CINF Chapter 4.2

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Data Link Layer

  • Layer 2 in the Internet Model

  • Responsible for moving messages from one device to another

  • Controls the way messages are sent on media

    • Relieves the upper layers from having to figure out how to access the media

  • Organizes physical layer bit streams into coherent messages for the network layer

<ul><li><p>Layer 2 in the Internet Model</p></li><li><p>Responsible for moving messages from one device to another</p></li><li><p>Controls the way messages are sent on media</p><ul><li><p>Relieves the upper layers from having to figure out how to access the media</p></li></ul></li><li><p>Organizes physical layer bit streams into coherent messages for the network layer</p></li></ul><p></p>
2
New cards

Major Functions of a Data Link Layer Protocol

  • Media Access Control

  • Error Control

  • Message Delineation

3
New cards

Media Access Control

Controls which device transmits and when

4
New cards

Error Control

Detecting and correcting transmission errors

5
New cards

Message Delineation

Identifying the beginning and end of a message

6
New cards

Multipoint (shared) circuits

Ensure that no two computers attempt to transmit data at the same time

7
New cards

Half-duplex point-to-point circuits

Computers tale turns

8
New cards

Two approaches to control

  • Contention access

  • Controlled access

<ul><li><p>Contention access</p></li><li><p>Controlled access</p></li></ul><p></p>
9
New cards

Contention Acess

  • Transmit whenever circuit is available with no centralized control

    • Common in Ethernet LANs

    • When devices transmit at the same time, a collision occurs

  • Some techniques to avoid collision

    • Transmission detection and random delays

10
New cards

Controlled Access

  • Common in wireless LANs: Acts like a spot light

  • Access Request

    • Each device must get “permission” to transmit, similar to raising a hand

  • Polling

    • Server (periodically) polls the client if it has data to send

      • Roll call polling

      • Hub polling/token passing

<ul><li><p>Common in wireless LANs: Acts like a spot light</p></li><li><p><strong>Access Request</strong></p><ul><li><p>Each device must get “permission” to transmit, similar to raising a hand</p></li></ul></li><li><p><strong>Polling</strong></p><ul><li><p>Server (periodically) polls the client if it has data to send</p><ul><li><p>Roll call polling</p></li><li><p>Hub polling/token passing</p></li></ul></li></ul></li></ul><p></p>
11
New cards

Media Access Control Diagram

knowt flashcard image
12
New cards

Error Control

  • Network errors

    • Types

      • Corrupted data

      • Lost data

13
New cards

Networks should be designed with:

  • Error prevention

  • Error detection

  • Error correction

14
New cards

Sources of Network Errors

  • Line noise and distortion

    • Major reason for errors and caused by several sources

    • More likely on electrical media

    • Undesirable electrical signal

    • Degrades performance of a circuit

    • Manifestation

      • Extra bits

      • “Flipped” bits

      • Missing bits

15
New cards

Error Prevention

knowt flashcard image
16
New cards

Error Detection

  • Receivers need to know when the data transmitted is not corrected

  • Solution: send extra data with each message

    • Add “check value” (error detection value) to message

<ul><li><p>Receivers need to know when the data transmitted is not corrected</p></li><li><p>Solution: send extra data with each message</p><ul><li><p>Add “check value” (error detection value) to message</p></li></ul></li></ul><p></p>
17
New cards

Error Detection 2

  • Both sender and receiver calculate check value

  • Receiver tests whether the check values match

<ul><li><p>Both sender and receiver calculate check value</p></li><li><p>Receiver tests whether the check values match</p></li></ul><p></p>
18
New cards

Three Error Detection Methods

  1. Parity

  2. Checksums

  3. Cyclical Redundancy Check (CRC)

19
New cards

Parity Check

  • A single parity bit: 1-bit check value

  • Based on the number of 1’st in the message

    • Even parity: number of 1’s remains even

    • Odd parity: number of 1’s remains odd

20
New cards

Parity Check Example

  • Detect single error? Yes

  • Two? No

  • It does not know what the error is

<ul><li><p>Detect single error? Yes</p></li><li><p>Two? No</p></li><li><p>It does not know what the error is</p></li></ul><p></p>
21
New cards

Checksum

  • 1-byte (typically) check value

  • Checksum algorithms vary in the creation of check values: Sum up

  • Method:

    • Add decimals values of each character in the message

    • Divide the sum by 255

    • The remainder is the checksum value

22
New cards

Checksum Example

  • Sum of decimal = 410

  • 410/225 = 1 + 155/255

  • 155 = 10011011

  • Easy to compute, but fragile

    • but error are frequently undetected

<ul><li><p>Sum of decimal = 410</p></li><li><p>410/225 = 1 + 155/255</p></li><li><p>155 = 10011011</p></li><li><p>Easy to compute, but fragile</p><ul><li><p>but error are frequently undetected</p></li></ul></li></ul><p></p>
23
New cards

Cyclic Redundancy Check (CRC)

-Treats messages as a single binary number (p)

-Divides by a present number (the generator, G)

-Uses remainder as the check vale (R)

  • Generator is chosen so that remainder is the correct number of bits

    • Most powerful and most common

    • Detects100% of error if number of error <= size of R.

24
New cards

Error Correction Techniques

  • Retransmission (or backward error correction)

  • Automatic Repeat reQuest (ARQ)

    • Stop-and-wait ARQ

    • Continuous ARQ

  • Forward error correction

    • Receiving device can correct messages without retransmission

25
New cards

Error Correction

<p></p><img src="https://knowt-user-attachments.s3.amazonaws.com/0e161ea7-62ee-4a66-ad79-ee8984084886.png" data-width="75%" data-align="left"><p></p>
26
New cards

Error Correction 2

<p></p><img src="https://knowt-user-attachments.s3.amazonaws.com/a3ab46e9-c9e5-4367-925e-3a5f5e216590.png" data-width="100%" data-align="center"><p></p>
27
New cards

Error Correction 3

<p></p><img src="https://knowt-user-attachments.s3.amazonaws.com/3721c0a8-912c-46c3-bb61-e45205c1c1c4.png" data-width="100%" data-align="center"><p></p>
28
New cards

Forward Error Correction

  • Includes a certain level of redundancy in transmitted data so that receiving device can correct errors

  • Does not require retransmission

  • Used only when retransmission is impossible, very costly, or time consuming (e.g., satellite connections)

29
New cards

Error Correction - Hamming Code

Each data bit figures into three EVEN parity bit calculations

If any one bit (parity or data) changes → change in data bit can be detected and corrected

  • only works for one bit error

<p>Each data bit figures into three EVEN parity bit calculations</p><p>If any one bit (parity or data) changes → change in data bit can be detected and corrected</p><ul><li><p>only works for one bit error</p></li></ul><p></p>
30
New cards

Error control in practice

  • On wired connections, errors are quite rare

  • Most data link layer software today does not correct errors, only detect them and discard frames with errors

  • Error correction must then be done at a higher layer (Transport)

31
New cards

2 types of Classification

  • Asynchronous transmission

  • Synchronous transmission

32
New cards

Protocols differ by

  • Message delineation

  • Frame length

  • Frame field structure

33
New cards

Asynchronous serial transmission (async)

  • old protocol (e.g., used in teletype)

  • transmits one character at a time

  • delineation indicated by start and stop bits

<ul><li><p>old protocol (e.g., used in teletype)</p></li><li><p>transmits one character at a time</p></li><li><p>delineation indicated by start and stop bits</p></li></ul><p></p>
34
New cards

Synchronous transmission

  • Data sent in a large block called a frame

  • Includes addressing information

  • Includes synchronization characters to let the receiver know when data transmission begins

  • Example protocols: SDLC, HDLC, Ethernet, PPP

35
New cards

Ethernet

  • IEEE 802.3 standard and Ethernet II

    • Mostly widely used LAN protocol, developed jointly by Digital, Intel, and Xerox, now an IEEE standard

  • Most widely used LAN protocol

  • Uses contention media access control

36
New cards

Ethernet II Frame

interframe gap (12 bytes)

<p>interframe gap (12 bytes)</p>
37
New cards

MAC Address

  • Also called physical address

    • Used to get datagram from one interface to another physically-connected interface (same network)

  • 48-bit (6 byte) MAC address

    • ex: 8C-AE-4C-FA-63-9E

    • burned in the adapter ROM

    • 6 groups of two hexadecimal digits

<ul><li><p>Also called physical address</p><ul><li><p>Used to get datagram from one interface to another physically-connected interface (same network)</p></li></ul></li><li><p>48-bit (6 byte) MAC address</p><ul><li><p>ex: 8C-AE-4C-FA-63-9E</p></li><li><p>burned in the adapter ROM</p></li><li><p>6 groups of two hexadecimal digits</p></li></ul></li></ul><p></p>
38
New cards