SlideShare a Scribd company logo
1 of 60
DATA LINK LAYER
• Data can be corrupted during transmission. For reliable
communication, errors must be detected and corrected.
• Error detection and correction are implemented either at
data link layer or the transport layer of the OSI model.
TYPES OF ERRORS:
• Single bit error :-
- Only one bit in the data unit has
changed.
• Burst error :-
- It means that two or more bits in the
data unit has changed.
Single bit Error:
0 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0
Burst Error:
0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1
0 1 0 1 1 1 0 1 0 1 0 0 0 0 1 1
0 changed to 1
ReceivedSent
Sent
Received
Bits corrupted by Burst Error
BLOCK CODES:
• In block coding we divide our message into blocks, each of k bits , called
datawords. We add r redundant bits to each block to make the length n
= k+r. The resulting n-bits blocks are called codewords.
ERROR DETECTION:
ERROR CORRECTION:
LINEAR BLOCK CODES:
• Almost all block codes used today belong to a subset called linear block
codes. A linear block code is a code in which the exclusive OR (addition
modulo-2) of two valid codewords creates another valid codeword.
• Eg. Simple Parity Check Code & Hamming Code
SIMPLE PARITY-CHECK CODE:
• It is the simplest technique for detecting and correcting
errors. The MSB of an 8-bits word is used as the parity bit
and the remaining 7 bits are used as data or message
bits. The parity of 8-bits transmitted word can be either
even parity or odd parity.
• Even parity -- Even parity means the number of 1's in the given word
including the parity bit should be even (2,4,6,....).
• Odd parity -- Odd parity means the number of 1's in the given word
including the parity bit should be odd (1,3,5,....).
SIMPLE PARITY-CHECK CODE:
HAMMING CODE:
• In the Hamming code, k parity bits are added to an n-bit data word,
forming a new word of n + k bits. The bit positions are numbered in
sequence from 1 to n + k. Those positions numbered with powers of
two are reserved for the parity bits. The remaining bits are the data bits.
The code can be used with words of any length
HAMMING CODE:
CORRECTION LOGIC ANALYZER:
CYCLIC CODES:
• Cyclic codes are special linear block codes with one extra property. In a
cyclic code, if a codeword is cyclically shifted (rotated), the result is
another codeword.
CYCLIC REDUNDANCY CHECK:
DIVISION IN CRC ENCODER:
DIVISION IN THE CRC DECODER FOR TWO CASES:
CHECKSUM:
• A checksum or hash sum is a small-size datum from a block of digital
data for the purpose of detecting errors which may have been
introduced during its transmission or storage. It is usually applied to an
installation file after it is received from the download server
CHECKSUM:
CHECKSUM FOR A TEXT OF 8 CHARACTERS
(“FOROUZAN”):
STOP AND WAIT AUTOMATIC REPEAT REQUEST:
Stop and Wait Automatic Repeat Request Protocol adds a simple error mechanism to the Stop
and Wait Protocol.
• Consider the example in the figure:
• Frame0 is sent and acknowledgement
is received.
• Frame1 is lost and is resent after
time-out.
• The resent frame is acknowledged
and the timer stops.
• Frame0 is sent and acknowledged,but
acknowledgement is lost.
• The sender has no idea if the frame or
acknowledgement is lost,so after
time-out,it resends frame0,which is
acknowledged.
GO-BACK-N AUTOMATIC REPEAT REQUEST:
• To improve the efficiency of
transmission,multiple frames must
be in transition while waiting for
acknowledgement.
• In Go-back-N automatic repeat
request we can send several frames
before receiving
acknowledgements,we keep a copy
of these frames until the
acknowledgements arrive.
GO-BACK-N AUTOMATIC REPEAT REQUEST:
• In the Go-Back-N Protocol, the
