SlideShare a Scribd company logo
1 of 23
DATA LINK CONTROL

Ariunchimeg.s@gmail.com
Outline







LINK THOUGHPUT
FLOW CONTROL
LINK MANAGEMENT
HIGH–LEVEL DATA LINK CONTROL (HDLC)
PROTOCOL
POINT-TO POINT PROTOCOL
LINK THOUGHPUT

Frame
Frame
overheads
overheads

The major factors that cause throughput to be less than the
transmission rate are listed below as follows:
Frame overheads
Propagation delay
Acknowledgements
Retransmissions
Processing time
Link utilization and efficiency
Effect of errors on throughput
Effect of ARQ on throughput
Optimum block length
LINK THOUGHPUT

Frame
Frame
overheads
overheads

:
Not all of the contents of a frame are information bits. Typically,
in addition to information bits, a frame also contains a header and a
trailer. The header contains control information such as an address
and sequence numbers. The trailer normally contains error-checking
bits which are often called a frame check sequence. A frame might
typically contain 256 bytes of which 251 are information bits, thus
leading to a 2% reduction in potential throughput even before the frame
is transmitted.

LINK THOUGHPUT

Propagation
Propagation
delay
delay

:
This is the time that it takes for a frame to propagate from one
end of a link to the other; that is, the difference in time between the first
bit of a frame leaving the send node and arriving at the receive node.
Propagation delay must not be confused with the frame transmission
time, which is the difference in time between the first bit and the last bit
of a frame leaving the send node. Propagation delay often has only a
small effect on throughput but in some situations, such as longdistance wireless links and especially satellite links, it can be a major
factor in reducing the throughput if acknowledgements are used.

LINK THOUGHPUT

Acknowledgemen
Acknowledgemen
ts
ts

:
Normally, some form of ARQ is used and time may be spent
waiting for acknowledgements to reach the send node, particularly if
there is a half duplex link. Since the acknowledgements will normally
be much shorter than the information frames, the transmission time of
the acknowledgements can often be ignored. However, the propagation
delay of an acknowledgement will be the same as that of an
information frame providing they take the same transmission path.

LINK THOUGHPUT

Retransmissions
Retransmissions

:
Frames may need to be retransmitted as a result of errors or
frames being discarded for whatever reason. The retransmission is
accompanied by acknowledgements if ARQ is being used. If the error
rate or discard rate is high then this is the most serious cause of
reduction in throughput.

LINK THOUGHPUT

Processing time
Processing time

:
Time is spent at the send and receive nodes in processing the
data. This includes detecting (and possibly correcting) errors and also
the implementation of flow control. If wireless links are used there will
be further processing delays associated with the modulation and
demodulation process.

LINK THOUGHPUT

Link utilization
Link utilization
and efficiency
and efficiency

Define two further terms
1. link utilization
Link utilization is simply the average traffic over a particular link
expressed as a percentage of the total link capacity
2. link efficiency.
Link efficiency is a less commonly used term that is defined as the
ratio of the time taken to transmit a frame (or frames) of data to the
total time it takes to transmit and acknowledge the frame or frames.

LINK THOUGHPUT



Link utilization
Link utilization
and efficiency
and efficiency

Link efficiency will depend on the type of ARQ used. The
efficiency of a link with stop-and-wait ARQ can be determined as
follows. If the time taken to transmit a frame or block of data is tf, the
propagation delay for both frame and acknowledgement is td, the
time taken to transmit an acknowledgement is ta and the total
processing time is tp, then:

In many situations the acknowledgement transmission time and
processing times can be ignored, giving:
LINK THOUGHPUT



Effect of errors on
Effect of errors on
throughput
throughput

The effect of transmission impairments on a data
communications link is to introduce errors . The number of errors
present in a link is expressed as a BER. If a link has a BER of 0.000
001 (10−6), this means that there is a probability of 0.000 001 that
any bit is in error. Alternatively, we can say that, on average, one in
every 1 000 000 bits will be in error. This may seem a very low error
rate but if bits are transmitted as a block in a frame then the
probability of the frame being in error will be much greater. The
frame error rate, P, can be obtained from the bit error rate, E, as
follows. The probability of a bit being error free is 1 − E and the
probability of a block of length n being error free is (1 − E)n. The
frame error probability is therefore:
LINK THOUGHPUT



