) Located within a relatively small range of intelligent devices: the physical dimension limit: max. a few km, the transmission time is known in advance (micro, nanosecond scale delays). Typically is implemented in buildings, buildings close to each other, companies, institutions. The data transfer is implemented in a communication channel (does not use connected or leased telephone or data networks) Typically private network - work with one owner and administrative management. Destination: computers, printers and other shared resources sharing, messaging.
    [Show full text]
  • Industrial Ethernet
    Industrial Ethernet ... from the Office to the Machine - world wide - Band I Ronald Dietrich Industrial Ethernet ... from the Office to the machine - world wide - HARTING The best connections worldwide – because quality connects. HARTING was founded in 1945 by the family that still retains sole ownership of the company. HARTING presently employs more than 2 000 people including 150 highly qualified engineers and over 100 sales engineers who take care of the daily needs of our customers. Today, HARTING is the leading manufacturer of connectors with 34 subsidiary companies in Europe, America and Asia. As the market leader, HARTING offers the advantage of ‘just in time’ services. It is therefore no wonder that the company maintains close business relationships with all of its important customers active in the world market. HARTING is the market leader in several of its product sectors. HARTING can draw on many years of extensive experience gained in achieving high degrees of protection in industrial environments (IP 65 and higher), all of which has flowed into expanding its product portfolio as well as the development of its family of devices for industrial communication. HARTING products are manufactured utilizing cutting edge and efficient productions methods. CAD systems support research and development as well as tool making activities. We abide by our philosophy of quality, which states that only fully automatic manufacturing processes can achieve a zero error rate. In accordance with DIN EN ISO 9001, the organisation and procedures constituting our quality assurance measures are documented in a quality assurance manual. HARTING employs approximately 60 members of staff in quality assurance.
    [Show full text]
  • Time Sensitive Ethernet the Future for Industrial Control System Networks a Whitepaper
    Time Sensitive Ethernet The future for industrial control system networks A Whitepaper Call: +44 345 222 1711 / +353 1 210 1711 Email: [email protected] Visit: bsigroup.com Introduction Local Area Networks (LAN) are extremely important in the fully interconnected world we live in nowadays, acting as the backbone that enable the interaction between IT elements. They are also used to link local IT systems with the Wide Area Network (Internet). In the industrial world, LANs are even more critical, fulfilling real-time communication requirements to the interaction of the different elements present in SCADA (Supervisory Control and Data Acquisition). This paper will focus on the new enhancements of the most widespread LAN: ETHERNET, and how they allow the standard to achieve a prominent position in the industrial world. Local Area Networks (LANs), OT Architecture Review Ethernet LANs IT and OT Ethernet is, by far, the most used Local Area Network used Before introducing the Automation Pyramid in section 1.3, in IT systems all over the world. It is an open, manufacturer this section provides a brief comparison for the IT and OT independent technology, driven by the Standard IEEE 802.3 concepts. (part of the ISO standard organization) that has found wide The world of traditional Information Technology (IT) acceptance by network hardware manufacturers. has split over the years into several categories. In the “Ethernet refers to the family of LAN products covered by the IEEE case of Information Technology applied to supporting 802.3 standard that defines the carrier sense multiple access manufacturing processes and control systems the collision detect (CSMA/CD) protocol.
    [Show full text]
  • Medium Access Control These Slides Are Created by Dr
    Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable copy and print a single copy of each slide for their own reference, so long as each slide contains the copyright statement, and GMU facilities are not used to produce paper copies. Permission for any other use, either in machine- readable or printed form, must be obtained from the author in writing. CS 455 1 Preface In our earlier discussion about DLL, we assumed that a link is associated with two nodes. When a link/medium is shared among many nodes, we need to resolve the conflicts of multiple nodes transmitting at the same time. This issue is addressed by a sublayer within the DLL: the medium access control (MAC) sublayer. CS 455 2 1 Two Approaches of MAC Compete for the medium – ALOHA – Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Wait for Your Turn – Token Passing Ring – Token Passing Bus – FDDI CS 455 3 Carrier Sense Multiple Access (CSMA) Station listens to channel for ongoing transmissions. If so, the station waits until the channel is idle. When the channel is idle, the frame is transmitted. Collisions may still occur. How ? 1 2 If a collision occurs, the station waits random amount of time and retransmits. The longer the propagation delay, the longer the window of collisions and the worse the performance. CS 455 4 2 Collision Detection During a transmission, the station also listens to the channel and, if it detects collisions, it immediately aborts the transmission with a jamming signal.
    [Show full text]
  • Data Link Layer
    Data Link Layer Sublayers: • Sublayers of the data link layer o Logical link control sublayer o Media access control sublayer Data link layer services: • Encapsulation of network layer data packets into frames • Frame synchronization- Done by Media Access Control sublayer • Logical link control (LLC) sublayer: o Error control (automatic repeat request, ARQ) o Flow control • Media access control (MAC) sublayer: o Multiple access protocols for channel-access control, for example CSMA/CD protocols for collision detection and re-transmission in Ethernet bus networks and hub networks, or the CSMA/CA protocol for collision avoidance in wireless networks. o Physical addressing (MAC addressing) o LAN switching (packet switching) including MAC filtering and spanning tree protocol o Data packet queuing or scheduling o Store-and-forward switching or cut-through switching o Quality of Service (QoS) control o Virtual LANs (VLAN) The uppermost sublayer, LLC, multiplexes protocols running atop the data link layer, and optionally provides flow control, acknowledgment, and error notification. More about MAC Sublayer: 1. The Media Access Control sublayer also determines where one frame of data ends and the next one starts – frame synchronization. There are four means of frame synchronization: time based, character counting, byte stuffing and bit stuffing. 2. The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. 3. Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station.
    [Show full text]