SlideShare a Scribd company logo
1 of 51
Fundamentals of Business Data
      Communications
                11th Edition

Alan Dennis & Alexandra Durcikova

         John Wiley & Sons, Inc


         Dwayne Whitten, D.B.A
         Mays Business School
         Texas A&M University
          Copyright 2011 John Wiley & Sons, Inc   4-1
Chapter 4
Data Link Layer



  Copyright 2011 John Wiley & Sons, Inc   4-2
Chapter 4 Outline
4.1 - Introduction
4.2 - Media Access Control
   – Contention, Controlled Access, Relative Performance
4.3 - Error Control
   – Sources of Errors, Error Prevention, Error Detection, Error
     Correction via Retransmission, Forward Error Correction
4.4 - Data Link Protocols
   – Asynchronous Transmission, Synchronous Transmission
4.5 - Transmission Efficiency
4.6 – Implications for Management




                      Copyright 2011 John Wiley & Sons, Inc        4-3
4.1 Introduction
• Responsible for moving messages          Network Layer
  from one device to another
                                          Data Link Layer
• Controls the way messages are
  sent on media                             Physical Layer
• Organizes physical layer bit streams
  into coherent messages for the network layer
• Major functions of a data link layer protocol
   – Media Access Control
      • Controlling when computers transmit
   – Error Control
      • Detecting and correcting transmission errors
   – Message Delineation
      • Identifying the beginning and end of a message
                 Copyright 2011 John Wiley & Sons, Inc   4-4
4.2 Media Access Control (MAC)
• Controlling when and what computer transmit
  – Important when more than one computer wants to send
    data at the same time over the same, shared circuit
     • Point-to-point half duplex links
         – computers take turns
     • Multipoint configurations
         – Ensure that no two computers attempt
           to transmit data at the same time
• Two possible approaches
  – Contention based access
  – Controlled access


                Copyright 2011 John Wiley & Sons, Inc   4-5
Contention
• Transmit whenever the circuit is free
• Collisions
  – Occur when more than one computer
    transmits at the same time
  – Need to determine which computer is allowed
    to transmit first after the collision
• Used commonly in Ethernet LANs
• Can be problematic in heavy usage
  networks

               Copyright 2011 John Wiley & Sons, Inc   4-6
Controlled Access
• Controlling access to shared resources
  – Acts like a stop light
• Commonly used by mainframes (or its
  front end processor)
  – Determines which circuits have access to
    mainframe at a given time
• Also used by some LAN protocols
  – Token ring, FDDI
• Major controlled access methods
  – Access request and polling
               Copyright 2011 John Wiley & Sons, Inc   4-7
Access Request
• Clients wanting to transmit data first send
  a request to the device controlling the
  circuit
• The central device will grant permission
  for one device at a time to transmit




             Copyright 2011 John Wiley & Sons, Inc   4-8
Polling
• Process of transmitting to a client only if asked
  and/or permitted
   – Client stores the information to be transmitted
   – Server (periodically) polls the client if it has data to send
   – Client, if it has any, sends the data
   – If no data to send, client responds negatively, and
     server asks the next client
• Types of polling
   – Roll call polling
   – Hub polling (also called token passing)



                  Copyright 2011 John Wiley & Sons, Inc        4-9
Roll Call Polling
•   Check each client (consecutively and periodically) to see if it
    wants to transmit : A, B, C, D, E, A, B, …
•   Clients can also be prioritized so that they are polled more
    frequently:                   A, B, A, C, A, D, A, E, A, B, ..
•   Involves waiting: Poll and wait
    for a response
•   Needs a timer to prevent lock-
    up (by client not answering)




                     Copyright 2011 John Wiley & Sons, Inc      4 - 10
Hub Polling (Token Passing)
• One computer starts the poll:
    • sends message (if any) then
    • passes the token to the next computer
    • token is a unique series of bits
• Continues in sequence until the
  token reaches the first computer,
  which starts the polling cycle all
  over again



                  Copyright 2011 John Wiley & Sons, Inc   4 - 11
Relative Performance
Depends on network conditions                          When volume
                                                       is high,
                                                       performance
          Work better for                              deteriorates
          networks with high                           (too many
          traffic volumes                              collisions)




                                   Cross-over
                                                      Network more
                                   point: About
                                                      efficiently used
           Work better for              20
           smaller networks         computers
           with low usage


              Copyright 2011 John Wiley & Sons, Inc            4 - 12
4.3 - Error Control
• Handling of network errors caused by problems
  in transmission
  – Network errors
     • Can be a bit value change during transmission
     • Controlled by network hardware and software
  – Human errors:
     • Can be a mistake in typing a number
     • Controlled by application programs
• Categories of Network Errors
  – Corrupted (data that has been changed)
  – Lost data (cannot find the data at all)

                 Copyright 2011 John Wiley & Sons, Inc   4 - 13
Error Control (Cont.)
• Error Rate
  – 1 bit error in n bits transmitted, e.g., 1 in
    500,000
• Burst error (more common)
  – Many bits are corrupted at the same time
  – Errors not uniformly distributed
     • e.g., 100 in 50,000,000  1 in 500,000




                Copyright 2011 John Wiley & Sons, Inc   4 - 14
Sources of Errors
• Line noise and distortion – major cause
  – More likely on electrical media
  – Undesirable electrical signal
  – Introduced by equipment and natural
    disturbances
  – Degrades performance of a circuit
  – Manifestation
     • Extra bits
     • “Flipped” bits
     • Missing bits

              Copyright 2011 John Wiley & Sons, Inc   4 - 15
Major Functions of Error Control
• Error prevention
• Error detection
• Error correction




