SlideShare a Scribd company logo
1 of 166
Computer Networks (06-05933) The Data-Link Layer Rob Minson, rm. 134 [email_address]
Data Link Layer Overview
Data Link Layer Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Errors in the Physical Layer ,[object Object]
Errors in the Physical Layer ,[object Object],[object Object],=
Errors in the Physical Layer ,[object Object],[object Object]
Errors in the Physical Layer ,[object Object]
Errors in the Physical Layer ,[object Object]
Error Control Correction and Detection Schemes
Error Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detection with Parity Bits ,[object Object],000 001 010 011 100 101 111 000 0 001 1 010 1 011 0 100 1 101 0 111 1 110 110 0
Error Detection with Parity Bits ,[object Object],001 1 parity check OK 000 001 010 011 100 101 111 000 0 001 1 010 1 011 0 100 1 101 0 111 1 110 110 0
Error Detection with Parity Bits ,[object Object],011 1 error detected! parity check not OK 000 001 010 011 100 101 111 000 0 001 1 010 1 011 0 100 1 101 0 111 1 110 110 0
Error Detection with Parity Bits ,[object Object],111 1 error missed!!! parity check OK 000 001 010 011 100 101 111 000 0 001 1 010 1 011 0 100 1 101 0 111 1 110 110 0
Error Detection with Parity Bits ,[object Object],[object Object],[object Object],[object Object]
Hamming Theory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hamming Theory ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hamming Theory ,[object Object],with distance 2, if 1 error occurs we will always receive an invalid word 000 0 001 1 010 1 011 0 100 1 101 0 111 1 110 0 000 1 001 0 010 0 011 1 100 0 101 1 111 0 110 1
Hamming Theory ,[object Object],[object Object],[object Object]
Hamming Theory ,[object Object],[object Object],[object Object],[object Object],0000 1 000 0 1 00 00 1 0 000 1
Hamming Theory ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hamming Theory ,[object Object],[object Object],[object Object],[object Object],[object Object],the words invalid words reserved by them all valid words + total words available ≤ 2m + (m+r)2m = (m+r+1)2m
Hamming Theory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hamming Theory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hamming Codes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hamming Codes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],0  0 0  0  0 0  0 r 1  m 1  m 2  r 2  m 3  m 4  r 3
Hamming Codes ,[object Object],[object Object],[object Object],r 1   m 1  m 2  m 3 r 3   m 1  m 2  m 4 r 2   m 2  m 3  m 4 ?  0 0  ?  1 1  ? r 1  m 1  m 2  r 2  m 3  m 4  r 3
Hamming Codes ,[object Object],[object Object],[object Object],r 1   m 1  m 2  m 3 r 3   m 1  m 2  m 4 r 2   m 2  m 3  m 4 ?  1 0  ?  1 0  ? r 1  m 1  m 2  r 2  m 3  m 4  r 3
Hamming Codes ,[object Object],[object Object],[object Object],r 1   m 1  m 2  m 3 r 3   m 1  m 2  m 4 r 2   m 2  m 3  m 4 0  1 0  1  1 0  1 r 1  m 1  m 2  r 2  m 3  m 4  r 3
Hamming Codes ,[object Object],[object Object],[object Object],r 1  r 2  r 3  error bit m 1 m 2 m 3 m 4 r 1   m 1  m 2  m 3 r 3   m 1  m 2  m 4 r 2   m 2  m 3  m 4
Hamming Codes ,[object Object],[object Object],[object Object],[object Object],0  0 0  0  0 0  0 r 1  m 1  m 2  r 2  m 3  m 4  r 3
Hamming Codes ,[object Object],[object Object],[object Object],[object Object],[object Object],0  0 0  0  0 0  0 r 1  m 1  m 2  r 2  m 3  m 4  r 3
Hamming Codes w/ Logarithmic Parity ,[object Object],[object Object],0 0  0  0  0 0 0  0  0 0 0 0 0 0 0  0  0 r 1   r 2  m 1  r 3   m 2  m 3  m 4   r 4   m 5   m 6  m 7  m 8   m 9  m 10  m 11  r 5   m 12
Hamming Codes w/ Logarithmic Parity ,[object Object],[object Object],[object Object],0 0  0  0  0 0 0  0  0 0 0 0 0 0 0  0  0 r 1   r 2  m 1  r 3   m 2  m 3  m 4   r 4   m 5   m 6  m 7  m 8   m 9  m 10  m 11  r 5   m 12
