SlideShare a Scribd company logo
The Data Link
Layer
Chapter 2
Position of the data-link layer
Functions of the Data Link
Layer
• Provide service interface to the network
layer
• Dealing with transmission errors
• Regulating data flow
• Slow receivers not swamped by fast senders
Functions of the Data Link Layer
(2)
Relationship between packets and
frames.
Data Link Layer Design
Issues
• Services Provided to the Network
Layer
• Framing
• Error Control
• Flow Control
Services Provided to Network
Layer
(a) Virtual communication.
(b) Actual communication.
Services Provided to Network
Layer
 The data link layer can be designed to offer various
services which are
 Unacknowledged connectionless service
◦ the source machine send independent frames to the
destination machine without acknowledgement and no
connection.
 Acknowledged connectionless service
◦ acknowledgement but no connection.
 Acknowledged connection-oriented service.
◦ Connection first and then data transfer.
Services Provided to Network
Layer
 When a frame arrives at a router, the hardware checks it
for errors, then passes to the data link layer software,
which checks to see if this is the frame expected, gives the
packet contained in the payload field to the routing
software, which then chooses the appropriate outgoing line
and passes the packet back down to the data link layer
software, which then transmits it.
Framing
 The data link layer break the bit stream up into discrete
frames and compute the checksum for each frame.
 When a frame arrives at the destination, the checksum is
recomputed.
 Breaking the bit stream up into frames is based on the
following methods.
◦ Character count.
◦ Flag bytes with byte stuffing.
◦ Starting and ending flags, with bit stuffing.
◦ Physical layer coding violations.
Framing - Character Stream
 This framing method uses a field in the header to specify the number of
characters in the frame.
 When the data link layer at the destination sees the character count, it
knows how many characters follow and hence the end of the frame is
easily known.
 The trouble with this algorithm is that the count can be garbled by a
transmission error.
Framing - Byte Stuffing
 This method gets around the problem of resynchronization after an error
by having each frame start and end with FLAG bytes.
 If the flag byte's bit pattern occurs in the data, an escape byte (ESC) is
inserted before flag byte.
 A single escape byte is part of an escape sequence, whereas a doubled
one indicates that a single escape occurred naturally in the data.
Framing – Bit Stuffing
 A disadvantage of Byte Stuffing is that it is closely tied to 8-bit
characters.
◦ Ex: UNICODE uses 16-bit characters
 In Bit Stuffing, each frame begins and ends with a special bit pattern
◦ (ex: 01111110).
 Whenever the sender's data link layer encounters five consecutive 1s in
the data, it automatically stuffs a 0 bit into the outgoing bit stream.
 When the receiver sees five consecutive incoming 1 bits, followed by a 0
bit, it automatically destuffs the 0 bit.
Error Detection and
Correction
 Error-Correcting Codes
◦ Redundant information is included along with
each block of data sent, to enable the receiver
to deduce what the transmitted data must have
been.
 Error-Detecting Codes
◦ Enough redundancy is only included to allow
the receiver to deduce that an error occurred,
but not which error, and have it request a
Error-Correcting Codes
 Error-Correcting Codes may be used for channels such as
wireless links that make many errors.
 A frame consists of m data bits, r redundant (check ) bits and
an n-bit (m+r) codeword is obtained.
 The number of bit positions in which two codewords differ is
called the Hamming distance.
 If two codewords are a Hamming distance d apart, it will require
d single-bit errors to convert one into the other.
 To detect d errors, you need a distance d + 1 code.
 To correct d errors, you need a distance 2d + 1 code
Error-Correcting Codes
 The bits that are powers of 2 (1, 2, 4, 8, 16, etc.) are check
bits.
 The rest (3, 5, 6, 7, 9, etc.) are filled up with the m data bits.
 Each check bit forces the parity of some collection of bits,
including itself, to be even .
 To see which check bits the data bit in position k contributes
to, rewrite k as a sum of powers of 2.
 For example, 11 = 1 + 2 + 8.
 A bit is checked by just those check bits occurring in its
expansion (e.g., bit 11 is checked by bits 1, 2, and 8).
Positions of redundancy bits in
Hamming code
Redundancy bits calculation
Example of redundancy bit
calculation
Error correction using Hamming
code
Burst Error Correction using
Hamming code
 Hamming codes can only correct single errors.
 However, to correct burst errors, a sequence of k consecutive