             Copyright 2011 John Wiley & Sons, Inc   4 - 16
Sources of Errors and Prevention
Source of error             Cause                             Prevention
White noise                 Movement of electrons             Increase signal strength
                            (thermal energy)                  (increase SNR)
Impulse noise               Sudden increases in               Shield or move the wires
                            electricity
                            (e.g., lightning, power surges)
Cross-talk                  Multiplexer guard bands are       Increase the guard bands, or
                            too small or wires too close      move or shield the wires
                            together


Echo                        Poor connections (causing         Fix the connections, or
                            signal to be reflected back to    tune equipment
                            the source)
Attenuation                 Gradual decrease in signal        Use repeaters or amplifiers
                            over distance (weakening of a
                            signal)
Intermodulation noise       Signals from several circuits     Move or shield the wires
                            combine



                        Copyright 2011 John Wiley & Sons, Inc                            4 - 17
Error Detection
Sender calculates an
                                                   Receiver recalculates
Error Detection Value
                                                   EDV and checks it
(EDV) and transmits
                                                   against the received EDV
it along with data

          Mathematical                                 Mathematical
           calculations                                 calculations
                                                                 ?
                                                                 =
        Data to be       EDV
        transmitted
                                                       – If the same  No
                                                         errors in transmission
                 Larger the size, better
                 error detection (but                  – If different  Error(s)
                 lower efficiency)                       in transmission

                      Copyright 2011 John Wiley & Sons, Inc             4 - 18
Error Detection Techniques
• Parity checks
• Checksum
• Cyclic Redundancy Check (CRC)




             Copyright 2011 John Wiley & Sons, Inc   4 - 19
Parity Checking
• One of the oldest and simplest
• A single bit added to each character
   – Even parity: number of 1’s remains even
   – Odd parity: number of 1’s remains odd
• Receiving end recalculates parity bit
   – If one bit has been transmitted in error the received
     parity bit will differ from the recalculated one
• Simple, but doesn’t catch all errors
   – If two (or an even number of) bits have been transmitted
     in error at the same time, the parity check appears to be
     correct
   – Detects about 50% of errors

                  Copyright 2011 John Wiley & Sons, Inc      4 - 20
Examples of Using Parity
To be sent: Letter V in 7-bit ASCII: 0110101


 EVEN parity       sender                                 receiver
 Add a bit so that the            01101010
 number of all
 transmitted 1’s is
                                            parity
 EVEN



  ODD parity       sender                                 receiver
Add a bit so that the              01101011
number of all transmitted
1’s is ODD                                      parity
                  Copyright 2011 John Wiley & Sons, Inc          4 - 21
Checksum
• A checksum (usually 1 byte) is added to the end
  of the message
• It is 95% effective


• Method:
   •   Add decimal values of each character in the message
   •   Divide the sum by 255
   •   The remainder is the checksum value




                  Copyright 2011 John Wiley & Sons, Inc   4 - 22
Cyclic Redundancy Check (CRC)
                                                                Example:
                                                                P = 58
               P/G=Q+R/G                                        G=8
                                                                Q=7
                                                                R =2
Message                   Quotient           Remainder:
(treated as               (whole              –added to the
one long                  number)              message as EDV
binary      A fixed number                    –could be 8 bits, 16
number)     (determines the                    bits, 24 bits, or 32
            length of the R)                   bits long
                                              –CRC16 has R of 16
                                               bits
– Most powerful and most common
– Detects 100% of errors (if number of errors <= size of R)
   –Otherwise: CRC-16 (99.998%) and CRC-32 (99.9999%)

                Copyright 2011 John Wiley & Sons, Inc           4 - 23
Error Correction
• Once detected, the error must be corrected
• Error correction techniques
   – Retransmission (or, backward error correction)
      • Simplest, most effective, least expensive, most
        commonly used
      • Corrected by retransmission of the data
          – Receiver, when detecting an error, asks the sender to
            retransmit the message
      • Often called Automatic Repeat reQuest (ARQ)
   – Forward Error Correction
      • Receiving device can correct incoming messages
        without retransmission
                 Copyright 2011 John Wiley & Sons, Inc        4 - 24
Automatic Repeat reQuest (ARQ)
• Process of requesting a data transmission be
  resent
• Main ARQ protocols
   – Stop and Wait ARQ (A half duplex technique)
      • Sender sends a message and waits for
        acknowledgment, then sends the next message
      • Receiver receives the message and sends an
        acknowledgement, then waits for the next message
   – Continuous ARQ (A full duplex technique)
      • Sender continues sending packets without waiting
        for the receiver to acknowledge
      • Receiver continues receiving messages without
        acknowledging them right away

                Copyright 2011 John Wiley & Sons, Inc   4 - 25
Stop and Wait ARQ
                 Sender                                           Receiver
Sends Packet A, then
waits to hear from
receiver.
                                                                               Sends
                                                                      acknowledgement

Sends the next
packet (B)


                                                                        Sends negative
                                                                      acknowledgement

Resends the packet
again

                                                                               Sends
                                                                      acknowledgement

                          Copyright 2011 John Wiley & Sons, Inc              4 - 26
Continuous ARQ
  Sender sends packets
   continuously without
  waiting for receiver to
           acknowledge


          Notice that
   acknowledgments
    now identify the
        packet being
     acknowledged.

  Receiver sends back
   a NAK for a specific
   packet to be resent.