Hamming Codes w/ Logarithmic Parity 0 0  0  0  0 0 0  0  0 0 0 0  r 1   r 2  m 1  r 3   m 2  m 3  m 4   r 4   m 5   m 6  m 7  m 8   1  2   3   4   5   6   7  8  9  10  11   12  r 4  (8) r 3  (4) r 2  (2) r 1  (1) 12 11 10 9 8 7 6 5 4 3 2 1
Hamming Codes w/ Logarithmic Parity ? ?  0  ?  0 1 0  ?  1 1 0 0  r 1   r 2  m 1  r 3   m 2  m 3  m 4   r 4   m 5   m 6  m 7  m 8   1  2   3   4   5   6   7  8  9  10  11   12  r 4  (8) r 3  (4) r 2  (2) r 1  (1) 12 11 10 9 8 7 6 5 4 3 2 1
Hamming Codes w/ Logarithmic Parity 1 0  0  1  0 1 0  0  1 1 0 0  r 1   r 2  m 1  r 3   m 2  m 3  m 4   r 4   m 5   m 6  m 7  m 8   1  2   3   4   5   6   7  8  9  10  11   12  r 4  (8) r 3  (4) r 2  (2) r 1  (1) 12 11 10 9 8 7 6 5 4 3 2 1
Hamming Codes w/ Logarithmic Parity 1 0  0  1  1  1 0  0  1 1 0 0  r 1   r 2  m 1  r 3   m 2  m 3  m 4   r 4   m 5   m 6  m 7  m 8   1  2   3   4   5   6   7  8  9  10  11   12  ,[object Object],[object Object],r 4  (8) r 3  (4) r 2  (2) r 1  (1) 12 11 10 9 8 7 6 5 4 3 2 1
Hamming Codes w/ Logarithmic Parity 1 0  0  1  0 1 0  0  1  0  0 0  r 1   r 2  m 1  r 3   m 2  m 3  m 4   r 4   m 5   m 6  m 7  m 8   1  2   3   4   5   6   7  8  9  10  11   12  ,[object Object],[object Object],r 4  (8) r 3  (4) r 2  (2) r 1  (1) 12 11 10 9 8 7 6 5 4 3 2 1
Hamming Codes w/ Logarithmic Parity ,[object Object],[object Object],r 4  (8) r 3  (4) r 2  (2) r 1  (1) 12 11 10 9 8 7 6 5 4 3 2 1 1 0  0  1  0 1 0  1  1 1 0 0  r 1   r 2  m 1  r 3   m 2  m 3  m 4   r 4   m 5   m 6  m 7  m 8   1  2   3   4   5   6   7  8  9  10  11   12
Hamming codes w/ Logarithmic Parity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hamming codes w/ Logarithmic Parity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1 = 1 2 = 2 3 = 1 + 2 4 = 4 5 = 4 + 1 6 = 4 + 2 7 = 4 + 2 + 1 0 1  0  1  0 1 0  r 1   r 2  m 1  r 3   m 2  m 3  m 4   1  2   3   4   5   6   7
Hamming codes w/ Logarithmic Parity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1 = 1 2 = 2 3 = 1 + 2 4 = 4 5 = 4 + 1 6 = 4 + 2 7 = 4 + 2 + 1 0 0  0  1  0 0 1  r 1   r 2  m 1  r 3   m 2  m 3  m 4   1  2   3   4   5   6   7
Hamming Code Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyclic Redundancy for Error Detection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyclic Redundancy for Error Detection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyclic Redundancy for Error Detection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detection with CRC ,[object Object],[object Object],[object Object],[object Object],0 1 1 0 0x 3  + 1x 2  – 1x 1  + 0x 0 = 1 0 1 0 0 1 1x 5  + 0x 4  - 1x 3  + 0x 2  + 0x 1  - 1x 0 = ,[object Object]
Error Detection with CRC ,[object Object],0 1 1 0 - 0 1 1 1 = 0 0 0 1  0x 3  + 1x 2  - 1x 1  + 0x 0 - 0x 3  + 1x 2  - 1x 1  + 1x 0 = 0x 3  + 0x 2  + 0x 1  - 1x 0 = 1 0 1 0 0 1 - 0 0 1 1 0 0 = 1 0 0 1 0 1 1x 5  + 0x 4  - 1x 3  + 0x 2  + 0x 1  - 1x 0 - 0x 5  + 0x 4  + 1x 3  + 1x 2  + 0x 1  + 0x 0 = 1x 5  + 0x 4  - 2x 3  - 1x 2  + 0x 1  - 1x 0 = ,[object Object]
Error Detection with CRC ,[object Object]
Error Detection with CRC ,[object Object],[object Object],[object Object],[object Object],[object Object],remainder result divisor dividend
Error Detection with CRC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1 1 1  0 0 0 1 0 1 1 1 1  0 0 0  ÷  1 0 1  =  0 1 1 1 1 1  0 0 0  –  0 1 1  = 1 1 1  0 1 1
Error Detection with CRC ,[object Object],1 1 1  0 1 1 T  ( (x r M – R)/G  which is   divisible by  G  with 0 remainder) M  (original data)   M  (original data)   R  (remainder of  x r M / G )
Error Detection with CRC ,[object Object],[object Object],[object Object],[object Object],M = 1 1 1 1 1 1  0 1 1  /  0 1 1  =  0 0 0 0
Error Detection with CRC ,[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detection with CRC ,[object Object],[object Object],[object Object],T =  1 1 1  0 1 1 T` = T + E =  1 1 0  0 1 1 E =  0 0 1 0 0 0 transmission error