codewords are arranged as a matrix, one codeword per row.
 The data should be transmitted one column at a time, starting with the
leftmost column.
 When all k bits have been sent, the second column is sent.
 When the frame arrives at the receiver, the matrix is reconstructed,
one column at a time.
 If a burst error of length k occurs, at most 1 bit in each of the k
codewords will have been affected, but the Hamming code can correct
one error per codeword, so the entire block can be restored.
Error-Correcting Codes
Error Detecting Codes
 Through copper wire or fiber, the error rate is
much lower, so error detection and
retransmission is usually more efficient.
Types of Error Detecting
Codes
 Parity Check
 Cyclic Redundancy Check (CRC)
 Checksum
Parity Concept – Even Parity
Cyclic Redundancy Check (CRC)
 The most powerful technique used for error detection is CRC.
 Unlike parity check which is based on addition, CRC is based on
binary division.
 In CRC, a sequence of redundancy bits called the CRC
remainder is appended to the end of data bits.
 This resulting codeword becomes exactly divisible by a second,
predetermined binary number.
 At the destination, this received codeword is divided by the same
number.
◦ If there is no remainder, no error has occurred.
◦ If there is a remainder, error has occurred and codeword is
discarded.
Cyclic Redundancy Check
(CRC)
Cyclic Redundancy Check
 CRC is also known as polynomial code .
 Polynomial codes are based upon treating bit strings as
representations of polynomials with coefficients of 0 and 1
only.
 A k-bit frame is regarded as the coefficient list for a
polynomial with k terms, ranging from xk-1to x0.
 Such a polynomial is said to be of degree k - 1.
 The high-order (leftmost) bit is the coefficient of xk-1, the
next bit is the coefficient of xk-2 and so on.
 Polynomial addition and subtraction are identical to ex-or
operation.
Checksum in CRC
 When the polynomial code method is employed, the sender
and receiver must agree upon a generator polynomial, G(x), in
advance.
 To compute the checksum for some frame with m bits,
corresponding to the polynomial M(x), the frame must be
longer than the generator polynomial.
 The idea is to append a checksum to the end of the frame in
such a way that the polynomial represented by the
checksummed frame is divisible by G(x).
 When the receiver gets the checksummed frame, it tries
Algorithm for computing the
checksum
 Let r be the degree of G(x). Append r zero bits to the low-
order end of the frame so it now contains m + r bits and
corresponds to the polynomial xrM(x).
 Divide the bit string corresponding to G(x) into the bit
string corresponding to xrM(x), using modulo 2 division.
 Subtract the remainder (which is always r or fewer bits)
from the bit string corresponding to xrM(x) using modulo 2
subtraction.
 The result is the checksummed frame to be transmitted.
Call its polynomial T(x).
Sender - Polynomial code
checksum
Frame : 100100 (x5+x2)
Generator : 1101 (x3+x2+1)
Receiver - Polynomial code
checksum
DATA LINK LAYER
PROTOCOLS
Elementary Data Link
Protocols
• An Unrestricted Simplex Protocol
• A Simplex Stop-and-Wait Protocol
• A Simplex Protocol for a Noisy Channel
Unrestricted Simplex Protocol
 This Protocol 1 is also known as Utopia.
 The statement of the protocol
◦ Protocol 1 (Utopia) provides for data
transmission in one direction only, from sender
to receiver.
◦ The communication channel is assumed to be
error free and the receiver is assumed to be
able to process all the input infinitely quickly.
◦ Consequently, the sender just site in a loop
Simplex Stop-and-Wait
Protocol
 This Protocol 2 is also known as Stop and Wait.
 The statement of the protocol
◦ Protocol 2 (stop-and-wait) also provides for a one-
directional flow of data from sender to receiver.
◦ The communication channel is once again assumed to
be error free, as in protocol 1.
◦ However, this time, the receiver has only a finite buffer
capacity and a Unite processing speed, so the protocol
must explicitly prevent the sender from Hooding the
receiver with data faster than it can be handled.
A Simplex Protocol for a Noisy
Channel
• The network layer on A gives packet 1 to its data link layer.
The packet is correctly received at B and passed to the
network layer on B. B sends an acknowledgement frame
back to A.
• The acknowledgement frame gets lost completely. It just
never arrives at all because of the noisy channel .
• The data link layer on A eventually times out. Not having
received an acknowledgement, it assumes that its data
frame was lost or damaged and sends the frame containing
packet 1 again.
• The duplicate frame also arrives at the data link layer on B
perfectly and is unwittingly passed to the network layer there.