Effect of ARQ on
Effect of ARQ on
throughput
throughput

:
If a frame is transmitted m times then the probability of this
occurring is the probability of transmitting m − 1 consecutive
erroneous frames followed by a single correctly received frame. This
is given by:
A problem which arises is that the number of times, m, that a frame
is transmitted will vary according to some form of probability
distribution. Since the determination of the value of m is not
particularly simple, the value is just presented here without any
analysis. For a full analysis see Bertsekas and Gallager (1992). If
stop-and-wait ARQ is used then the average number of times that a
frame is transmitted is given by:
LINK THOUGHPUT

1.

2.

3.

Effect of ARQ on
Effect of ARQ on
throughput
throughput

If go-back-n ARQ is used then an error detected in a frame causes
that frame, along with all other unacknowledged frames, to be retransmitted.
Frames are retransmitted only when a frame is rejected at the receiver for
being erroneous. In practice, there may be other reasons for frames being
retransmitted.
The rejection of frame i by the receiver is followed by the transmitter sending
frames i + 1, i + 2, . . . , i + n − 1 and then retransmitting the original frame i.
This may not always be the case since there may be fewer than n − 1
frames waiting to be transmitted after frame I .
The resulting analysis, which is also carried out in Bertsekas and Gallager
(1992), gives the number of times that a frame is likely to be transmitted as:
LINK THOUGHPUT


Optimum block
Optimum block
length
length

An increased block size still produces a larger number of
information bits transmitted in each block but a point will be reached
at which throughput falls as a result of having to retransmit a large
block of data each time an error is detected. This leads us to
consider an optimum length of block. Figure 5.1
FLOW CONTROL

Window
Window
mechanisms
mechanisms



A maximum limit is set on the number of copies that are being held
at the send node which is known as the send window. If the send
node reaches its maximum window size it stops transmitting and, in
the absence of any acknowledgements, it does not transmit any
more frames. When the



Figure 5.2
Operation of send window: (a) window full; (b) continuous
flow possible.
FLOW CONTROL



Effect of windows
Effect of windows
on throughput
on throughput

The throughput of a frame-oriented link using stop-andwait ARQ
depends upon the number of information bits, k, the frame
transmission time, tf, and the propagation delay, td, according to the
expression:
LINK MANAGEMENT


This process seems almost trivial at first sight but the situation becomes more
complex if a failure occurs on a link or at a node. A problem arises when frames have
been accepted for transmission over a link but have not reached a receive node before
a failure occurs. Link management procedures need to be able to cope with such
failures.

Figure 5.4

Link set-up and disconnection.
HIGH–LEVEL DATA LINK CONTROL (HDLC) PROTOCOL

The protocol allows for a variety of different types of link, the two
nodes at either end of the link being referred to as stations. To satisfy
the requirements of different types of link the protocol distinguishes
between three modes of operation (although only two of them are
normally used) and two types of link configuration:


1.Unbalanced

configuration:
2.Balanced configuration:
HIGH–LEVEL DATA LINK CONTROL (HDLC) PROTOCOL
Unbalanced
Unbalanced
configuration
configuration

This is the situation in which a single primary station has
control over the operation of one or more secondary stations. Frames
transmitted by the primary are called commands and those by the
secondary responses. A typical example of this type of configuration is
a multidrop link in which a single computer is connected to a number
of DTEs which are under its control. This mode of working is called
normal response mode ( NRM).

HIGH–LEVEL DATA LINK CONTROL (HDLC) PROTOCOL
Balanced
Balanced
configuration
configuration

This refers to a point-to-point link in which the nodes at each
end of the link have equal status, each capable of issuing a command.
HDLC calls these combined stations and they can transmit both
commands and responses. This mode of working is called
asynchronous balanced mode ( ABM ).

HIGH–LEVEL DATA LINK CONTROL (HDLC) PROTOCOL
HDLC frame structure
HDLC frame structure

HDLC uses synchronous transmission with data being
transmitted in frames. All frames have the common format shown in
Figure 5.5. The address and control fields are known collectively as a
header and the error-checking bits are called the frame check
sequence (FCS) or trailer.

.

POINT-TO POINT PROTOCOL


PPP frame
PPP frame
structure.
structure.