sequence numbers are modulo 𝟐 𝒎,
where m is the size of the sequence
number field in bits.
• The send window is an abstract concept
defining an imaginary box of size 𝟐 𝒎 −
1 with three variables: 𝑺 𝒇,𝑺 𝒏 and 𝑺 𝒔𝒊𝒛𝒆.
• The send window can slide one or more
slots when a valid acknowledgment
arrives.
GO-BACK-N AUTOMATIC REPEAT REQUEST:
The receive window is an abstract
concept defining an imaginary box of size
1 with one single variable 𝑹 𝒏. The
window slides when a correct frame has
arrived; sliding occurs one slot at a time.
WINDOW SIZE FOR GO-BACK-N ARQ:
In Go-Back-N ARQ, the size of the send window must be less than 𝟐 𝒎
; the size of the receiver window is
always 1.
Example for m=2
POINT-TO-POINT-PROTOCOL:
The most common protocols for point-to-point access is POINT-TO-POINT PROTOCOL(PPP).
PPP FRAME FORMAT
In random access or contention methods,no station is superior to
another station and none is assigned the control over another.No
station permits,or does not permit,another station to
send.Here,each station can transmit when it desires on the
condition that it follows the predefined procedure,including the
testing of the state of the medium.
Two features give this method it’s name:
• First,there is no scheduled time for a station to transmit.Transmission is random among
stations.That is why these methods are called random access.
• Second,no rules specify which station should sent next.Station compete with one another to
access the medium.That is why this methods are called contention methods.
PURE ALOHA:
PURE ALOHA: Vulnerable Time for Pure Aloha:
The throughput for pure ALOHA is S = G ×𝒆−𝟐𝑮
The maximum throughput 𝑺 𝒎𝒂𝒙 = 0.184
when G= (1/2)
SLOTTED ALOHA: Vulnerable Time for Slotted Aloha:
The throughput for pure ALOHA is S = G ×𝒆−𝑮
The maximum throughput 𝑺 𝒎𝒂𝒙 = 0.368
when G=1
CSMA: CARRIER SENSE MULTIPLE ACCESS:
The CSMA protocol operates on the principle of carrier sensing.In this protocol,a station listens to
see the presence of transmission (carrier) on the cable and decides to act accordingly.
CSMA/CD: CSMA WITH COLLISION DETECTION:
If two stations sense the channel to be
idle and begin transmitting
simultaneously,they both will detect
the collision almost
immediately.Rather than transmitting
their frames further,they will stop
transmitting as soon as the collision is
detected.Quickly terminating damaged
frames saves time and bandwidth.This
is known as CSMA/CD.
CSMA/CA: CSMA WITH COLLISION AVOIDANCE:
Collisions are avoided through the use of
CSMA/CA ‘s three strategies:
• Interframe space
• Contention window
• Acknowledgements
CONTROLLED ACCESS:
• In controlled access, the stations consult one another to find
which station has the right to send. A station cannot send
unless it has been authorized by other stations.
• We discuss three popular controlled-access methods.
i. Reservation
ii. Polling
iii. Token Passing
1.RESERVATION
• In the reservation method, a station needs to make a
reservation before sending data. Time is divided into intervals.
In each interval, a reservation frame precedes the data frames
sent in the interval.
FIGURE : RESERVATION ACCESS
METHOD
2.POLLING
• Polling works with topologies in which one device
is designated as a primary station and the other
devices are secondary stations.
• The primary device controls the link, the secondary
devices follow its instruction.
• If the primary wants to receive data, it asks the
secondaries if they have anything to send; this is
called poll function.
• If the primary wants to send data, it tells the secondary to get ready to
receive; this is called select function.
FIGURE : SELECT AND POLL FUNCTIONS IN POLLING ACCESS
METHOD
3.TOKEN PASSING