If A is sending a file to B, part of the file will be duplicated In
A Simplex Protocol for a Noisy
Channel
 So, the receiver must be able to distinguish a frame that it is
seeing for the first time from a retransmission.
 To achieve this is to have the sender put a sequence number in
the header of each frame it sends.
 A 1-bit sequence number (0 or 1) is sufficient for the receiver to
detect the frame.
 Any arriving frame containing the wrong sequence number is
rejected as a duplicate.
 When a frame containing the correct sequence number arrives, it
is accepted and passed to the network layer.
 Then the next expected sequence number is incremented modulo
2 (i.e., 0 becomes 1 and 1 becomes 0).
Normal operation
11.2 Stop-and-Wait ARQ, lost frame
11.3 Stop-and-Wait ARQ, lost ACK frame
In Stop-and-Wait ARQ, numbering
frames prevents the retaining of
duplicate frames.
Note:
11.4 Stop-and-Wait ARQ, delayed ACK
Sliding Window Protocols
 In the previous protocols, data frames were transmitted in one
direction only.
 In most practical situations, there is a need for transmitting
data in both directions.
 The method of two separate communication channels for
achieving full-duplex data transmission is not preferred
because the bandwidth of the reverse channel is almost
entirely wasted.
 The technique of temporarily delaying outgoing
acknowledgements so that they can be hooked onto the next
outgoing data frame is known as piggybacking .
11.5 Piggybacking
Piggybacking advantages &
disadvantages
 The advantage of using piggybacking over having distinct
acknowledgement frames is a better use of the available
channel bandwidth.
 The ack field in the frame header costs only a few bits,
whereas a separate frame would need a header, the
acknowledgement, and a checksum.
 Piggybacking introduces a complication not present with
separate acknowledgements.
 If the data link layer waits longer than the sender's
timeout period, the frame will be retransmitted, defeating
the whole purpose of having acknowledgements.
Sliding Window Protocols
 Sliding window protocols has three types of bidirectional
protocols which differ in terms of efficiency, complexity, and
buffer requirements.
 In all sliding window protocols, each outbound frame contains a
sequence number, ranging from 0 upto maximum 2n-1
 The sender maintains a set of sequence numbers corresponding
to frames it is permitted to send, which fall within a sending
window.
 Similarly, the receiver also maintains a receiving window
corresponding to the set of frames it is permitted to accept.
 The sender's window and the receiver's window need not have
the same lower and upper limits or even have the same size.
Sliding Window Protocols
 The sequence numbers within the sender's window
represent frames that have been sent or can be sent but
are as yet not acknowledged.
 Whenever a new packet arrives from the network layer, it
is given the next highest sequence number, and the
upper edge of the window is advanced by one.
 When an acknowledgement comes in, the lower edge is
advanced by one.
 In this way the window continuously maintains a list of
unacknowledged frames.
Sliding Window Protocols
 Since frames currently within the sender's window may ultimately be lost or
damaged in transit, the sender must keep all these frames in its memory
for possible retransmission.
 Thus, if the maximum window size is n, the sender needs n buffers to hold
the unacknowledged frames.
 If the window ever grows to its maximum size, the sending data link layer
must forcibly shut off the network layer until another buffer becomes free.
 The receiving data link layer's window corresponds to the frames it may
accept.
 Any frame falling outside the window is discarded without comment.
 When a frame whose sequence number is equal to the lower edge of the
window is received, it is passed to the network layer, an acknowledgement
is generated, and the window is rotated by one.
Sliding Window Protocols
• A One-Bit Sliding Window
Protocol
• A Protocol Using Go Back N
• A Protocol Using Selective
Repeat
A sliding window of size 1, with a 3-bit sequence number.
(a) Initial state.
(b) After the first frame has been sent.
(c) After the first frame has been received.
(d) After the first acknowledgement has been received.
One-Bit Sliding Window
Protocol
A One-Bit Sliding Window Protocol
(2)
Normal case. Abnormal case.
 The notation is (seq, ack, packet number).
 * denotes network layer accepts a packet.
A Protocol Using Go Back N
 The need for a large window on the sending side occurs
whenever the product of bandwidth x round-trip-delay is large.
 So, a large sliding window (size 2n -1) is preferred in this
protocol.
 Go Back N - the receiver simply to discard all subsequent
