Chapter 3 The Data Link Layer - PowerPoint PPT Presentation

1 / 48
About This Presentation
Title:

Chapter 3 The Data Link Layer

Description:

(b) Four examples of byte sequences before and after stuffing. 3.1.2 Framing (3) Bit stuffing (a) The original data. (b) The data as they appear on the line. ... – PowerPoint PPT presentation

Number of Views:73
Avg rating:3.0/5.0
Slides: 49
Provided by: steve1840
Category:
Tags: chapter | data | layer | link | stuffing

less

Transcript and Presenter's Notes

Title: Chapter 3 The Data Link Layer


1
Chapter 3 The Data Link Layer
Institute of Information Science and Technology .
Chengdu University YiYong 2008?2?25?
2
Teaching object
  • Through this section of the study , student
    should be understand the basic concepts of the
    data link layer, on top of stop waiting for the
    agreement.

3
Focus and Difficulties
  • Teaching focus
  • 1?Understand the function of Data Link Layer
  • 2?On top of Stop-and-Wait Protocol
  • Teaching Difficulties
  • 1?Master CRC principle
  • 2?On top of Stop-and-Wait Protocol

4
3.1 Data Link Layer Design Issues
  • Services Provided to the Network Layer
  • Framing
  • Error Control
  • Flow Control

5
3.1 Functions of the Data Link Layer
  • Provide service interface to the network layer
  • Dealing with transmission errors
  • Regulating data flow
  • Slow receivers not swamped by fast senders

6
3.1Functions of the Data Link Layer (2)
  • Relationship between packets and frames.

7
3.1.1 Services Provided to Network Layer
  • (a) Virtual communication.
  • (b) Actual communication.

8
3.1.1 Services Provided to Network Layer (2)
  • Placement of the data link protocol.

9
3.1.2 Framing
  • A character stream. (a) Without errors. (b)
    With one error.

10
3.1.2 Framing (2)
  • (a) A frame delimited by flag bytes.
  • (b) Four examples of byte sequences before and
    after stuffing.

11
3.1.2 Framing (3)
  • Bit stuffing
  • (a) The original data.
  • (b) The data as they appear on the line.
  • (c) The data as they are stored in receivers
    memory after destuffing.

12
3.2 Error Detection and Correction
  • Error-Correcting Codes
  • Error-Detecting Codes

13
3.2.1 Error-Correcting Codes
  • Use of a Hamming code to correct burst errors.

14
3.2.2 Error-Detecting Codes
Calculation of the polynomial code checksum.
15
3.3 Elementary Data Link Protocols
  • An Unrestricted Simplex Protocol
  • A Simplex Stop-and-Wait Protocol
  • A Simplex Protocol for a Noisy Channel

16
3.3 Protocol Definitions
Continued ?
Some definitions needed in the protocols to
follow. These are located in the file protocol.h.
17
Protocol Definitions(ctd.)
Some definitions needed in the protocols to
follow. These are located in the file
protocol.h.
18
Unrestricted Simplex Protocol
19
Simplex Stop-and-Wait Protocol
20
A Simplex Protocol for a Noisy Channel
A positive acknowledgement with retransmission
protocol.
Continued ?
21
3.3.3 A Simplex Protocol for a Noisy Channel
(ctd.)
A positive acknowledgement with retransmission
protocol.
22
3.4 Sliding Window Protocols
  • A One-Bit Sliding Window Protocol
  • A Protocol Using Go Back N
  • A Protocol Using Selective Repeat

23
3.4 Sliding Window Protocols (2)
  • A sliding window of size 1, with a 3-bit sequence
    number.
  • (a) Initially.
  • (b) After the first frame has been sent.
  • (c) After the first frame has been received.
  • (d) After the first acknowledgement has been
    received.

24
3.4.1 A One-Bit Sliding Window Protocol
Continued ?
25
A One-Bit Sliding Window Protocol (ctd.)
26
A One-Bit Sliding Window Protocol (2)
  • Two scenarios for protocol 4. (a) Normal
    case. (b) Abnormal case. The notation is (seq,
    ack, packet number). An asterisk indicates where
    a network layer accepts a packet.

27
3.4 A Protocol Using Go Back N
  • Pipelining and error recovery. Effect on an
    error when
  • (a) Receivers window size is 1.
  • (b) Receivers window size is large.

28
Sliding Window Protocol Using Go Back N
Continued ?
29
Sliding Window Protocol Using Go Back N
Continued ?
30
Sliding Window Protocol Using Go Back N
Continued ?
31
Sliding Window Protocol Using Go Back N
32
Sliding Window Protocol Using Go Back N (2)
  • Simulation of multiple timers in software.

33
3.4.3 A Sliding Window Protocol Using Selective
Repeat
Continued ?
34
3.4.3 A Sliding Window Protocol Using Selective
Repeat (2)
Continued ?
35
3.4.3 A Sliding Window Protocol Using Selective
Repeat (3)
Continued ?
36
3.4.3 A Sliding Window Protocol Using Selective
Repeat (4)
37
3.4.3 A Sliding Window Protocol Using Selective
Repeat (5)
  • (a) Initial situation with a window size seven.
  • (b) After seven frames sent and received, but not
    acknowledged.
  • (c) Initial situation with a window size of four.
  • (d) After four frames sent and received, but not
    acknowledged.

38
3.5 Protocol Verification
  • Finite State Machined Models
  • Petri Net Models

39
3.5.1 Finite State Machined Models
  • (a) State diagram for protocol 3. (b)
    Transmissions.

40
3.5.2 Petri Net Models
  • A Petri net with two places and two transitions.

41
3.5.2 Petri Net Models (2)
  • A Petri net model for protocol 3.

42
3.6 Example Data Link Protocols
  • HDLC High-Level Data Link Control
  • The Data Link Layer in the Internet

43
3.6.1 High-Level Data Link Control
  • Frame format for bit-oriented protocols.

44
3.6.1 High-Level Data Link Control (2)
  • Control field of
  • (a) An information frame.
  • (b) A supervisory frame.
  • (c) An unnumbered frame.

45
3.6.1 The Data Link Layer in the Internet
  • A home personal computer acting as an internet
    host.

46
3.6.2 PPP Point to Point Protocol
  • The PPP full frame format for unnumbered mode
    operation.

47
3.6.2 PPP Point to Point Protocol (2)
  • A simplified phase diagram for bring a line up
    and down.

48
3.6.2 PPP Point to Point Protocol (3)
  • The LCP frame types.
Write a Comment
User Comments (0)
About PowerShow.com