              Copyright 2011 John Wiley & Sons, Inc   4 - 27
Flow Control with ARQ
• Ensuring that sender is not transmitting
  too quickly for the receiver
  – Stop-and-wait ARQ
     • Receiver sends an ACK or NAK when it is
       ready to receive more packets
  – Continuous ARQ:
     • Both sides agree on the size of the “sliding
       window”
        – Number of messages that can be handled by the
          receiver without causing significant delays


              Copyright 2011 John Wiley & Sons, Inc   4 - 28
Flow Control Example
window size =4           sender                             receiver
                                     ...3 2 1 0
          0123456789
                                                   ACK 0...
          (slide window)
                                    ...4
         0123456789
                                                   ACK 4...
            (slide window)
                                   …8 7 6 5
         0123456789
                                                  ACK 7..     set
             (slide window)                                   window
                                    ..9                       size to 2
         0123456789
                 (timeout)
                                    ...9 8
         0123456789
                    Copyright 2011 John Wiley & Sons, Inc              4 - 29
Forward Error Correction (FEC)
• Receiving device can correct incoming messages
  itself (without retransmission)
• Requires extra corrective information
   – Sent along with the data
   – Allows data to be checked and corrected by the receiver
   – Amount of extra information: usually 50-100% of the
     data
• Used in the following situations:
   – One way transmissions (retransmission not possible)
   – Transmission times are very long (satellite)
   – In this situation, relatively insignificant cost of FEC


                  Copyright 2011 John Wiley & Sons, Inc        4 - 30
Hamming Code – An FEC Example




Each data bit figures
into three EVEN
parity bit calculations
If any one bit (parity                                            Only
or data) changes                                                 works for
change in data bit                                                one bit
can be detected and                                               errors
corrected

                          Copyright 2011 John Wiley & Sons, Inc     4 - 31
Hamming Example



   P1      P2       D3            P4            D5         D6     D7
   0       1        1             0             0          1      1




   Assuming even parity and given the data bits 1, 0, 1, 1
   What are the parity bits? 0, 1, 0
                   Copyright 2011 John Wiley & Sons, Inc        4 - 32
4.4 Data Link Protocols
• Classification
  – Asynchronous transmission
  – Synchronous transmission
• Differ by
  – Message delineation
                                frame k-1        frame k   frame k+1
  – Frame length
  – Frame field structure




              Copyright 2011 John Wiley & Sons, Inc          4 - 33
Asynchronous Transmission
   Start bit
used by the      Each character is sent
receiver for     independently
 separating                                             Stop bits sent
 characters                                             between
    and for                                             transmissions
     synch.                                             (a series of
                                                        stop bits)




                Copyright 2011 John Wiley & Sons, Inc      4 - 34
Asynchronous File Transfer
• Used on
   – Point-to-point asynchronous circuits
   – Typically over phone lines via modem
   – Computer to computer for transfer of data files
• Sometimes called Start/Stop Transmission
• Characteristics of file transfer protocols
   – Designed to transmit error-free data
   – Group data into blocks to be transmitted (rather sending
     character by character)
• Popular File transfer Protocols
   – Xmodem, Zmodem, and Kermit
                 Copyright 2011 John Wiley & Sons, Inc   4 - 35
File Transfer Protocols
Xmodem:      • One of the oldest async file transfer protocol
             • Uses stop-and-wait ARQ.

Xmodem-CRC:
          •uses 1 byte CRC (instead of checksum)
Xmodem-1K:
          •Xmodem-CRC + 1024 byte long message field
Zmodem:
          • Uses CRC-32 with continuous ARQ
          • Dynamic adjustment of packet size




              Copyright 2011 John Wiley & Sons, Inc      4 - 36
Synchronous Transmission
• Data sent in a large block
   – Called a frame or packet
   – Typically about a thousand characters (bytes) long
• Includes addressing information
   – Especially useful in multipoint circuits
• Includes a series of synchronization (SYN)
  characters
   – Used to help the receiver recognize incoming data
• Synchronous transmission protocols categories
   – Bit-oriented protocols: SDLC, HDLC
   – Byte-count protocols: Ethernet
   – Byte-oriented protocols: PPP
                  Copyright 2011 John Wiley & Sons, Inc   4 - 37
SDLC –         Synchronous Data Link Control
             • Bit-oriented protocol developed by IBM
             • Uses a controlled media access protocol
Beginning                                                            Ending
(01111110)                                                         (01111110)

                                      data                     CRC-32




Destination      Identifies frame type;
Address (8        • Information (for transferring of user data)
or 16 bits)       • Supervisory (for error and flow control)

                       Copyright 2011 John Wiley & Sons, Inc        4 - 38
Transparency Problem of SDLC
• Problem: Transparency
   – User data may contain the same bit pattern as the flags
     (01111110)
   – Receiver may interpret it as the end of the frame and
     ignores the rest
• Solution: Bit stuffing (aka, zero insertion)
   – Sender inserts 0 anytime it detects 11111 (five 1’s)
   – If receiver sees five 1's, checks next bit(s)
      • if 0, remove it (stuffed bit)
      • if 10, end of frame marker (01111110)
      • if 11, error (7 1's cannot be in data)
   – Works but increases complexity

                  Copyright 2011 John Wiley & Sons, Inc     4 - 39
HDLC –        High-Level Data Link Control