frames, sending no acknowledgements for the discarded frames,
if any error occurs. This is also known as pipelining protocol.
11.6 Sender sliding window
11.7 Receiver sliding window
11.8 Control variables
11.9 Go-Back-N ARQ, normal operation
11.10 Go-Back-N ARQ, lost frame
Sliding Window Protocol
Using Selective repeat
 In this protocol, both sender and receiver maintain a window of
acceptable sequence numbers.
 The sender's window size starts out at 0 and grows to some
predefined maximum, MAX_SEQ.
 The receiver's window, in contrast, is always fixed in size and equal to
M AX_SEQ.
 The receiver has a buffer reserved for each sequence number within
its fixed window and associated with each buffer is a bit (arrived) telling
whether the buffer is full or empty.
 Whenever a frame arrives, its sequence number is checked by the
function between to see if it falls within the window.
 if so and if it has not already been received, it is accepted and stored.
Sliding Window Protocol
Using Selective repeat
 Selective Repeat accepts frames out of order but passes
packets to the network layer in order.
 Associated with each outstanding frame is a timer.
 When the timer expires, only the error frame is
retransmitted, but not all the outstanding frames.
A Sliding Window Protocol Using Selective
Repeat (5)
(a) Initial situation with a window size seven.
(b) After seven frames sent and received, but not
acknowledged.
(c) Initial situation with a window size of four.
(d) After four frames sent and received, but not
acknowledged.
Example Data Link Protocols
• HDLC – High-Level Data Link
Control
• The Data Link Layer in the Internet
High-Level Data Link Control
Frame format for bit-oriented protocols.
 The Address field is primarily of importance on lines with
multiple terminals, where it is used to identify one of the
terminals.
 The Control field is used for sequence numbers,
acknowledgements, and other purposes
 The Data field may contain any information
 The Checksum field is a cyclic redundancy code
 The minimum frame contains three fields and totals 32
bits
HDLC Frame format
High-Level Data Link Control
Control field of
(a) An information frame.
(b) A supervisory frame.
(c) An unnumbered frame.
 There are three kinds of frames: Information,
Supervisory, and Unnumbered
The protocol uses a sliding window, with a 3-bit
sequence number ( 7 unacknowledged frames)
 The Seq field is the frame sequence number.
The Next field is a piggybacked acknowledgement
 Poll/Final is used when a computer is polling a group
of terminals. When used as P, the computer is inviting the
terminal to send data. All the frames sent by the terminal,
except the final one, have the P/F bit set to P. The final
one is set to F.
HDLC Frame Types
A supervisory frame.
 Type 0 is an acknowledgement frame (RECEIVE READY) used
to indicate the next frame expected
 Type 1 is a negative acknowledgement frame (REJECT). It is
used to indicate that a transmission error has been detected
 Type 2 is RECEIVE NOT READY. It acknowledges all frames up
to but not including Next, just as RECEIVE READY does, but it
tells the sender to stop sending
 Type 3 is the SELECTIVE REJECT. It calls for retransmission of
only the frame specified
An Unnumbered frame
 It is sometimes used for control purposes but can also carry data
when unreliable connectionless service is called for.
67
Types of Links
Point-to-Point Multiple Access
…
L -1; 9-11-02 © Srinivasan Seshan, 2002 68
Packet Transmission Modes
 Unicast
◦ Transmission to single specific receiver
 Broadcast
◦ Transmission to all network nodes
 Multicast
◦ Transmission to specific subset of nodes
 Anycast
◦ Transmission to one of a specific subset
of nodes
The Data Link Layer in the Internet
A home personal computer acting as an internet
host.
PPP – Point to Point Protocol
PPP Features
 A framing method that unambiguously delineates the end of one
frame and the start of the next one. The frame format also
handles error detection.
 A link control protocol for bringing lines up, testing them,
negotiating options, and bringing them down again gracefully
when they are no longer needed. This protocol is called LCP
(Link Control Protocol). It supports synchronous and
asynchronous circuits and byte-oriented and bit-oriented
encodings.
 A way to negotiate network-layer options in a way that is
independent of the network layer protocol to be used. The
method chosen is to have a different NCP (Network Control
Protocol) for each network layer supported.
PPP – Point to Point Protocol
The PPP full frame format for
unnumbered mode operation.
PPP – Point to Point Protocol (2)
A simplified phase diagram for bring a line up and down.
PPP – Point to Point Protocol (3)
The LCP frame types.