• In the token passing method, the station in a network are
organized in a logical ring. In other words, for each station,
there is a predecessor and a successor.
FIGURE : LOGICAL RING AND PHYSICAL TOPOLOGY IN TOKEN-PASSING ACCESS
METHOD
STANDARD ETHERNET
• The original Ethernet was created in 1976 at Xerox’s Palo Alto
Research Center (PARC). Since then, it has gone through four
generations. We briefly discuss the Standard (or traditional)
Ethernet in this section.
FIGURE : ETHERNET EVOLUTION THROUGH FOUR GENERATIONS
MAC SUBLAYER
• In Standard Ethernet , the MAC governs the operation of the access method. It also
frames data received from the upper layer and passes them to the physical layer.
FRAME FORMAT
• The Ethernet contains seven fields :
Preamble , SFD , DA , SA , length or type of protocol data
unit (PDU) , upper-layer data , and the CRC.
FIGURE : 802.3 MAC FRAME
CONNECTING DEVICES
• We divide connecting devices into five different categories
based on the layer in which they operate in a network.
FIGURE : FIVE CATEGORIES OF CONNECTING DEVICES
• We have the topics to discuss are as follows:
1. Passive hubs.
2. Repeaters.
3. Active hubs.
4. Bridges.
5. Two – Layer Switches.
6. Routers.
7. Three-Layer Switches.
8. Gateway.
1.PASSIVE HUBS
• A passive hub is just a connector. It connects the wires coming
from different branches. In a star-topology Ethernet LAN, a
passive hub is just a point where the signals coming from
different stations collide; the hub is the collision point. This
type of a hub is part of the media; its location is the Internet
model is below the physical layer.
2.REPEATERS
• A repeater is a device that operates only in the physical layer.
• A repeater connects two segments of a LAN.
• A repeater forwards every frame.
• A repeater is a regenerator , not an amplifier.
FIGURE : A REPEATER CONNECTING TWO SEGMENTS OF A
LAN
FUNCTION OF A REPEATER
3.ACTIVE HUBS
• An active hub is actually a multiport repeater. It is normally used to create connections
between stations in a physical star topology.
4.BRIDGES
• A bridge operates in both the physical and the data link layer. As a physical layer device,
it regenerates the signal as it receives. As a data link layer device, the bridge can check
the physical (MAC) addresses (source and destination) contained in the frame.
FIGURE : A BRIDGE CONNECTING TWO LANs
5.TWO-LAYER SWITCHES
• In this , we can have a two-layer switch or a three-layer switch. A
three-layer switch is used at the network layer; it is a kind of router.
The two-layer switch performs at the physical and data link layers.
• A two-layer switch is a bridge, a bridge with many ports and a
design that allows better (faster) performance.
• A two-layer switch, as a bridge does, makes a filtering decision
based on the MAC address of the frame it received.
6.ROUTERS
• A router is a three-layer device that routes packets based on
their logical addresses (host-to-host addressing). A router
normally connects LANs and WANs in the Internet and has a
routing table that is used for making decisions about the route.
The routing tables are normally dynamic and are updated using
routing protocols.
FIGURE : ROUTER CONNECTING INDEPENDENT LANs AND WANs
7.THREE-LAYER SWITCHES
• A three-layer switch is a router , but a faster and more sophisticated. The switching fabric
in a three-layer switch allows faster table lookup and forwarding.
8.GATEWAY
• A gateway is normally a computer that operates in all five layers of the Internet or seven
layers of OSI model. A gateway takes an application message ,reads it, and interprets it.
This means that it can be used as a connecting device between two internetworks that
use different models.
Computer Networks