• Formal standard developed by ISO
• Same as SDLC, except
   – Longer address and control fields
   – Larger sliding window size
   – And more
• Basis for many other Data Link Layer protocols
   – LAP-B (Link Access Protocol – Balanced)
      • Used by X.25 technology
   – LAP-D (Link Access Protocol – Balanced)
      • Used by ISDN technology
   – LAP- F (Used by Frame Relay technology)
                 Copyright 2011 John Wiley & Sons, Inc   4 - 40
Ethernet (IEEE 802.3)
• Most widely used LAN protocol, developed
  jointly by Digital, Intel, and Xerox, now an
  IEEE standard
• Uses contention based media access
  control
• Byte-count data link layer protocol
• No transparency problem
  – uses a field containing the number of bytes
    (not flags) to delineate frames
• Error correction: optional
             Copyright 2011 John Wiley & Sons, Inc   4 - 41
Ethernet (IEEE 802.3) Frame
• Used by Virtual LANs; if            •Used to hold sequence number,
  no vLAN, the field is
  omitted                                              00
• If used, first 2 bytes set to                        01
  24,832 (8100H)                                       10         11


                                                       Data



                                              • 43 - 1497 bytes
   • Number of
     bytes in the                         • Used to exchange control
     message field                          info (e.g., type of network
                                            layer protocol used)
                     Copyright 2011 John Wiley & Sons, Inc             4 - 42
Point-to-Point Protocol (PPP)
• Byte-oriented protocol developed in early 90s
• Commonly used on dial-up lines from home PCs
• Designed mainly for point-to-point phone line (can
  be used for multipoint lines as well)




                                   (up to 1500 bytes)
Specifies the network layer
protocol used (e.g, IP, IPX)

                   Copyright 2011 John Wiley & Sons, Inc   4 - 43
Data Link Protocol Summary
   Protocol                    Size        Error Detection      Retransmission      Media Access
   Asynchronous Xmission       1           Parity               Continuous ARQ      Full Duplex


   File Transfer Protocols

   XMODEM                      132         8-bit Checksum       Stop-and-wait ARQ   Controlled Access

   XMODEM-CRC                  132         8-bit CRC            Stop-and-wait ARQ   Controlled Access

   XMODEM-1K                   1028        8-bit CRC            Stop-and-wait ARQ   Controlled Access

   ZMODEM                      *           32-bit CRC           Continuous ARQ      Controlled Access

   KERMIT                      *           24-bit CRC           Continuous ARQ      Controlled Access


   Synchronous Protocols

   SDLC                        *           16-bit CRC           Continuous ARQ      Controlled Access

   HDLC                        *           16-bit CRC           Continuous ARQ      Controlled Access

   Token Ring                  *           32-bit CRC           Stop-and wait ARQ   Controlled Access

   Ethernet                    *           32-bit CRC           Stop-and wait ARQ   Contention
   SLIP                        *           None                 None                Full Duplex
   PPP                         *           16-bit CRC           Continuous ARQ      Full Duplex
* Varies depending on message length.
                                      Copyright 2011 John Wiley & Sons, Inc                4 - 44
4.5 Transmission Efficiency
• An objective of the network:
     – Move as many bits as possible with minimum errors
         higher efficiency and lower cost
• Factors affecting network efficiency:
     – Characteristics of circuit (error rate, speed)
     – Speed of equipment, Error control techniques
     – Protocol used
        • Information bits (carrying user information)
        • Overhead bits ( used for error checking, frame
          delimiting, etc.)

       Total number of info bits to be transmitted
 =
            Total number of bits transmitted
                   Copyright 2011 John Wiley & Sons, Inc   4 - 45
Transmission Efficiency of Protocols
Async Transmission:
   7-bit ASCII (info bits), 1 parity bit, 1 stop bit, 1 start bit
         Transmission Efficiency = 7 / 10  70%
   e.g., V.92 modem with 56 Kbps  39.2 Kbps effective rate

SDLC Transmission
   Assume 100 info characters (800 bits), 2 flags (16 bits)
     Address (8 bits), Control (8 bits), CRC (32 bits)
         Transmission Efficiency = 800 / 64  92.6%
   e.g., V.92 modem with 56 Kbps  51.9 Kbps effective rate

     Bigger the message length, better the efficiency
     However, large packets likely to have more errors and are
     more likely to require retransmission  wasted capacity
                 Copyright 2011 John Wiley & Sons, Inc       4 - 46
Throughput
• A more accurate definition of efficiency
• Total number of information bits received per
  second; takes into account:
   – Overhead bits (as in transmission efficiency)
   – Need to retransmit packets containing errors
• Complex to calculate; depends on:
   – Transmission efficency
   – Error rate
   – Number of retransmission
• Transmission Rate of Information Bits (TRIB)
   – Used as a measurement of throughput
                  Copyright 2011 John Wiley & Sons, Inc   4 - 47
Optimum Packet Size
Trade-off between packet size and throughput
                                                            Acceptable range




                                         (more costly in terms of circuit
                                         capacity to retransmit if there
   (less likely to contain errors)       is an error)



                    Copyright 2011 John Wiley & Sons, Inc              4 - 48
TRIB




Copyright 2011 John Wiley & Sons, Inc   4 - 49
4.6 Implications for Management
• Provide a few, widely used data link layer
  protocols for all networks
  – Minimize costly customization
  – Minimize costly translation among many
    protocols
  – Less training, simpler network management
  – Bigger pool of available experts
  – Less expensive, off-the-shelf equipment



              Copyright 2011 John Wiley & Sons, Inc   4 - 50
Copyright 2011 John Wiley & Sons, Inc.

 All rights reserved. Reproduction or translation of
 this work beyond that permitted in section 117 of
 the 1976 United States Copyright Act without
 express permission of the copyright owner is
 unlawful. Request for further information should
 be addressed to the Permissions Department,
 John Wiley & Sons, Inc. The purchaser may make
 back-up copies for his/her own use only and not
 for distribution or resale. The Publisher assumes
 no responsibility for errors, omissions, or
 damages caused by the use of these programs or
 from the use of the information herein.

