Data Link Control
FRAMING
The data link layer needs to pack bits into frames, so that each frame is distinguishable from another. Our postal system practices a type of framing. The simple act of inserting a letter into an envelope separates one piece of information from another; the envelope serves as the delimiter.
Data Link Control
FRAMING
The data link layer needs to pack bits into frames, so that each frame is distinguishable from another. Our postal system practices a type of framing. The simple act of inserting a letter into an envelope separates one piece of information from another; the envelope serves as the delimiter.
DATA LINK LAYER DEALS WITH THE lLLC LAYER AND MAC SUBLAYER.IT DEALS WITH FRAMING ,FLOW CONTROL,ERROR CONTROL.IT ALSO DEALS WITH RANDOM ACCESS METHODS AND PROTOCOLS
DATA LINK LAYER DEALS WITH THE lLLC LAYER AND MAC SUBLAYER.IT DEALS WITH FRAMING ,FLOW CONTROL,ERROR CONTROL.IT ALSO DEALS WITH RANDOM ACCESS METHODS AND PROTOCOLS
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
StarCompliance is a leading firm specializing in the recovery of stolen cryptocurrency. Our comprehensive services are designed to assist individuals and organizations in navigating the complex process of fraud reporting, investigation, and fund recovery. We combine cutting-edge technology with expert legal support to provide a robust solution for victims of crypto theft.
Our Services Include:
Reporting to Tracking Authorities:
We immediately notify all relevant centralized exchanges (CEX), decentralized exchanges (DEX), and wallet providers about the stolen cryptocurrency. This ensures that the stolen assets are flagged as scam transactions, making it impossible for the thief to use them.
Assistance with Filing Police Reports:
We guide you through the process of filing a valid police report. Our support team provides detailed instructions on which police department to contact and helps you complete the necessary paperwork within the critical 72-hour window.
Launching the Refund Process:
Our team of experienced lawyers can initiate lawsuits on your behalf and represent you in various jurisdictions around the world. They work diligently to recover your stolen funds and ensure that justice is served.
At StarCompliance, we understand the urgency and stress involved in dealing with cryptocurrency theft. Our dedicated team works quickly and efficiently to provide you with the support and expertise needed to recover your assets. Trust us to be your partner in navigating the complexities of the crypto world and safeguarding your investments.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
2. 11.2
Data LINK LAYER
This layer provides reliable transmission of a packet by using the
services of the physical layer. This layer is also responsible for node
to node transmission.
Framing: This layer divides the stream of bits received from the network
layer in to small data units, called frames.
Physical addressing: when frame goes to different system this layer adds a
header to the frame which contain the sender and receiver address, called
physical address.
3. 11.3
Flow control: The rate at which sender sends the data is high then the rate at
which receiver receives the data, then there will be a problem. So this layer
control of flow of data.
Error control: The frames may be damaged, lost or duplicated leading errors.
So this layer also control errors.
Acknowledgment: Sent by the receiving end to inform the source that the
frame was received successfully without any error.
Framing: As we know that data link layer creates the frame and it also
recognized the boundaries of frame. This can be accomplished by attaching
special bit patterns to the beginning and end of the frame.
4. 4
FRAMING
The data link layer needs to pack bits into frames, so
that each frame is distinguishable from another. Our
postal system practices a type of framing. The simple
act of inserting a letter into an envelope separates one
piece of information from another; the envelope serves
as the delimiter.
Character Count
Character stuffing
Bit stuffing
Topics discussed in this section:
9. 7
Bit stuffing is the process of adding one
extra 0 if 011111 is encountered in data,
so that the receiver does not mistake
the pattern 0111110 for a flag.
Note
11. 9
11-2 FLOW AND ERROR CONTROL
The most important responsibilities of the data link
layer are flow control and error control. Collectively,
these functions are known as data link control.
Flow Control
Error Control
Topics discussed in this section:
12. 10
Flow control refers to a set of procedures
used to restrict the amount of data
that the sender can send before
waiting for acknowledgment.
Note
Aka: Don’t overwhelm the receiver!
13. 11
Error control in the data link layer is
based on automatic repeat request,
which is the retransmission of data.
Note
14. 12
11-3 PROTOCOLS
Now let us see how the data link layer can combine
framing, flow control, and error control to achieve the
delivery of data from one node to another.
16. 14
11-4 NOISELESS CHANNELS
Let us first assume we have an ideal channel in which
no frames are lost, duplicated, or corrupted. We
introduce two protocols for this type of channel.
Simplest Protocol
Stop-and-Wait Protocol
Topics discussed in this section:
17. 15
Figure 11.6 The design of the simplest protocol with no flow or error control
18. 16
In simplest protocol, there is no flow control and error control
mechanism.
It is a unidirectional protocol in which data frames travel in
only one direction (from sender to receiver).
The receiver can immediately handle any received frame with a
processing time that is small enough to be negligible.
The protocol consists of two distinct procedures :a sender and
receiver.
The sender runs in the data link layer of the source machine
and the receiver runs in the data link layer of the destination
machine.