Error Detection with CRC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detection with CRC ,[object Object],[object Object],= 100000100110000010001110110110111 ,[object Object],[object Object],[object Object]
Error Detection with CRC ,[object Object],[object Object],[object Object]
Error Detection with CRC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bursty Error Control ,[object Object],[object Object]
Bursty Error Control ,[object Object],[object Object]
Bursty Error Control ,[object Object],[object Object],[object Object]
Bursty Error Control ,[object Object],[object Object]
Error Control Design Choices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Control Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Framing
Framing  ,[object Object],[object Object],[object Object]
Character Count Framing ,[object Object]
Character Count Framing ,[object Object],[object Object]
Flag-Byte Framing ,[object Object],[object Object],usually a sequence number usually error control ,[object Object]
FLAG-bytes with Byte Stuffing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FLAG-bytes with Bit Stuffing ,[object Object],[object Object],[object Object],[object Object]
Putting it all together… DATA a chunk of network-layer binary data
Putting it all together… ESC DATA ESC bytes or 0 bits stuffed
Putting it all together… CTRL ESC DATA Control information such as  sender/receiver/seq. number/etc... (see Flow Control and MAC sub-layer) Control information such as  sender/receiver/seq. number/etc... (see Flow Control and MAC sub-layer)
Putting it all together… CRC ESC DATA CRC checksum or other error-control information CTRL
Putting it all together… FLAG FLAG CTRL CRC ESC DATA FLAG bytes mark start and end of frame (note, these are not CRC-protected) ,[object Object],FLAG bytes mark start and end of frame (note, these are not CRC-protected)
Flow Control
Flow Control Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Unrestricted ,[object Object],[object Object]
Unrestricted ,[object Object]
Stop-and-Wait ,[object Object],[object Object]
Stop-and-Wait ,[object Object]
Stop-and-Wait ,[object Object]
Stop-and-Wait with Timeouts ,[object Object],[object Object]
Stop-and-Wait with Timeouts ,[object Object],sender receiver errors no errors
Stop-and-Wait with Timeouts ,[object Object],[object Object]
ARQ: Automatic Repeat Request ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ARQ: Automatic Repeat Request ,[object Object]
ARQ: Automatic Repeat Request ,[object Object],[object Object],[object Object]
ARQ: Automatic Repeat Request ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sliding Window: Go-Back-N ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sliding Window: Go-Back-N ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sliding Window: Go-Back-N ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sliding Window: Go-Back-N ,[object Object]
Sliding Window: Go-Back-N ,[object Object]
Sliding Window: Go-Back-N ,[object Object]
Sliding Window: Go-Back-N ,[object Object],[object Object]
Sliding Window: Go-Back-N ,[object Object]
Sliding Window: Go-Back-N ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sliding Window: Go-Back-N ,[object Object]
Sliding Window: Selective Repeat ,[object Object],[object Object]
Sliding Window: Selective Repeat ,[object Object],[object Object]
Sliding Window: Selective Repeat ,[object Object],[object Object]
Duplex Sliding Window ,[object Object],[object Object],[object Object],[object Object]
Real DLL protocols: HDLC ,[object Object],[object Object],(if piggybacked) (otherwise)
Real DLL protocols: LLC (802.2) ,[object Object],[object Object],[object Object]
Further Reading… ,[object Object],[object Object],[object Object]
Flow Control Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Medium Access Control
