High-Level Data Link Control



Similar documents
Data Link Protocols. 5.4 Framing

Data Link Protocols. TCP/IP Suite and OSI Reference Model

SLIP and PPP. Gursharan Singh Tatla

PPP (Point-to-Point Protocol)

Data Link Layer Overview

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

LLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

WAN Data Link Protocols

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

Introduction to WAN Technologies

Frame Relay and Frame-Based ATM: A Comparison of Technologies

11/22/

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Introduction to WAN Technologies

Internetworking. Problem: There is more than one network (heterogeneity & scale)

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture

Data Communication Networks and Converged Networks

Computer Networks. Data Link Layer

PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. PPP encapsulates data frames for

This course has been retired. View the schedule of current <a href=

Ethernet. Ethernet. Network Devices

Subnetting,Supernetting, VLSM & CIDR

DATA COMMUNICATION AND NETWORKS

Communications and Computer Networks

Chapter 2 - The TCP/IP and OSI Networking Models

Communication Systems Internetworking (Bridges & Co)

Raj Jain. The Ohio State University Columbus, OH These slides are available on-line at:

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Ring Local Area Network. Ring LANs

CSE 3461 / 5461: Computer Networking & Internet Technologies

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Protocols and Architecture. Protocol Architecture.

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Communication Networks. MAP-TELE 2011/12 José Ruela

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

The OSI and TCP/IP Models. Lesson 2

Quectel Cellular Engine

Computer Networks. Chapter 5 Transport Protocols

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Introduction To Computer Networking

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Link Layer Discovery Protocol

Transport Layer Protocols

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

COMPUTER NETWORKS REVIEW QUESTIONS AND PROBLEMS

Configuring Demand Routing for Primary ISDN Modules

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Notes Odom, Chapter 4 Flashcards Set:

Based on Computer Networking, 4 th Edition by Kurose and Ross

Terms VON. VoIP LAN WAN CODEC

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Networking Test 4 Study Guide

2. IP Networks, IP Hosts and IP Ports

Lecture Computer Networks

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Chapter 9. IP Secure

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

High Performance VPN Solutions Over Satellite Networks

The TCP/IP Protocol Suite

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Chapter 5. Data Communication And Internet Technology

Transport and Network Layer

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization

Protocols. Packets. What's in an IP packet

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

In this lecture we will start our discussion on another very important technology, namely, Asynchronous Transfer Mode or ATM.

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

! encor en etworks TM

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Overview of Computer Networks

Data Communication and Computer Network

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

WAN Technology. Heng Sovannarith

1ISDN. August Software Reference ISDN 1

Computer Networks CS321

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

Guideline for setting up a functional VPN

MANAGEMENT INFORMATION SYSTEMS 8/E

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri

Connection Services. Hakim S. ADICHE, MSc

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Voice Over IP Per Call Bandwidth Consumption

Protocol Architecture. ATM architecture

RARP: Reverse Address Resolution Protocol

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Asynchronous Transfer Mode

This chapter discusses Synchronous Data Link Control (SDLC) protocols that you can configure on a BANDIT device s ports. See the following sections:

Transcription:

High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD) for ISDN, and Logic Link Control (LLC) for FDDI The frame format is: Note that address and control can be extended to 16 bits, so that sequence number is 7-bit Frame flag: 01111110, so bit stuffing is used bits Flag bit position Information: Supervisory: Unumbered: Address Control Data 8 8 8 variable 16 1 2 3 4 5 6 7 8 0 N(S) P/F N(R) 1 0 S P/F N(R) 1 1 M P/F M FCS Flag N(S)=send sequence number N(R)=receive sequence number S=supervisory function bits M=unumbered function bits P/F=poll/final bit Address: For multipoint operation, it is used to identify the terminal that transmits or receives the frame and, in point-to-point link, it is used to distinguish Commands from Responses (2nd bit for C/R: 0/1). The address is now extended to 16 bits (1st bit indicates long/short 16/8 bits) Checksum: FCS contains the remainder of a 16-bit CRC calculation of the frame. It may be extended to 32 bits, using a 32-bit CRC Control: Three types of frames, I, S and U frames. The old protocol uses a sliding window with 3-bit sequence number and the maximum window size is N = 7. The control field is now extended to 16 bits with 7-bit sequence number 8 60