The frame header contains 1-byte address and control fields along with
an additional 2-byte protocol field. PPP does not assign individual station
addresses and the address field contains the binary sequence 11111111.
The control field contains the binary sequence 00000011. The protocol field
contains 2 bytes that identify the protocol encapsulated in the information
field of the frame. In addition to IP, PPP supports other protocols, including
Novell’s Internetwork Packet Exchange ( IPX) and IBM’s Synchronous
Network Architecture (SNA). The FCS performs an identical function to that
in an HDLC frame.

Figure 5.10

PPP frame structure.
.

POINT-TO POINT PROTOCOL



PPP uses a Link Control Protocol ( LCP) to establish, configure
and test the data link connection that goes through four distinct
phases: Three classes of LCP frames exist. Link-establishment
frames are used to establish and configure a link; link-termination
frames are used to terminate a link; and link maintenance frames
are used to manage and debug a link.

More Related Content

What's hot

A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...ijcseit
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batchJaimin Jani
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)Fatbardh Hysa
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocolRishu Seth
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSIJCNCJournal
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocolsBE Smârt
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
 

What's hot (18)

A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
Congestion control
Congestion controlCongestion control
Congestion control
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
Cs8591 u4
Cs8591 u4Cs8591 u4
Cs8591 u4
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 

Viewers also liked

Viewers also liked (6)

Ch04
Ch04Ch04
Ch04
 
SS7 Link Utilization
SS7 Link UtilizationSS7 Link Utilization
SS7 Link Utilization
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol Basic
 
Ch06
Ch06Ch06
Ch06
 
Ch05
Ch05Ch05
Ch05
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
 

Similar to Data link control

A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxlathass5
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxk2w9psdb96
 
connectionestablishmentflowandcongestioncontrol-190130165746.pdf
connectionestablishmentflowandcongestioncontrol-190130165746.pdfconnectionestablishmentflowandcongestioncontrol-190130165746.pdf
connectionestablishmentflowandcongestioncontrol-190130165746.pdfImXaib
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 
AhmedAymanMastersThesis
AhmedAymanMastersThesisAhmedAymanMastersThesis
AhmedAymanMastersThesisAhmed Ayman
 
Data link layer
Data link layerData link layer
Data link layersbkbca
 
CN R16 -UNIT-6.pdf
CN R16 -UNIT-6.pdfCN R16 -UNIT-6.pdf
CN R16 -UNIT-6.pdfJoshuaeeda1
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 

Similar to Data link control (20)

A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptx
 
DLL
DLLDLL
DLL
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
 
Data link layer
Data link layer Data link layer
Data link layer
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
 
connectionestablishmentflowandcongestioncontrol-190130165746.pdf
connectionestablishmentflowandcongestioncontrol-190130165746.pdfconnectionestablishmentflowandcongestioncontrol-190130165746.pdf
connectionestablishmentflowandcongestioncontrol-190130165746.pdf
 
5 DLL-LLC- Book
5 DLL-LLC- Book5 DLL-LLC- Book
5 DLL-LLC- Book
 
Unit 2
Unit 2Unit 2
Unit 2
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
AhmedAymanMastersThesis
AhmedAymanMastersThesisAhmedAymanMastersThesis
AhmedAymanMastersThesis
 
Data link layer
Data link layerData link layer
Data link layer
 
CN R16 -UNIT-6.pdf
CN R16 -UNIT-6.pdfCN R16 -UNIT-6.pdf
CN R16 -UNIT-6.pdf
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Mit6 02 f12_chap18
Mit6 02 f12_chap18Mit6 02 f12_chap18
Mit6 02 f12_chap18
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Unit 4
Unit 4Unit 4
Unit 4
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Data link control