Multiple Access Channels
Multiple Access Channels
MAC Overview ,[object Object],[object Object],[object Object],[object Object]
The MAC sub-layer Data-Link Layer provides packet send/receive service to Network Layer
The MAC sub-layer Physical Layer provides binary send/receive to Data-Link Layer
The MAC sub-layer But, different media have different constraints about multiple nodes accessing the medium
The MAC sub-layer ,[object Object],[object Object],[object Object],[object Object]
The MAC sub-layer MAC layer provides medium-access service to the Data-Link layer A separate  protocol  is needed to implement the  service  for each different transmission medium
Channel Allocation Problem ,[object Object],[object Object],[object Object],[object Object]
Channel Allocation Problem ,[object Object],[object Object]
Channel Allocation Problem ,[object Object],[object Object]
Channel Allocation Problem ,[object Object],[object Object]
Channel Allocation Problem ,[object Object],[object Object]
Channel Allocation Problem ,[object Object],[object Object],[object Object]
ALOHA Protocols ,[object Object],[object Object],[object Object]
ALOHA Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ALOHA – Collision Detection ,[object Object],[object Object],[object Object]
Pure ALOHA ,[object Object],[object Object],[object Object]
Pure ALOHA ,[object Object],[object Object],[object Object]
Pure ALOHA ,[object Object],[object Object]
Slotted ALOHA ,[object Object],[object Object]
Slotted vs. Pure ALOHA ,[object Object],[object Object],[object Object],[object Object],[object Object]
MAC throughput performance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC throughput performance ,[object Object],[object Object],[object Object],[object Object]
MAC throughput performance ,[object Object],[object Object],[object Object]
Carrier Sense Protocols (CSMA) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA Performance
Carrier Sense Protocols (CSMA) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object],[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object],[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object],[object Object],[object Object]
CSMA/CD in Ethernet ,[object Object],[object Object],[object Object],[object Object]
CSMA/CA in WiFi ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CA in WiFi ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CA in WiFi ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CA in WiFi ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CA in WiFi ,[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CA in WiFi ,[object Object],[object Object],[object Object],[object Object]
CSMA/CA in WiFi
CSMA with Adaptive Backoff ,[object Object]
CSMA with Adaptive Backoff ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA – Adaptive Backoff ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
802 error rates ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
802 addressing ,[object Object],[object Object],[object Object],[object Object],[object Object]
802 inter-connections ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
802 inter-connections ,[object Object]
802 inter-connections ,[object Object]
MAC Layer Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Link Layer Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Mohammed Abuibaid
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram ProtocolPeter R. Egli
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHAREKhushboo Pal
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link LayerMeenakshi Paul
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control ProtocolPeter R. Egli
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocolManusha Dilan
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 