              Copyright 2011 John Wiley & Sons, Inc   4 - 51

More Related Content

What's hot

Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8APSU
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1WedgeB
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7APSU
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4APSU
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13APSU
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingRanjan K.M.
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)trayyoo
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11APSU
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALASaikiran Panjala
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client AdaptersYaser Rahmati
 

What's hot (20)

Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Networks
NetworksNetworks
Networks
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
Chap1 networking
Chap1 networkingChap1 networking
Chap1 networking
 
Ch02
Ch02Ch02
Ch02
 
Ch10
Ch10Ch10
Ch10
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALA
 
Wireless wp
Wireless wpWireless wp
Wireless wp
 
Networking
NetworkingNetworking
Networking
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
 

Viewers also liked

Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layermangal das
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layerroma bora
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)Anand Biradar
 
Asynchronous and synchronous
Asynchronous and synchronousAsynchronous and synchronous
Asynchronous and synchronousAkhil .B
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Sudhanshu Srivastava
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 

Viewers also liked (12)

Data link control
Data link controlData link control
Data link control
 
Ch05
Ch05Ch05
Ch05
 
products
productsproducts
products
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layer
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
 
Asynchronous and synchronous
Asynchronous and synchronousAsynchronous and synchronous
Asynchronous and synchronous
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
Eficiencia en LAN
Eficiencia en LANEficiencia en LAN
Eficiencia en LAN
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similar to 0110101 1 (number of 1's is even)Receiver: 0110100 1 (one bit changed)Parity check fails - error detectedODD parity sender

Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptkekeuwoe
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2sharmilas38
 
2 computer network - basic concepts
2   computer network - basic concepts2   computer network - basic concepts
2 computer network - basic conceptsMayank Jain
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Computer network
Computer network Computer network
Computer network Shreya Shah
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
Osi model
Osi model Osi model
Osi model maha tce
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.pptExamIUB
 
Telecom Network
Telecom NetworkTelecom Network
Telecom NetworkExamIUB
 

Similar to 0110101 1 (number of 1's is even)Receiver: 0110100 1 (one bit changed)Parity check fails - error detectedODD parity sender (20)

Ch03
Ch03Ch03
Ch03
 
Ch01 introduction
Ch01   introductionCh01   introduction
Ch01 introduction
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.ppt
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
 
Ch6.ppt
Ch6.pptCh6.ppt
Ch6.ppt
 
2 computer network - basic concepts
2   computer network - basic concepts2   computer network - basic concepts
2 computer network - basic concepts
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Computer network
Computer network Computer network
Computer network
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
Osi model
Osi model Osi model
Osi model
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
Telecom Network
Telecom NetworkTelecom Network
Telecom Network
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

0110101 1 (number of 1's is even)Receiver: 0110100 1 (one bit changed)Parity check fails - error detectedODD parity sender