No sequence number or acknowledgements are used here.
21. 19
Stop-and-Wait Protocol
The simplest retransmission protocol is stop-and-wait.
Transmitter (Station A) sends a frame over the communication
line and then waits for a positive or negative acknowledgement
from the receiver (station B).
If no error occurs in the transmission, station B sends a
positive acknowledgement (ACK) to station A. transmitter starts
to send the next frame.
If frame is received at station B with errors, then a negative
acknowledgement(NAK) is sent to station A.
Station 'A' must retransmit the old packet in a new frame.
22. 20
Stop-and-Wait Protocol Conti..
There is also a possibility that the information frames or
ACKs may get lost.
The sender is equipped with a timer. If no recognizable
acknowledgement is received when the timer expires at the end
of time out interval, the same frame is sent again.
The sender which sends one frame and then waits for an
acknowledgement before process is known as stop and wait.
24. 22
11-5 NOISY CHANNELS
Although the Stop-and-Wait Protocol gives us an idea
of how to add flow control to its predecessor, noiseless
channels are nonexistent. We discuss three protocols
in this section that use error control.
Stop-and-Wait Automatic Repeat Request (ARQ)
Go-Back-N Automatic Repeat Request
Selective Repeat Automatic Repeat Request
Topics discussed in this section:
25. 23
In Stop-and-Wait ARQ, the
acknowledgment number always
announces in modulo-2 arithmetic the
sequence number of the next frame
expected.
Note
27. Transport Layer
3-27
Stop-and-Wait ARQ Overview
Sender waits “reasonable” amount of time for ACK
Thus Sender needs a countdown timer
Start the timer when a packet is sent
retransmits if no ACK received within the timeout period
if pkt (or ACK) just delayed (not lost):
retransmission will create duplicate packet
Thus it requires packet sequence number and ack
number to be used
Only two numbers are used: 0, 1
Receiver’s Ack number is what he is expected next
After receiving Pkt 0, sends back ACK 1
After receiving Pkt 1, sends back ACK 0
25
29. 27
Stop-and-Wait ARQ is a special case of
Go-Back-N ARQ in which the size of the
send window is 1.
Note
30. 28
Sliding Window
Send multiple frames before waiting for ACK
Several frames can be in transit at a time
Sender window vs. receiver window
Frames can be ACKed without waiting for the
receiver window to fill up
Frames may be sent as long as there are unsent
packets in the sender window
If header of the frame allow k bits ,the sequence
number ranges from 0 to 2^k -1
31. 31
Sliding Window
Sender window:
Shrink from left as frames are sent
Expand from right as you receive ACKs
The size of sender window is at most 2^k -1
Sender is also provided with buffer equal to the
window size
Receiver window:
Shrink from left as frames are received
Expand from right as ACKs are sent
The Size of receiver window is 1
32. 30
Based on sliding window protocol
All frames after damaged or lost frame are discarded
Damaged Frames:
Say, frames 0-5 are sent and all but frame # 3 is
correctly received Receiver sends NAK 3 and discards
subsequent frames
This signals to sender that frames 0, 1, and 2 are
correctly received and frame 3 is damaged
Sender retransmits frames 3, 4, and 5
Same procedure for lost data frames
Go-Back-n ARQ
33. 31
Go-Back-n ARQ
Host A Host B
Data 0
NAK 3
Data 1
Data 2
Data 3
Data 4
Data 5
Error, discard
Data 3
Data 4
Data 5
Discard
Discard
Window size 7
Error in data frame 3
34. Lost ACK:
When sender reaches window capacity, it
starts a timer
If timer expires, it resends all outstanding
(unACKed) frames
The receiver discards possible duplicate
frames and sends another ACK
32
Go-Back-n ARQ Conti..
35. Go-Back-n ARQ Conti..
Host A Host B
Data 0
ACK 3
Data 1
Data 2
Data 0
Data 1
Data 2
Lost
Window Size 3
Lost ACK case
Timer
expires
33
36. Selective Repeat ARQ
Problem with Go-back-N:
Sender: resend many packets with a single lose
Receiver: discard many good received (out-of-order) packets
Very inefficient when N becomes bigger (in high-speed network)
Solution: Receiver individually acknowledges all correctly
received pkts
buffers pkts, as needed, for eventual in-order delivery to upper
layer
sender only resends pkts for which ACK not received
sender keeps timer for each unACKed pkt
sender window
N consecutive seq #’s
again limits seq #s of sent, unACKed pkts
34
37. Selective Repeat ARQ
Host A Host B
Data 0
NAK 3
Data 1
Data 2
Data 3
Data 4
Data 5
Error, discard
Data 3
Window size 7
Error in data frame 3
Data 6
35
38. Selective Repeat ARQ
Lost Data Frames:
Out-of-sequence delivery is permitted, but
out-of-sequence ACK is not
When a lost frame is detected, NAK is sent
If last frame is lost, then receiver does
nothing
Lost ACK:
Handled the same way as in go-back-n
36