What's hot (20)

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Error control
Error controlError control
Error control
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
Harq
HarqHarq
Harq
 
Packet scheduling
Packet schedulingPacket scheduling
Packet scheduling
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 

Similar to The Data Link Layer

10-Error Detection-Kode Hamming.pptx
10-Error Detection-Kode Hamming.pptx10-Error Detection-Kode Hamming.pptx
10-Error Detection-Kode Hamming.pptxAhmadSyaifuddin35
 
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
Lecture Notes:  EEEC6440315 Communication Systems - Information TheoryLecture Notes:  EEEC6440315 Communication Systems - Information Theory
Lecture Notes: EEEC6440315 Communication Systems - Information TheoryAIMST University
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming codeUmesh Gupta
 
Calculating the hamming code (tutorial)
Calculating the hamming code (tutorial)Calculating the hamming code (tutorial)
Calculating the hamming code (tutorial)kiriinyaKev
 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementationramya c b
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomonAniruddh Tyagi
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomonaniruddh Tyagi
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomonaniruddh Tyagi
 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codesGargiKhanna1
 
CArcMOOC 02.04 - Special encodings
CArcMOOC 02.04 - Special encodingsCArcMOOC 02.04 - Special encodings
CArcMOOC 02.04 - Special encodingsAlessandro Bogliolo
 
New error-detection
New error-detectionNew error-detection
New error-detectionNitesh Singh
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correctionfg657
 

Similar to The Data Link Layer (20)

10-Error Detection-Kode Hamming.pptx
10-Error Detection-Kode Hamming.pptx10-Error Detection-Kode Hamming.pptx
10-Error Detection-Kode Hamming.pptx
 
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
Lecture Notes:  EEEC6440315 Communication Systems - Information TheoryLecture Notes:  EEEC6440315 Communication Systems - Information Theory
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
 
B041306015
B041306015B041306015
B041306015
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming code
 
Calculating the hamming code (tutorial)
Calculating the hamming code (tutorial)Calculating the hamming code (tutorial)
Calculating the hamming code (tutorial)
 
Hamming code checksum
Hamming code  checksumHamming code  checksum
Hamming code checksum
 
rs_1.pptx
rs_1.pptxrs_1.pptx
rs_1.pptx
 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementation
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomon
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomon
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomon
 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codes
 
Es272 ch2
Es272 ch2Es272 ch2
Es272 ch2
 
Hamlet_Khachatryan_57--61
Hamlet_Khachatryan_57--61Hamlet_Khachatryan_57--61
Hamlet_Khachatryan_57--61
 
K034066071
K034066071K034066071
K034066071
 
CArcMOOC 02.04 - Special encodings
CArcMOOC 02.04 - Special encodingsCArcMOOC 02.04 - Special encodings
CArcMOOC 02.04 - Special encodings
 
New error-detection
New error-detectionNew error-detection
New error-detection
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

The Data Link Layer

  • 1. Computer Networks (06-05933) The Data-Link Layer Rob Minson, rm. 134 [email_address]
  • 2. Data Link Layer Overview
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Error Control Correction and Detection Schemes
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Hamming Codes w/ Logarithmic Parity 0 0 0 0 0 0 0 0 0 0 0 0 r 1 r 2 m 1 r 3 m 2 m 3 m 4 r 4 m 5 m 6 m 7 m 8 1 2 3 4 5 6 7 8 9 10 11 12 r 4 (8) r 3 (4) r 2 (2) r 1 (1) 12 11 10 9 8 7 6 5 4 3 2 1
  • 36. Hamming Codes w/ Logarithmic Parity ? ? 0 ? 0 1 0 ? 1 1 0 0 r 1 r 2 m 1 r 3 m 2 m 3 m 4 r 4 m 5 m 6 m 7 m 8 1 2 3 4 5 6 7 8 9 10 11 12 r 4 (8) r 3 (4) r 2 (2) r 1 (1) 12 11 10 9 8 7 6 5 4 3 2 1
  • 37. Hamming Codes w/ Logarithmic Parity 1 0 0 1 0 1 0 0 1 1 0 0 r 1 r 2 m 1 r 3 m 2 m 3 m 4 r 4 m 5 m 6 m 7 m 8 1 2 3 4 5 6 7 8 9 10 11 12 r 4 (8) r 3 (4) r 2 (2) r 1 (1) 12 11 10 9 8 7 6 5 4 3 2 1
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. Putting it all together… DATA a chunk of network-layer binary data
  • 75. Putting it all together… ESC DATA ESC bytes or 0 bits stuffed
  • 76. Putting it all together… CTRL ESC DATA Control information such as sender/receiver/seq. number/etc... (see Flow Control and MAC sub-layer) Control information such as sender/receiver/seq. number/etc... (see Flow Control and MAC sub-layer)
  • 77. Putting it all together… CRC ESC DATA CRC checksum or other error-control information CTRL
  • 78.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 114.
  • 115. The MAC sub-layer Data-Link Layer provides packet send/receive service to Network Layer
  • 116. The MAC sub-layer Physical Layer provides binary send/receive to Data-Link Layer
  • 117. The MAC sub-layer But, different media have different constraints about multiple nodes accessing the medium
  • 118.
  • 119. The MAC sub-layer MAC layer provides medium-access service to the Data-Link layer A separate protocol is needed to implement the service for each different transmission medium
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
  • 165.
  • 166.