More Related Content

What's hot

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access MethodsPrateek Soni
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocolKinza Razzaq
 
Resource reservation protocol
Resource reservation protocolResource reservation protocol
Resource reservation protocolAtakan ATAK
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routingHamzahMohammed4
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layersambhenilesh
 
Broadband Network Presentation
Broadband Network PresentationBroadband Network Presentation
Broadband Network PresentationMuhammad Faisal
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIPNaveen Kumar
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithmslavanyapathy
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithmRoshan Karunarathna
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 
Routing and routing algorithms
Routing and routing algorithmsRouting and routing algorithms
Routing and routing algorithmsBhatt Aadil
 

What's hot (20)

Week14 lec2
Week14 lec2Week14 lec2
Week14 lec2
 
Routing
RoutingRouting
Routing
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
Resource reservation protocol
Resource reservation protocolResource reservation protocol
Resource reservation protocol
 
Data link layer
Data link layerData link layer
Data link layer
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routing
 
Week13 lec1
Week13 lec1Week13 lec1
Week13 lec1
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
Broadband Network Presentation
Broadband Network PresentationBroadband Network Presentation
Broadband Network Presentation
 
Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Routing and routing algorithms
Routing and routing algorithmsRouting and routing algorithms
Routing and routing algorithms
 

Similar to Computer Networks

Similar to Computer Networks (20)

New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
Synchronous optical networking (SONET)
Synchronous optical networking (SONET) Synchronous optical networking (SONET)
Synchronous optical networking (SONET)
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
Ntdd
NtddNtdd
Ntdd
 
Ntdd
NtddNtdd
Ntdd
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
 
CAN.ppt
CAN.pptCAN.ppt
CAN.ppt
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
Dynamic time warping and PIC 16F676 for control of devices
Dynamic time warping and PIC 16F676 for control of devicesDynamic time warping and PIC 16F676 for control of devices
Dynamic time warping and PIC 16F676 for control of devices
 
Unit 2 ppt 3.ppt
Unit 2 ppt 3.pptUnit 2 ppt 3.ppt
Unit 2 ppt 3.ppt
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
Data Communications and Optical Network - Forouzan
Data Communications and Optical Network - ForouzanData Communications and Optical Network - Forouzan
Data Communications and Optical Network - Forouzan
 