HDLC (continue) I-frames: carry user data. Additionally, flow and error control (ACKs) may be piggybacked inside the control field of an I-frame using N(R). P/F bit is P for command and F for response S-frames: provide flow/error control when piggybacking is not used. These include Receive Ready (RR, S bits=00) REJect (REJ, S bits=01) Receive Not Ready (RNR, S bits=10) Possibly, Selective REJect (SREJ, S bits=11) P/F bit: when set to P forces the other machine to response immediately rather than waiting for an I-frame to piggybacking Illustration: Busy condition U-frames: are mainly for control purposes, i.e. Received I3 but becomes busy not busy now N(s) I, 3, 0... N(R) RR, 0; P RR, 0; P I, 4, 0 RNR, 4 RNR, 4; F RR, 4; F establishing and terminating connections, unnumbered ACK, etc., but can also be used to carry data for unacknowledged connectionless services, and type is defined by M bits Examples: Set Asynchronous Balanced Mode (SABM) for resetting the line, DISConnect (DISC) for terminating logical link connection, and Unnumbered Acknowledgement (UA) B N(R) A Time 61

Frame Relay Having examined a class of full data link layer protocols, let us see a bare DLL protocol Let us first look into traditional packet switching network, X.25, which employs full data link layer functions Consider flow of data link frames required for transmission of a single data packet from source to destination and return of an ACK packet At each hop through network, DLL protocol involves the exchange of a data frame and an ACK, and carries out full flow/error control for each virtual circuit 16 1 source 3 2 15 4 intermediate node 14 13 6 5 11 12 8 destination Total: 16 packets! This is very robust, but time consuming and not feasible for high speed, and it may be unnecessary for high-quality, reliable links Now consider an alternative strategy, call frame relay: At each hop, data link layer does not involved in flow/error control With such a bare data link layer, lower delay and higher throughput can be achieved This kind of strategy does relay on links being highly reliable, hardly anytime goes wrong 1 8 source 7 intermediate node 2 6 3 9 5 7 destination 10 Total: 8 packets! 4 62

Frame Relay (continue) Frame relay frame format is very similar to HDLC except of no control field and, crucially, no sequence number bits Flag 8 Address Data FCS Flag 16 variable 16 8 There is only one frame type for carrying user data It is not possible to perform flow/error control since there are no sequence numbers Data link layer only does: separating frames using flags; forcing data transparency by bit stuffing; checking frames for errors, and frames with errors are simply discarded Error and flow control, if implemented, is left for higher layer between end users to do (data link layer does not get involved) Full data link layer protocols make sense for unreliable networks With frequent errors, they can be dealt with more efficiently at each (local) link level where errors occur Otherwise, error recovery will be required frequently at higher layer, which may cost more Increasingly, as networks get more and more reliable and are designed for higher speed, bare data link layer protocols are adopted more and more This achieves considerable overhead savings in software processing Occasional errors may left to higher layer to deal with on an end-to-end base 63

Data Link Layer at ATM To achieve high speed, data link layer functions must be down to a minimum Data link layer in ATM does very little Part of transmission convergence sublayer in ATM perform DLL functions Sending cells: ATM layer takes 48-byte cell payload, generates the cell header except HEC, passes them to TC TC then generates HEC (layer 2 function), and cells go to physical layer for transmission TC also does some physical layer functions, matching bit stream to the speed of physical medium by inserting idle cells Receiving cells: from incoming bit stream, TC locates cell boundary, then Checks header, discards cells with invalid header, passes cells to ATM layer Note: The 48-byte payload in cell is not checked for error (no checksum for payload), and there is no sequence number There is no flow/error control at data link layer level 64