  • 1. Fundamentals of Business Data Communications 11th Edition Alan Dennis & Alexandra Durcikova John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University Copyright 2011 John Wiley & Sons, Inc 4-1
  • 2. Chapter 4 Data Link Layer Copyright 2011 John Wiley & Sons, Inc 4-2
  • 3. Chapter 4 Outline 4.1 - Introduction 4.2 - Media Access Control – Contention, Controlled Access, Relative Performance 4.3 - Error Control – Sources of Errors, Error Prevention, Error Detection, Error Correction via Retransmission, Forward Error Correction 4.4 - Data Link Protocols – Asynchronous Transmission, Synchronous Transmission 4.5 - Transmission Efficiency 4.6 – Implications for Management Copyright 2011 John Wiley & Sons, Inc 4-3
  • 4. 4.1 Introduction • Responsible for moving messages Network Layer from one device to another Data Link Layer • Controls the way messages are sent on media Physical Layer • Organizes physical layer bit streams into coherent messages for the network layer • Major functions of a data link layer protocol – Media Access Control • Controlling when computers transmit – Error Control • Detecting and correcting transmission errors – Message Delineation • Identifying the beginning and end of a message Copyright 2011 John Wiley & Sons, Inc 4-4
  • 5. 4.2 Media Access Control (MAC) • Controlling when and what computer transmit – Important when more than one computer wants to send data at the same time over the same, shared circuit • Point-to-point half duplex links – computers take turns • Multipoint configurations – Ensure that no two computers attempt to transmit data at the same time • Two possible approaches – Contention based access – Controlled access Copyright 2011 John Wiley & Sons, Inc 4-5
  • 6. Contention • Transmit whenever the circuit is free • Collisions – Occur when more than one computer transmits at the same time – Need to determine which computer is allowed to transmit first after the collision • Used commonly in Ethernet LANs • Can be problematic in heavy usage networks Copyright 2011 John Wiley & Sons, Inc 4-6
  • 7. Controlled Access • Controlling access to shared resources – Acts like a stop light • Commonly used by mainframes (or its front end processor) – Determines which circuits have access to mainframe at a given time • Also used by some LAN protocols – Token ring, FDDI • Major controlled access methods – Access request and polling Copyright 2011 John Wiley & Sons, Inc 4-7
  • 8. Access Request • Clients wanting to transmit data first send a request to the device controlling the circuit • The central device will grant permission for one device at a time to transmit Copyright 2011 John Wiley & Sons, Inc 4-8
  • 9. Polling • Process of transmitting to a client only if asked and/or permitted – Client stores the information to be transmitted – Server (periodically) polls the client if it has data to send – Client, if it has any, sends the data – If no data to send, client responds negatively, and server asks the next client • Types of polling – Roll call polling – Hub polling (also called token passing) Copyright 2011 John Wiley & Sons, Inc 4-9
  • 10. Roll Call Polling • Check each client (consecutively and periodically) to see if it wants to transmit : A, B, C, D, E, A, B, … • Clients can also be prioritized so that they are polled more frequently: A, B, A, C, A, D, A, E, A, B, .. • Involves waiting: Poll and wait for a response • Needs a timer to prevent lock- up (by client not answering) Copyright 2011 John Wiley & Sons, Inc 4 - 10
  • 11. Hub Polling (Token Passing) • One computer starts the poll: • sends message (if any) then • passes the token to the next computer • token is a unique series of bits • Continues in sequence until the token reaches the first computer, which starts the polling cycle all over again Copyright 2011 John Wiley & Sons, Inc 4 - 11
  • 12. Relative Performance Depends on network conditions When volume is high, performance Work better for deteriorates networks with high (too many traffic volumes collisions) Cross-over Network more point: About efficiently used Work better for 20 smaller networks computers with low usage Copyright 2011 John Wiley & Sons, Inc 4 - 12
  • 13. 4.3 - Error Control • Handling of network errors caused by problems in transmission – Network errors • Can be a bit value change during transmission • Controlled by network hardware and software – Human errors: • Can be a mistake in typing a number • Controlled by application programs • Categories of Network Errors – Corrupted (data that has been changed) – Lost data (cannot find the data at all) Copyright 2011 John Wiley & Sons, Inc 4 - 13
  • 14. Error Control (Cont.) • Error Rate – 1 bit error in n bits transmitted, e.g., 1 in 500,000 • Burst error (more common) – Many bits are corrupted at the same time – Errors not uniformly distributed • e.g., 100 in 50,000,000  1 in 500,000 Copyright 2011 John Wiley & Sons, Inc 4 - 14
  • 15. Sources of Errors • Line noise and distortion – major cause – More likely on electrical media – Undesirable electrical signal – Introduced by equipment and natural disturbances – Degrades performance of a circuit – Manifestation • Extra bits • “Flipped” bits • Missing bits Copyright 2011 John Wiley & Sons, Inc 4 - 15
  • 16. Major Functions of Error Control • Error prevention • Error detection • Error correction Copyright 2011 John Wiley & Sons, Inc 4 - 16
  • 17. Sources of Errors and Prevention Source of error Cause Prevention White noise Movement of electrons Increase signal strength (thermal energy) (increase SNR) Impulse noise Sudden increases in Shield or move the wires electricity (e.g., lightning, power surges) Cross-talk Multiplexer guard bands are Increase the guard bands, or too small or wires too close move or shield the wires together Echo Poor connections (causing Fix the connections, or signal to be reflected back to tune equipment the source) Attenuation Gradual decrease in signal Use repeaters or amplifiers over distance (weakening of a signal) Intermodulation noise Signals from several circuits Move or shield the wires combine Copyright 2011 John Wiley & Sons, Inc 4 - 17
  • 18. Error Detection Sender calculates an Receiver recalculates Error Detection Value EDV and checks it (EDV) and transmits against the received EDV it along with data Mathematical Mathematical calculations calculations ? = Data to be EDV transmitted – If the same  No errors in transmission Larger the size, better error detection (but – If different  Error(s) lower efficiency) in transmission Copyright 2011 John Wiley & Sons, Inc 4 - 18