Switch
SwitchSwitch
Switch
 

Recently uploaded

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Computer Networks

  • 2. • Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. • Error detection and correction are implemented either at data link layer or the transport layer of the OSI model.
  • 3. TYPES OF ERRORS: • Single bit error :- - Only one bit in the data unit has changed. • Burst error :- - It means that two or more bits in the data unit has changed.
  • 4. Single bit Error: 0 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0 Burst Error: 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1 0 1 0 1 1 1 0 1 0 1 0 0 0 0 1 1 0 changed to 1 ReceivedSent Sent Received Bits corrupted by Burst Error
  • 5. BLOCK CODES: • In block coding we divide our message into blocks, each of k bits , called datawords. We add r redundant bits to each block to make the length n = k+r. The resulting n-bits blocks are called codewords.
  • 8. LINEAR BLOCK CODES: • Almost all block codes used today belong to a subset called linear block codes. A linear block code is a code in which the exclusive OR (addition modulo-2) of two valid codewords creates another valid codeword. • Eg. Simple Parity Check Code & Hamming Code
  • 9. SIMPLE PARITY-CHECK CODE: • It is the simplest technique for detecting and correcting errors. The MSB of an 8-bits word is used as the parity bit and the remaining 7 bits are used as data or message bits. The parity of 8-bits transmitted word can be either even parity or odd parity.
  • 10. • Even parity -- Even parity means the number of 1's in the given word including the parity bit should be even (2,4,6,....). • Odd parity -- Odd parity means the number of 1's in the given word including the parity bit should be odd (1,3,5,....).
  • 12. HAMMING CODE: • In the Hamming code, k parity bits are added to an n-bit data word, forming a new word of n + k bits. The bit positions are numbered in sequence from 1 to n + k. Those positions numbered with powers of two are reserved for the parity bits. The remaining bits are the data bits. The code can be used with words of any length
  • 15. CYCLIC CODES: • Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword is cyclically shifted (rotated), the result is another codeword.
  • 17. DIVISION IN CRC ENCODER:
  • 18. DIVISION IN THE CRC DECODER FOR TWO CASES:
  • 19. CHECKSUM: • A checksum or hash sum is a small-size datum from a block of digital data for the purpose of detecting errors which may have been introduced during its transmission or storage. It is usually applied to an installation file after it is received from the download server
  • 21. CHECKSUM FOR A TEXT OF 8 CHARACTERS (“FOROUZAN”):
  • 22. STOP AND WAIT AUTOMATIC REPEAT REQUEST: Stop and Wait Automatic Repeat Request Protocol adds a simple error mechanism to the Stop and Wait Protocol.
  • 23. • Consider the example in the figure: • Frame0 is sent and acknowledgement is received. • Frame1 is lost and is resent after time-out. • The resent frame is acknowledged and the timer stops. • Frame0 is sent and acknowledged,but acknowledgement is lost. • The sender has no idea if the frame or acknowledgement is lost,so after time-out,it resends frame0,which is acknowledged.
  • 24. GO-BACK-N AUTOMATIC REPEAT REQUEST: • To improve the efficiency of transmission,multiple frames must be in transition while waiting for acknowledgement. • In Go-back-N automatic repeat request we can send several frames before receiving acknowledgements,we keep a copy of these frames until the acknowledgements arrive.
  • 25. GO-BACK-N AUTOMATIC REPEAT REQUEST: • In the Go-Back-N Protocol, the sequence numbers are modulo 𝟐 𝒎, where m is the size of the sequence number field in bits. • The send window is an abstract concept defining an imaginary box of size 𝟐 𝒎 − 1 with three variables: 𝑺 𝒇,𝑺 𝒏 and 𝑺 𝒔𝒊𝒛𝒆. • The send window can slide one or more slots when a valid acknowledgment arrives.
  • 26. GO-BACK-N AUTOMATIC REPEAT REQUEST: The receive window is an abstract concept defining an imaginary box of size 1 with one single variable 𝑹 𝒏. The window slides when a correct frame has arrived; sliding occurs one slot at a time.
  • 27. WINDOW SIZE FOR GO-BACK-N ARQ: In Go-Back-N ARQ, the size of the send window must be less than 𝟐 𝒎 ; the size of the receiver window is always 1. Example for m=2
  • 28. POINT-TO-POINT-PROTOCOL: The most common protocols for point-to-point access is POINT-TO-POINT PROTOCOL(PPP). PPP FRAME FORMAT
  • 29. In random access or contention methods,no station is superior to another station and none is assigned the control over another.No station permits,or does not permit,another station to send.Here,each station can transmit when it desires on the condition that it follows the predefined procedure,including the testing of the state of the medium. Two features give this method it’s name: • First,there is no scheduled time for a station to transmit.Transmission is random among stations.That is why these methods are called random access. • Second,no rules specify which station should sent next.Station compete with one another to access the medium.That is why this methods are called contention methods.
  • 31. PURE ALOHA: Vulnerable Time for Pure Aloha: The throughput for pure ALOHA is S = G ×𝒆−𝟐𝑮 The maximum throughput 𝑺 𝒎𝒂𝒙 = 0.184 when G= (1/2)
  • 32. SLOTTED ALOHA: Vulnerable Time for Slotted Aloha: The throughput for pure ALOHA is S = G ×𝒆−𝑮 The maximum throughput 𝑺 𝒎𝒂𝒙 = 0.368 when G=1