More Related Content

Similar to chp2 - data link layer.pptx

COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3
MrMRajaCSESTAFF
 
Data link layer
Data link layerData link layer
Data link layer
Hassanein Alwan
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Paulo_Vangui
 
Data link layar
Data link layarData link layar
Data link layar
jaysans
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
Shashank HP
 
Unit 2
Unit 2Unit 2
Unit 2
APARNA P
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
k2w9psdb96
 
Data linklayer
Data linklayerData linklayer
Data linklayer
sheikhshakir
 
DLL
DLLDLL
data link layer to print
data link layer to printdata link layer to print
data link layer to print
BishalWosti1
 
Data link layar
Data link layarData link layar
Data link layar
jaysanshrestha
 
Data link layar
Data link layarData link layar
Data link layar
jaysanshrestha
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptx
lathass5
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
TamiratDejene1
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
Datalink_func.pptx
Datalink_func.pptxDatalink_func.pptx
Datalink_func.pptx
ThangamaniR3
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
Rohan Bhatkar
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 

Similar to chp2 - data link layer.pptx (20)

COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3
 
Data link layer
Data link layerData link layer
Data link layer
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
 
Data link layar
Data link layarData link layar
Data link layar
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
Unit 2
Unit 2Unit 2
Unit 2
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
 
Data linklayer
Data linklayerData linklayer
Data linklayer
 
DLL
DLLDLL
DLL
 
data link layer to print
data link layer to printdata link layer to print
data link layer to print
 
Data link layar
Data link layarData link layar
Data link layar
 
Data link layar
Data link layarData link layar
Data link layar
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptx
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
 
Data link layer
Data link layer Data link layer
Data link layer
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Datalink_func.pptx
Datalink_func.pptxDatalink_func.pptx
Datalink_func.pptx
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
 

Recently uploaded

Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 

Recently uploaded (20)

Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 

chp2 - data link layer.pptx

  • 2. Position of the data-link layer
  • 3. Functions of the Data Link Layer • Provide service interface to the network layer • Dealing with transmission errors • Regulating data flow • Slow receivers not swamped by fast senders
  • 4. Functions of the Data Link Layer (2) Relationship between packets and frames.
  • 5. Data Link Layer Design Issues • Services Provided to the Network Layer • Framing • Error Control • Flow Control
  • 6. Services Provided to Network Layer (a) Virtual communication. (b) Actual communication.
  • 7. Services Provided to Network Layer  The data link layer can be designed to offer various services which are  Unacknowledged connectionless service ◦ the source machine send independent frames to the destination machine without acknowledgement and no connection.  Acknowledged connectionless service ◦ acknowledgement but no connection.  Acknowledged connection-oriented service. ◦ Connection first and then data transfer.
  • 8. Services Provided to Network Layer  When a frame arrives at a router, the hardware checks it for errors, then passes to the data link layer software, which checks to see if this is the frame expected, gives the packet contained in the payload field to the routing software, which then chooses the appropriate outgoing line and passes the packet back down to the data link layer software, which then transmits it.
  • 9. Framing  The data link layer break the bit stream up into discrete frames and compute the checksum for each frame.  When a frame arrives at the destination, the checksum is recomputed.  Breaking the bit stream up into frames is based on the following methods. ◦ Character count. ◦ Flag bytes with byte stuffing. ◦ Starting and ending flags, with bit stuffing. ◦ Physical layer coding violations.
  • 10. Framing - Character Stream  This framing method uses a field in the header to specify the number of characters in the frame.  When the data link layer at the destination sees the character count, it knows how many characters follow and hence the end of the frame is easily known.  The trouble with this algorithm is that the count can be garbled by a transmission error.
  • 11. Framing - Byte Stuffing  This method gets around the problem of resynchronization after an error by having each frame start and end with FLAG bytes.  If the flag byte's bit pattern occurs in the data, an escape byte (ESC) is inserted before flag byte.  A single escape byte is part of an escape sequence, whereas a doubled one indicates that a single escape occurred naturally in the data.
  • 12. Framing – Bit Stuffing  A disadvantage of Byte Stuffing is that it is closely tied to 8-bit characters. ◦ Ex: UNICODE uses 16-bit characters  In Bit Stuffing, each frame begins and ends with a special bit pattern ◦ (ex: 01111110).  Whenever the sender's data link layer encounters five consecutive 1s in the data, it automatically stuffs a 0 bit into the outgoing bit stream.  When the receiver sees five consecutive incoming 1 bits, followed by a 0 bit, it automatically destuffs the 0 bit.
  • 13. Error Detection and Correction  Error-Correcting Codes ◦ Redundant information is included along with each block of data sent, to enable the receiver to deduce what the transmitted data must have been.  Error-Detecting Codes ◦ Enough redundancy is only included to allow the receiver to deduce that an error occurred, but not which error, and have it request a
  • 14. Error-Correcting Codes  Error-Correcting Codes may be used for channels such as wireless links that make many errors.  A frame consists of m data bits, r redundant (check ) bits and an n-bit (m+r) codeword is obtained.  The number of bit positions in which two codewords differ is called the Hamming distance.  If two codewords are a Hamming distance d apart, it will require d single-bit errors to convert one into the other.  To detect d errors, you need a distance d + 1 code.  To correct d errors, you need a distance 2d + 1 code
  • 15. Error-Correcting Codes  The bits that are powers of 2 (1, 2, 4, 8, 16, etc.) are check bits.  The rest (3, 5, 6, 7, 9, etc.) are filled up with the m data bits.  Each check bit forces the parity of some collection of bits, including itself, to be even .  To see which check bits the data bit in position k contributes to, rewrite k as a sum of powers of 2.  For example, 11 = 1 + 2 + 8.  A bit is checked by just those check bits occurring in its expansion (e.g., bit 11 is checked by bits 1, 2, and 8).
  • 16. Positions of redundancy bits in Hamming code
  • 18. Example of redundancy bit calculation
  • 19. Error correction using Hamming code
  • 20. Burst Error Correction using Hamming code  Hamming codes can only correct single errors.  However, to correct burst errors, a sequence of k consecutive codewords are arranged as a matrix, one codeword per row.  The data should be transmitted one column at a time, starting with the leftmost column.  When all k bits have been sent, the second column is sent.  When the frame arrives at the receiver, the matrix is reconstructed, one column at a time.  If a burst error of length k occurs, at most 1 bit in each of the k codewords will have been affected, but the Hamming code can correct one error per codeword, so the entire block can be restored.
  • 22. Error Detecting Codes  Through copper wire or fiber, the error rate is much lower, so error detection and retransmission is usually more efficient.
  • 23. Types of Error Detecting Codes  Parity Check  Cyclic Redundancy Check (CRC)  Checksum
  • 24. Parity Concept – Even Parity
  • 25. Cyclic Redundancy Check (CRC)  The most powerful technique used for error detection is CRC.  Unlike parity check which is based on addition, CRC is based on binary division.  In CRC, a sequence of redundancy bits called the CRC remainder is appended to the end of data bits.  This resulting codeword becomes exactly divisible by a second, predetermined binary number.  At the destination, this received codeword is divided by the same number. ◦ If there is no remainder, no error has occurred. ◦ If there is a remainder, error has occurred and codeword is discarded.