  • 19. Error Detection Techniques • Parity checks • Checksum • Cyclic Redundancy Check (CRC) Copyright 2011 John Wiley & Sons, Inc 4 - 19
  • 20. Parity Checking • One of the oldest and simplest • A single bit added to each character – Even parity: number of 1’s remains even – Odd parity: number of 1’s remains odd • Receiving end recalculates parity bit – If one bit has been transmitted in error the received parity bit will differ from the recalculated one • Simple, but doesn’t catch all errors – If two (or an even number of) bits have been transmitted in error at the same time, the parity check appears to be correct – Detects about 50% of errors Copyright 2011 John Wiley & Sons, Inc 4 - 20
  • 21. Examples of Using Parity To be sent: Letter V in 7-bit ASCII: 0110101 EVEN parity sender receiver Add a bit so that the 01101010 number of all transmitted 1’s is parity EVEN ODD parity sender receiver Add a bit so that the 01101011 number of all transmitted 1’s is ODD parity Copyright 2011 John Wiley & Sons, Inc 4 - 21
  • 22. Checksum • A checksum (usually 1 byte) is added to the end of the message • It is 95% effective • Method: • Add decimal values of each character in the message • Divide the sum by 255 • The remainder is the checksum value Copyright 2011 John Wiley & Sons, Inc 4 - 22
  • 23. Cyclic Redundancy Check (CRC) Example: P = 58 P/G=Q+R/G G=8 Q=7 R =2 Message Quotient Remainder: (treated as (whole –added to the one long number) message as EDV binary A fixed number –could be 8 bits, 16 number) (determines the bits, 24 bits, or 32 length of the R) bits long –CRC16 has R of 16 bits – Most powerful and most common – Detects 100% of errors (if number of errors <= size of R) –Otherwise: CRC-16 (99.998%) and CRC-32 (99.9999%) Copyright 2011 John Wiley & Sons, Inc 4 - 23
  • 24. Error Correction • Once detected, the error must be corrected • Error correction techniques – Retransmission (or, backward error correction) • Simplest, most effective, least expensive, most commonly used • Corrected by retransmission of the data – Receiver, when detecting an error, asks the sender to retransmit the message • Often called Automatic Repeat reQuest (ARQ) – Forward Error Correction • Receiving device can correct incoming messages without retransmission Copyright 2011 John Wiley & Sons, Inc 4 - 24
  • 25. Automatic Repeat reQuest (ARQ) • Process of requesting a data transmission be resent • Main ARQ protocols – Stop and Wait ARQ (A half duplex technique) • Sender sends a message and waits for acknowledgment, then sends the next message • Receiver receives the message and sends an acknowledgement, then waits for the next message – Continuous ARQ (A full duplex technique) • Sender continues sending packets without waiting for the receiver to acknowledge • Receiver continues receiving messages without acknowledging them right away Copyright 2011 John Wiley & Sons, Inc 4 - 25
  • 26. Stop and Wait ARQ Sender Receiver Sends Packet A, then waits to hear from receiver. Sends acknowledgement Sends the next packet (B) Sends negative acknowledgement Resends the packet again Sends acknowledgement Copyright 2011 John Wiley & Sons, Inc 4 - 26
  • 27. Continuous ARQ Sender sends packets continuously without waiting for receiver to acknowledge Notice that acknowledgments now identify the packet being acknowledged. Receiver sends back a NAK for a specific packet to be resent. Copyright 2011 John Wiley & Sons, Inc 4 - 27
  • 28. Flow Control with ARQ • Ensuring that sender is not transmitting too quickly for the receiver – Stop-and-wait ARQ • Receiver sends an ACK or NAK when it is ready to receive more packets – Continuous ARQ: • Both sides agree on the size of the “sliding window” – Number of messages that can be handled by the receiver without causing significant delays Copyright 2011 John Wiley & Sons, Inc 4 - 28
  • 29. Flow Control Example window size =4 sender receiver ...3 2 1 0 0123456789 ACK 0... (slide window) ...4 0123456789 ACK 4... (slide window) …8 7 6 5 0123456789 ACK 7.. set (slide window) window ..9 size to 2 0123456789 (timeout) ...9 8 0123456789 Copyright 2011 John Wiley & Sons, Inc 4 - 29
  • 30. Forward Error Correction (FEC) • Receiving device can correct incoming messages itself (without retransmission) • Requires extra corrective information – Sent along with the data – Allows data to be checked and corrected by the receiver – Amount of extra information: usually 50-100% of the data • Used in the following situations: – One way transmissions (retransmission not possible) – Transmission times are very long (satellite) – In this situation, relatively insignificant cost of FEC Copyright 2011 John Wiley & Sons, Inc 4 - 30
  • 31. Hamming Code – An FEC Example Each data bit figures into three EVEN parity bit calculations If any one bit (parity Only or data) changes  works for change in data bit one bit can be detected and errors corrected Copyright 2011 John Wiley & Sons, Inc 4 - 31
  • 32. Hamming Example P1 P2 D3 P4 D5 D6 D7 0 1 1 0 0 1 1 Assuming even parity and given the data bits 1, 0, 1, 1 What are the parity bits? 0, 1, 0 Copyright 2011 John Wiley & Sons, Inc 4 - 32
  • 33. 4.4 Data Link Protocols • Classification – Asynchronous transmission – Synchronous transmission • Differ by – Message delineation frame k-1 frame k frame k+1 – Frame length – Frame field structure Copyright 2011 John Wiley & Sons, Inc 4 - 33
  • 34. Asynchronous Transmission Start bit used by the Each character is sent receiver for independently separating Stop bits sent characters between and for transmissions synch. (a series of stop bits) Copyright 2011 John Wiley & Sons, Inc 4 - 34
  • 35. Asynchronous File Transfer • Used on – Point-to-point asynchronous circuits – Typically over phone lines via modem – Computer to computer for transfer of data files • Sometimes called Start/Stop Transmission • Characteristics of file transfer protocols – Designed to transmit error-free data – Group data into blocks to be transmitted (rather sending character by character) • Popular File transfer Protocols – Xmodem, Zmodem, and Kermit Copyright 2011 John Wiley & Sons, Inc 4 - 35
  • 36. File Transfer Protocols Xmodem: • One of the oldest async file transfer protocol • Uses stop-and-wait ARQ. Xmodem-CRC: •uses 1 byte CRC (instead of checksum) Xmodem-1K: •Xmodem-CRC + 1024 byte long message field Zmodem: • Uses CRC-32 with continuous ARQ • Dynamic adjustment of packet size Copyright 2011 John Wiley & Sons, Inc 4 - 36