  • 33. CSMA: CARRIER SENSE MULTIPLE ACCESS: The CSMA protocol operates on the principle of carrier sensing.In this protocol,a station listens to see the presence of transmission (carrier) on the cable and decides to act accordingly.
  • 34. CSMA/CD: CSMA WITH COLLISION DETECTION: If two stations sense the channel to be idle and begin transmitting simultaneously,they both will detect the collision almost immediately.Rather than transmitting their frames further,they will stop transmitting as soon as the collision is detected.Quickly terminating damaged frames saves time and bandwidth.This is known as CSMA/CD.
  • 35. CSMA/CA: CSMA WITH COLLISION AVOIDANCE: Collisions are avoided through the use of CSMA/CA ‘s three strategies: • Interframe space • Contention window • Acknowledgements
  • 36. CONTROLLED ACCESS: • In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. • We discuss three popular controlled-access methods. i. Reservation ii. Polling iii. Token Passing
  • 37. 1.RESERVATION • In the reservation method, a station needs to make a reservation before sending data. Time is divided into intervals. In each interval, a reservation frame precedes the data frames sent in the interval. FIGURE : RESERVATION ACCESS METHOD
  • 38. 2.POLLING • Polling works with topologies in which one device is designated as a primary station and the other devices are secondary stations. • The primary device controls the link, the secondary devices follow its instruction. • If the primary wants to receive data, it asks the secondaries if they have anything to send; this is called poll function.
  • 39. • If the primary wants to send data, it tells the secondary to get ready to receive; this is called select function. FIGURE : SELECT AND POLL FUNCTIONS IN POLLING ACCESS METHOD
  • 40. 3.TOKEN PASSING • In the token passing method, the station in a network are organized in a logical ring. In other words, for each station, there is a predecessor and a successor.
  • 41. FIGURE : LOGICAL RING AND PHYSICAL TOPOLOGY IN TOKEN-PASSING ACCESS METHOD
  • 42. STANDARD ETHERNET • The original Ethernet was created in 1976 at Xerox’s Palo Alto Research Center (PARC). Since then, it has gone through four generations. We briefly discuss the Standard (or traditional) Ethernet in this section.
  • 43. FIGURE : ETHERNET EVOLUTION THROUGH FOUR GENERATIONS
  • 44. MAC SUBLAYER • In Standard Ethernet , the MAC governs the operation of the access method. It also frames data received from the upper layer and passes them to the physical layer.
  • 45. FRAME FORMAT • The Ethernet contains seven fields : Preamble , SFD , DA , SA , length or type of protocol data unit (PDU) , upper-layer data , and the CRC. FIGURE : 802.3 MAC FRAME
  • 46. CONNECTING DEVICES • We divide connecting devices into five different categories based on the layer in which they operate in a network. FIGURE : FIVE CATEGORIES OF CONNECTING DEVICES
  • 47. • We have the topics to discuss are as follows: 1. Passive hubs. 2. Repeaters. 3. Active hubs. 4. Bridges. 5. Two – Layer Switches. 6. Routers. 7. Three-Layer Switches. 8. Gateway.
  • 48. 1.PASSIVE HUBS • A passive hub is just a connector. It connects the wires coming from different branches. In a star-topology Ethernet LAN, a passive hub is just a point where the signals coming from different stations collide; the hub is the collision point. This type of a hub is part of the media; its location is the Internet model is below the physical layer.
  • 49. 2.REPEATERS • A repeater is a device that operates only in the physical layer. • A repeater connects two segments of a LAN. • A repeater forwards every frame. • A repeater is a regenerator , not an amplifier.
  • 50. FIGURE : A REPEATER CONNECTING TWO SEGMENTS OF A LAN
  • 51. FUNCTION OF A REPEATER
  • 52. 3.ACTIVE HUBS • An active hub is actually a multiport repeater. It is normally used to create connections between stations in a physical star topology.
  • 53. 4.BRIDGES • A bridge operates in both the physical and the data link layer. As a physical layer device, it regenerates the signal as it receives. As a data link layer device, the bridge can check the physical (MAC) addresses (source and destination) contained in the frame.
  • 54. FIGURE : A BRIDGE CONNECTING TWO LANs
  • 55. 5.TWO-LAYER SWITCHES • In this , we can have a two-layer switch or a three-layer switch. A three-layer switch is used at the network layer; it is a kind of router. The two-layer switch performs at the physical and data link layers. • A two-layer switch is a bridge, a bridge with many ports and a design that allows better (faster) performance. • A two-layer switch, as a bridge does, makes a filtering decision based on the MAC address of the frame it received.
  • 56. 6.ROUTERS • A router is a three-layer device that routes packets based on their logical addresses (host-to-host addressing). A router normally connects LANs and WANs in the Internet and has a routing table that is used for making decisions about the route. The routing tables are normally dynamic and are updated using routing protocols.
  • 57. FIGURE : ROUTER CONNECTING INDEPENDENT LANs AND WANs
  • 58. 7.THREE-LAYER SWITCHES • A three-layer switch is a router , but a faster and more sophisticated. The switching fabric in a three-layer switch allows faster table lookup and forwarding.
  • 59. 8.GATEWAY • A gateway is normally a computer that operates in all five layers of the Internet or seven layers of OSI model. A gateway takes an application message ,reads it, and interprets it. This means that it can be used as a connecting device between two internetworks that use different models.