  • 27. Cyclic Redundancy Check  CRC is also known as polynomial code .  Polynomial codes are based upon treating bit strings as representations of polynomials with coefficients of 0 and 1 only.  A k-bit frame is regarded as the coefficient list for a polynomial with k terms, ranging from xk-1to x0.  Such a polynomial is said to be of degree k - 1.  The high-order (leftmost) bit is the coefficient of xk-1, the next bit is the coefficient of xk-2 and so on.  Polynomial addition and subtraction are identical to ex-or operation.
  • 28. Checksum in CRC  When the polynomial code method is employed, the sender and receiver must agree upon a generator polynomial, G(x), in advance.  To compute the checksum for some frame with m bits, corresponding to the polynomial M(x), the frame must be longer than the generator polynomial.  The idea is to append a checksum to the end of the frame in such a way that the polynomial represented by the checksummed frame is divisible by G(x).  When the receiver gets the checksummed frame, it tries
  • 29. Algorithm for computing the checksum  Let r be the degree of G(x). Append r zero bits to the low- order end of the frame so it now contains m + r bits and corresponds to the polynomial xrM(x).  Divide the bit string corresponding to G(x) into the bit string corresponding to xrM(x), using modulo 2 division.  Subtract the remainder (which is always r or fewer bits) from the bit string corresponding to xrM(x) using modulo 2 subtraction.  The result is the checksummed frame to be transmitted. Call its polynomial T(x).
  • 30. Sender - Polynomial code checksum Frame : 100100 (x5+x2) Generator : 1101 (x3+x2+1)
  • 31. Receiver - Polynomial code checksum
  • 33. Elementary Data Link Protocols • An Unrestricted Simplex Protocol • A Simplex Stop-and-Wait Protocol • A Simplex Protocol for a Noisy Channel
  • 34. Unrestricted Simplex Protocol  This Protocol 1 is also known as Utopia.  The statement of the protocol ◦ Protocol 1 (Utopia) provides for data transmission in one direction only, from sender to receiver. ◦ The communication channel is assumed to be error free and the receiver is assumed to be able to process all the input infinitely quickly. ◦ Consequently, the sender just site in a loop
  • 35. Simplex Stop-and-Wait Protocol  This Protocol 2 is also known as Stop and Wait.  The statement of the protocol ◦ Protocol 2 (stop-and-wait) also provides for a one- directional flow of data from sender to receiver. ◦ The communication channel is once again assumed to be error free, as in protocol 1. ◦ However, this time, the receiver has only a finite buffer capacity and a Unite processing speed, so the protocol must explicitly prevent the sender from Hooding the receiver with data faster than it can be handled.
  • 36. A Simplex Protocol for a Noisy Channel • The network layer on A gives packet 1 to its data link layer. The packet is correctly received at B and passed to the network layer on B. B sends an acknowledgement frame back to A. • The acknowledgement frame gets lost completely. It just never arrives at all because of the noisy channel . • The data link layer on A eventually times out. Not having received an acknowledgement, it assumes that its data frame was lost or damaged and sends the frame containing packet 1 again. • The duplicate frame also arrives at the data link layer on B perfectly and is unwittingly passed to the network layer there. If A is sending a file to B, part of the file will be duplicated In
  • 37. A Simplex Protocol for a Noisy Channel  So, the receiver must be able to distinguish a frame that it is seeing for the first time from a retransmission.  To achieve this is to have the sender put a sequence number in the header of each frame it sends.  A 1-bit sequence number (0 or 1) is sufficient for the receiver to detect the frame.  Any arriving frame containing the wrong sequence number is rejected as a duplicate.  When a frame containing the correct sequence number arrives, it is accepted and passed to the network layer.  Then the next expected sequence number is incremented modulo 2 (i.e., 0 becomes 1 and 1 becomes 0).
  • 40. 11.3 Stop-and-Wait ARQ, lost ACK frame
  • 41. In Stop-and-Wait ARQ, numbering frames prevents the retaining of duplicate frames. Note:
  • 42. 11.4 Stop-and-Wait ARQ, delayed ACK
  • 43. Sliding Window Protocols  In the previous protocols, data frames were transmitted in one direction only.  In most practical situations, there is a need for transmitting data in both directions.  The method of two separate communication channels for achieving full-duplex data transmission is not preferred because the bandwidth of the reverse channel is almost entirely wasted.  The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as piggybacking .
  • 45. Piggybacking advantages & disadvantages  The advantage of using piggybacking over having distinct acknowledgement frames is a better use of the available channel bandwidth.  The ack field in the frame header costs only a few bits, whereas a separate frame would need a header, the acknowledgement, and a checksum.  Piggybacking introduces a complication not present with separate acknowledgements.  If the data link layer waits longer than the sender's timeout period, the frame will be retransmitted, defeating the whole purpose of having acknowledgements.
  • 46. Sliding Window Protocols  Sliding window protocols has three types of bidirectional protocols which differ in terms of efficiency, complexity, and buffer requirements.  In all sliding window protocols, each outbound frame contains a sequence number, ranging from 0 upto maximum 2n-1  The sender maintains a set of sequence numbers corresponding to frames it is permitted to send, which fall within a sending window.  Similarly, the receiver also maintains a receiving window corresponding to the set of frames it is permitted to accept.  The sender's window and the receiver's window need not have the same lower and upper limits or even have the same size.
  • 47. Sliding Window Protocols  The sequence numbers within the sender's window represent frames that have been sent or can be sent but are as yet not acknowledged.  Whenever a new packet arrives from the network layer, it is given the next highest sequence number, and the upper edge of the window is advanced by one.  When an acknowledgement comes in, the lower edge is advanced by one.  In this way the window continuously maintains a list of unacknowledged frames.