  • 37. Synchronous Transmission • Data sent in a large block – Called a frame or packet – Typically about a thousand characters (bytes) long • Includes addressing information – Especially useful in multipoint circuits • Includes a series of synchronization (SYN) characters – Used to help the receiver recognize incoming data • Synchronous transmission protocols categories – Bit-oriented protocols: SDLC, HDLC – Byte-count protocols: Ethernet – Byte-oriented protocols: PPP Copyright 2011 John Wiley & Sons, Inc 4 - 37
  • 38. SDLC – Synchronous Data Link Control • Bit-oriented protocol developed by IBM • Uses a controlled media access protocol Beginning Ending (01111110) (01111110) data CRC-32 Destination Identifies frame type; Address (8 • Information (for transferring of user data) or 16 bits) • Supervisory (for error and flow control) Copyright 2011 John Wiley & Sons, Inc 4 - 38
  • 39. Transparency Problem of SDLC • Problem: Transparency – User data may contain the same bit pattern as the flags (01111110) – Receiver may interpret it as the end of the frame and ignores the rest • Solution: Bit stuffing (aka, zero insertion) – Sender inserts 0 anytime it detects 11111 (five 1’s) – If receiver sees five 1's, checks next bit(s) • if 0, remove it (stuffed bit) • if 10, end of frame marker (01111110) • if 11, error (7 1's cannot be in data) – Works but increases complexity Copyright 2011 John Wiley & Sons, Inc 4 - 39
  • 40. HDLC – High-Level Data Link Control • Formal standard developed by ISO • Same as SDLC, except – Longer address and control fields – Larger sliding window size – And more • Basis for many other Data Link Layer protocols – LAP-B (Link Access Protocol – Balanced) • Used by X.25 technology – LAP-D (Link Access Protocol – Balanced) • Used by ISDN technology – LAP- F (Used by Frame Relay technology) Copyright 2011 John Wiley & Sons, Inc 4 - 40
  • 41. Ethernet (IEEE 802.3) • Most widely used LAN protocol, developed jointly by Digital, Intel, and Xerox, now an IEEE standard • Uses contention based media access control • Byte-count data link layer protocol • No transparency problem – uses a field containing the number of bytes (not flags) to delineate frames • Error correction: optional Copyright 2011 John Wiley & Sons, Inc 4 - 41
  • 42. Ethernet (IEEE 802.3) Frame • Used by Virtual LANs; if •Used to hold sequence number, no vLAN, the field is omitted 00 • If used, first 2 bytes set to 01 24,832 (8100H) 10 11 Data • 43 - 1497 bytes • Number of bytes in the • Used to exchange control message field info (e.g., type of network layer protocol used) Copyright 2011 John Wiley & Sons, Inc 4 - 42
  • 43. Point-to-Point Protocol (PPP) • Byte-oriented protocol developed in early 90s • Commonly used on dial-up lines from home PCs • Designed mainly for point-to-point phone line (can be used for multipoint lines as well) (up to 1500 bytes) Specifies the network layer protocol used (e.g, IP, IPX) Copyright 2011 John Wiley & Sons, Inc 4 - 43
  • 44. Data Link Protocol Summary Protocol Size Error Detection Retransmission Media Access Asynchronous Xmission 1 Parity Continuous ARQ Full Duplex File Transfer Protocols XMODEM 132 8-bit Checksum Stop-and-wait ARQ Controlled Access XMODEM-CRC 132 8-bit CRC Stop-and-wait ARQ Controlled Access XMODEM-1K 1028 8-bit CRC Stop-and-wait ARQ Controlled Access ZMODEM * 32-bit CRC Continuous ARQ Controlled Access KERMIT * 24-bit CRC Continuous ARQ Controlled Access Synchronous Protocols SDLC * 16-bit CRC Continuous ARQ Controlled Access HDLC * 16-bit CRC Continuous ARQ Controlled Access Token Ring * 32-bit CRC Stop-and wait ARQ Controlled Access Ethernet * 32-bit CRC Stop-and wait ARQ Contention SLIP * None None Full Duplex PPP * 16-bit CRC Continuous ARQ Full Duplex * Varies depending on message length. Copyright 2011 John Wiley & Sons, Inc 4 - 44
  • 45. 4.5 Transmission Efficiency • An objective of the network: – Move as many bits as possible with minimum errors  higher efficiency and lower cost • Factors affecting network efficiency: – Characteristics of circuit (error rate, speed) – Speed of equipment, Error control techniques – Protocol used • Information bits (carrying user information) • Overhead bits ( used for error checking, frame delimiting, etc.) Total number of info bits to be transmitted = Total number of bits transmitted Copyright 2011 John Wiley & Sons, Inc 4 - 45
  • 46. Transmission Efficiency of Protocols Async Transmission: 7-bit ASCII (info bits), 1 parity bit, 1 stop bit, 1 start bit Transmission Efficiency = 7 / 10  70% e.g., V.92 modem with 56 Kbps  39.2 Kbps effective rate SDLC Transmission Assume 100 info characters (800 bits), 2 flags (16 bits) Address (8 bits), Control (8 bits), CRC (32 bits) Transmission Efficiency = 800 / 64  92.6% e.g., V.92 modem with 56 Kbps  51.9 Kbps effective rate Bigger the message length, better the efficiency However, large packets likely to have more errors and are more likely to require retransmission  wasted capacity Copyright 2011 John Wiley & Sons, Inc 4 - 46
  • 47. Throughput • A more accurate definition of efficiency • Total number of information bits received per second; takes into account: – Overhead bits (as in transmission efficiency) – Need to retransmit packets containing errors • Complex to calculate; depends on: – Transmission efficency – Error rate – Number of retransmission • Transmission Rate of Information Bits (TRIB) – Used as a measurement of throughput Copyright 2011 John Wiley & Sons, Inc 4 - 47
  • 48. Optimum Packet Size Trade-off between packet size and throughput Acceptable range (more costly in terms of circuit capacity to retransmit if there (less likely to contain errors) is an error) Copyright 2011 John Wiley & Sons, Inc 4 - 48
  • 49. TRIB Copyright 2011 John Wiley & Sons, Inc 4 - 49
  • 50. 4.6 Implications for Management • Provide a few, widely used data link layer protocols for all networks – Minimize costly customization – Minimize costly translation among many protocols – Less training, simpler network management – Bigger pool of available experts – Less expensive, off-the-shelf equipment Copyright 2011 John Wiley & Sons, Inc 4 - 50
  • 51. Copyright 2011 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information herein. Copyright 2011 John Wiley & Sons, Inc 4 - 51