  • 2. Outline      LINK THOUGHPUT FLOW CONTROL LINK MANAGEMENT HIGH–LEVEL DATA LINK CONTROL (HDLC) PROTOCOL POINT-TO POINT PROTOCOL
  • 3. LINK THOUGHPUT Frame Frame overheads overheads The major factors that cause throughput to be less than the transmission rate are listed below as follows: Frame overheads Propagation delay Acknowledgements Retransmissions Processing time Link utilization and efficiency Effect of errors on throughput Effect of ARQ on throughput Optimum block length
  • 4. LINK THOUGHPUT Frame Frame overheads overheads : Not all of the contents of a frame are information bits. Typically, in addition to information bits, a frame also contains a header and a trailer. The header contains control information such as an address and sequence numbers. The trailer normally contains error-checking bits which are often called a frame check sequence. A frame might typically contain 256 bytes of which 251 are information bits, thus leading to a 2% reduction in potential throughput even before the frame is transmitted. 
  • 5. LINK THOUGHPUT Propagation Propagation delay delay : This is the time that it takes for a frame to propagate from one end of a link to the other; that is, the difference in time between the first bit of a frame leaving the send node and arriving at the receive node. Propagation delay must not be confused with the frame transmission time, which is the difference in time between the first bit and the last bit of a frame leaving the send node. Propagation delay often has only a small effect on throughput but in some situations, such as longdistance wireless links and especially satellite links, it can be a major factor in reducing the throughput if acknowledgements are used. 
  • 6. LINK THOUGHPUT Acknowledgemen Acknowledgemen ts ts : Normally, some form of ARQ is used and time may be spent waiting for acknowledgements to reach the send node, particularly if there is a half duplex link. Since the acknowledgements will normally be much shorter than the information frames, the transmission time of the acknowledgements can often be ignored. However, the propagation delay of an acknowledgement will be the same as that of an information frame providing they take the same transmission path. 
  • 7. LINK THOUGHPUT Retransmissions Retransmissions : Frames may need to be retransmitted as a result of errors or frames being discarded for whatever reason. The retransmission is accompanied by acknowledgements if ARQ is being used. If the error rate or discard rate is high then this is the most serious cause of reduction in throughput. 
  • 8. LINK THOUGHPUT Processing time Processing time : Time is spent at the send and receive nodes in processing the data. This includes detecting (and possibly correcting) errors and also the implementation of flow control. If wireless links are used there will be further processing delays associated with the modulation and demodulation process. 
  • 9. LINK THOUGHPUT Link utilization Link utilization and efficiency and efficiency Define two further terms 1. link utilization Link utilization is simply the average traffic over a particular link expressed as a percentage of the total link capacity 2. link efficiency. Link efficiency is a less commonly used term that is defined as the ratio of the time taken to transmit a frame (or frames) of data to the total time it takes to transmit and acknowledge the frame or frames. 
  • 10. LINK THOUGHPUT  Link utilization Link utilization and efficiency and efficiency Link efficiency will depend on the type of ARQ used. The efficiency of a link with stop-and-wait ARQ can be determined as follows. If the time taken to transmit a frame or block of data is tf, the propagation delay for both frame and acknowledgement is td, the time taken to transmit an acknowledgement is ta and the total processing time is tp, then: In many situations the acknowledgement transmission time and processing times can be ignored, giving:
  • 11. LINK THOUGHPUT  Effect of errors on Effect of errors on throughput throughput The effect of transmission impairments on a data communications link is to introduce errors . The number of errors present in a link is expressed as a BER. If a link has a BER of 0.000 001 (10−6), this means that there is a probability of 0.000 001 that any bit is in error. Alternatively, we can say that, on average, one in every 1 000 000 bits will be in error. This may seem a very low error rate but if bits are transmitted as a block in a frame then the probability of the frame being in error will be much greater. The frame error rate, P, can be obtained from the bit error rate, E, as follows. The probability of a bit being error free is 1 − E and the probability of a block of length n being error free is (1 − E)n. The frame error probability is therefore:
  • 12. LINK THOUGHPUT  Effect of ARQ on Effect of ARQ on throughput throughput : If a frame is transmitted m times then the probability of this occurring is the probability of transmitting m − 1 consecutive erroneous frames followed by a single correctly received frame. This is given by: A problem which arises is that the number of times, m, that a frame is transmitted will vary according to some form of probability distribution. Since the determination of the value of m is not particularly simple, the value is just presented here without any analysis. For a full analysis see Bertsekas and Gallager (1992). If stop-and-wait ARQ is used then the average number of times that a frame is transmitted is given by:
  • 13. LINK THOUGHPUT  1. 2. 3. Effect of ARQ on Effect of ARQ on throughput throughput If go-back-n ARQ is used then an error detected in a frame causes that frame, along with all other unacknowledged frames, to be retransmitted. Frames are retransmitted only when a frame is rejected at the receiver for being erroneous. In practice, there may be other reasons for frames being retransmitted. The rejection of frame i by the receiver is followed by the transmitter sending frames i + 1, i + 2, . . . , i + n − 1 and then retransmitting the original frame i. This may not always be the case since there may be fewer than n − 1 frames waiting to be transmitted after frame I . The resulting analysis, which is also carried out in Bertsekas and Gallager (1992), gives the number of times that a frame is likely to be transmitted as:
  • 14. LINK THOUGHPUT  Optimum block Optimum block length length An increased block size still produces a larger number of information bits transmitted in each block but a point will be reached at which throughput falls as a result of having to retransmit a large block of data each time an error is detected. This leads us to consider an optimum length of block. Figure 5.1
  • 15. FLOW CONTROL Window Window mechanisms mechanisms  A maximum limit is set on the number of copies that are being held at the send node which is known as the send window. If the send node reaches its maximum window size it stops transmitting and, in the absence of any acknowledgements, it does not transmit any more frames. When the  Figure 5.2 Operation of send window: (a) window full; (b) continuous flow possible.
  • 16. FLOW CONTROL  Effect of windows Effect of windows on throughput on throughput The throughput of a frame-oriented link using stop-andwait ARQ depends upon the number of information bits, k, the frame transmission time, tf, and the propagation delay, td, according to the expression:
  • 17. LINK MANAGEMENT  This process seems almost trivial at first sight but the situation becomes more complex if a failure occurs on a link or at a node. A problem arises when frames have been accepted for transmission over a link but have not reached a receive node before a failure occurs. Link management procedures need to be able to cope with such failures. Figure 5.4 Link set-up and disconnection.
  • 18. HIGH–LEVEL DATA LINK CONTROL (HDLC) PROTOCOL The protocol allows for a variety of different types of link, the two nodes at either end of the link being referred to as stations. To satisfy the requirements of different types of link the protocol distinguishes between three modes of operation (although only two of them are normally used) and two types of link configuration:  1.Unbalanced configuration: 2.Balanced configuration:
  • 19. HIGH–LEVEL DATA LINK CONTROL (HDLC) PROTOCOL Unbalanced Unbalanced configuration configuration This is the situation in which a single primary station has control over the operation of one or more secondary stations. Frames transmitted by the primary are called commands and those by the secondary responses. A typical example of this type of configuration is a multidrop link in which a single computer is connected to a number of DTEs which are under its control. This mode of working is called normal response mode ( NRM). 
  • 20. HIGH–LEVEL DATA LINK CONTROL (HDLC) PROTOCOL Balanced Balanced configuration configuration This refers to a point-to-point link in which the nodes at each end of the link have equal status, each capable of issuing a command. HDLC calls these combined stations and they can transmit both commands and responses. This mode of working is called asynchronous balanced mode ( ABM ). 
  • 21. HIGH–LEVEL DATA LINK CONTROL (HDLC) PROTOCOL HDLC frame structure HDLC frame structure HDLC uses synchronous transmission with data being transmitted in frames. All frames have the common format shown in Figure 5.5. The address and control fields are known collectively as a header and the error-checking bits are called the frame check sequence (FCS) or trailer. 
  • 22. . POINT-TO POINT PROTOCOL  PPP frame PPP frame structure. structure. The frame header contains 1-byte address and control fields along with an additional 2-byte protocol field. PPP does not assign individual station addresses and the address field contains the binary sequence 11111111. The control field contains the binary sequence 00000011. The protocol field contains 2 bytes that identify the protocol encapsulated in the information field of the frame. In addition to IP, PPP supports other protocols, including Novell’s Internetwork Packet Exchange ( IPX) and IBM’s Synchronous Network Architecture (SNA). The FCS performs an identical function to that in an HDLC frame. Figure 5.10 PPP frame structure.
  • 23. . POINT-TO POINT PROTOCOL  PPP uses a Link Control Protocol ( LCP) to establish, configure and test the data link connection that goes through four distinct phases: Three classes of LCP frames exist. Link-establishment frames are used to establish and configure a link; link-termination frames are used to terminate a link; and link maintenance frames are used to manage and debug a link.