  • 48. Sliding Window Protocols  Since frames currently within the sender's window may ultimately be lost or damaged in transit, the sender must keep all these frames in its memory for possible retransmission.  Thus, if the maximum window size is n, the sender needs n buffers to hold the unacknowledged frames.  If the window ever grows to its maximum size, the sending data link layer must forcibly shut off the network layer until another buffer becomes free.  The receiving data link layer's window corresponds to the frames it may accept.  Any frame falling outside the window is discarded without comment.  When a frame whose sequence number is equal to the lower edge of the window is received, it is passed to the network layer, an acknowledgement is generated, and the window is rotated by one.
  • 49. Sliding Window Protocols • A One-Bit Sliding Window Protocol • A Protocol Using Go Back N • A Protocol Using Selective Repeat
  • 50. A sliding window of size 1, with a 3-bit sequence number. (a) Initial state. (b) After the first frame has been sent. (c) After the first frame has been received. (d) After the first acknowledgement has been received. One-Bit Sliding Window Protocol
  • 51. A One-Bit Sliding Window Protocol (2) Normal case. Abnormal case.  The notation is (seq, ack, packet number).  * denotes network layer accepts a packet.
  • 52. A Protocol Using Go Back N  The need for a large window on the sending side occurs whenever the product of bandwidth x round-trip-delay is large.  So, a large sliding window (size 2n -1) is preferred in this protocol.  Go Back N - the receiver simply to discard all subsequent frames, sending no acknowledgements for the discarded frames, if any error occurs. This is also known as pipelining protocol.
  • 56. 11.9 Go-Back-N ARQ, normal operation
  • 57. 11.10 Go-Back-N ARQ, lost frame
  • 58. Sliding Window Protocol Using Selective repeat  In this protocol, both sender and receiver maintain a window of acceptable sequence numbers.  The sender's window size starts out at 0 and grows to some predefined maximum, MAX_SEQ.  The receiver's window, in contrast, is always fixed in size and equal to M AX_SEQ.  The receiver has a buffer reserved for each sequence number within its fixed window and associated with each buffer is a bit (arrived) telling whether the buffer is full or empty.  Whenever a frame arrives, its sequence number is checked by the function between to see if it falls within the window.  if so and if it has not already been received, it is accepted and stored.
  • 59. Sliding Window Protocol Using Selective repeat  Selective Repeat accepts frames out of order but passes packets to the network layer in order.  Associated with each outstanding frame is a timer.  When the timer expires, only the error frame is retransmitted, but not all the outstanding frames.
  • 60. A Sliding Window Protocol Using Selective Repeat (5) (a) Initial situation with a window size seven. (b) After seven frames sent and received, but not acknowledged. (c) Initial situation with a window size of four. (d) After four frames sent and received, but not acknowledged.
  • 61. Example Data Link Protocols • HDLC – High-Level Data Link Control • The Data Link Layer in the Internet
  • 62. High-Level Data Link Control Frame format for bit-oriented protocols.
  • 63.  The Address field is primarily of importance on lines with multiple terminals, where it is used to identify one of the terminals.  The Control field is used for sequence numbers, acknowledgements, and other purposes  The Data field may contain any information  The Checksum field is a cyclic redundancy code  The minimum frame contains three fields and totals 32 bits HDLC Frame format
  • 64. High-Level Data Link Control Control field of (a) An information frame. (b) A supervisory frame. (c) An unnumbered frame.
  • 65.  There are three kinds of frames: Information, Supervisory, and Unnumbered The protocol uses a sliding window, with a 3-bit sequence number ( 7 unacknowledged frames)  The Seq field is the frame sequence number. The Next field is a piggybacked acknowledgement  Poll/Final is used when a computer is polling a group of terminals. When used as P, the computer is inviting the terminal to send data. All the frames sent by the terminal, except the final one, have the P/F bit set to P. The final one is set to F. HDLC Frame Types
  • 66. A supervisory frame.  Type 0 is an acknowledgement frame (RECEIVE READY) used to indicate the next frame expected  Type 1 is a negative acknowledgement frame (REJECT). It is used to indicate that a transmission error has been detected  Type 2 is RECEIVE NOT READY. It acknowledges all frames up to but not including Next, just as RECEIVE READY does, but it tells the sender to stop sending  Type 3 is the SELECTIVE REJECT. It calls for retransmission of only the frame specified An Unnumbered frame  It is sometimes used for control purposes but can also carry data when unreliable connectionless service is called for.
  • 67. 67 Types of Links Point-to-Point Multiple Access …
  • 68. L -1; 9-11-02 © Srinivasan Seshan, 2002 68 Packet Transmission Modes  Unicast ◦ Transmission to single specific receiver  Broadcast ◦ Transmission to all network nodes  Multicast ◦ Transmission to specific subset of nodes  Anycast ◦ Transmission to one of a specific subset of nodes
  • 69. The Data Link Layer in the Internet A home personal computer acting as an internet host. PPP – Point to Point Protocol
  • 70. PPP Features  A framing method that unambiguously delineates the end of one frame and the start of the next one. The frame format also handles error detection.  A link control protocol for bringing lines up, testing them, negotiating options, and bringing them down again gracefully when they are no longer needed. This protocol is called LCP (Link Control Protocol). It supports synchronous and asynchronous circuits and byte-oriented and bit-oriented encodings.  A way to negotiate network-layer options in a way that is independent of the network layer protocol to be used. The method chosen is to have a different NCP (Network Control Protocol) for each network layer supported.
  • 71. PPP – Point to Point Protocol The PPP full frame format for unnumbered mode operation.
  • 72. PPP – Point to Point Protocol (2) A simplified phase diagram for bring a line up and down.
  • 73. PPP – Point to Point Protocol (3) The LCP frame types.