Data Link Layer in Internet Note that for HDLC class, frame relay and ATM, we are dealing with uniform network, i.e. machines at the two ends of a link support same protocols Internet consists of various networks, i.e. they may support different network layer protocols, and even links within may be very different A data link layer protocol for Internet needs to be able to deal with these issues Internet connection, in practice, is built up on point-to-point links Organisations routers are connected to outside world s routers via point-to-point leased lines (router-router) Home users connect to outside Internet routers via cable modems and dial-up telephone lines (host-router) For either cases of connections, some data link layer protocol is required PC User's home Client process using TCP/IP Modem Dial-up telephone line TCP/IP connection using SLIP or PPP Internet provider's office Modems Router Routing process Internet uses the point-to-point protocol (PPP): Its handles error detection, supports multiple protocols, allows IP addresses to be negotiated at connection time, permit authentication 65

Point-to-Point Protocol PPP frame format is: Frame flag: 01111110, and byte stuffing is used, i.e. Bytes 1 1 1 1 or 2 Variable 2 or 4 1 Flag 01111110 Address 11111111 Control 00000011 Protocol Payload Checksum Flag 01111110 If flag pattern appears in data stream, a special escape byte (ESC) is added before it, and if ESC appears inside data, it also needs byte stuffing Address: 11111111, which means all stations can accept the frame This avoids issue of assigning data link addresses Control: 00000011 is a default value, indicating unnumbered frame Note there is no sequence number, so data link layer does not do flow/error control, but PPP has FSC and is able to detect errors Protocol field: tells what kind of packet is in payload Protocols starting with a 0 bit are network protocols such as IP, IPX, OSI, and others; starting with a 1 bit are used to negotiate other protocols, and these include LCP and different NCPs PPP provides link control protocol (LCP) for controlling line (setup, testing, negotiating options, shut down) PPP can negotiate network-layer options having a different network control protocol (NCP) for each different network layer supported Network address is not fixed but assigned dynamically at connection time 66

PPP Operation PPP is multiprotocol framing mechanism suitable for use over modems, HDLC lines, SONET, and other physical layers Operation of PPP: Start with physical line state Dead, after physical connection is established, the line moves to Establish LCP option negotiation then begins, which lead to Authenticate if successful, and two parties can now check each other s identities if so desired Network phase is next entered, and appropriate NCP protocol is invoked to configure network layer Carrier detected Dead Carrier dropped Both sides agree on options Establish Failed Terminate Authenticate Failed If configuration successful, Open state is reached and data transport can take place Done Open Authentication successful Network NCP configuration After data transport is completed, the line moves to Termination phase, and from there back to Dead when carrier is dropped 67

PPP Operation (continue) As a specific example, consider how a home user sets up an Internet connection to an Internet provider 1. Dead To Establish Call the provider s router via a modem to set up a physical connection 2. To Authenticate Send a number of LCP packets, embedded inside PPP frames, to negotiate PPP connection: The maximum payload size in data frames Do authentication (e.g. ask for password) Monitor the link quality (e.g. how many frames did not get through) Compress headers (which is useful for slow links between fast computers) 3. To Network Send a number of NCP packets, embedded inside PPP frames, to negotiate the network layer configuration For example your PC wants to run TCP/IP, the NCP for IP is used to do IP address assignment 4. To Open Your PC is now an Internet host, able to send and receive IP packets 5. To Termination When you have finished, The NCP shuts down the network layer connection, free IP address The LCP shuts down the data link layer connection Finally, your PC tells the modem to hang up the phone, releasing physical layer connection 68

Medium Access Control Overview We have so far discussed data link layer at point-to-point connection For broadcast networks, such as LANs, many users share same medium and collision avoidance is critical Typically, data link layer is divided into: Logical Link Control (LLC) sublayer, which does usual point-to-point connection issues, and Medium Access Control (MAC) sublayer: which deals with how to access medium (channel) data link layer logical link control medium access control There are three strategies for medium access or channel allocation Contention: a user simply tries to use channel and does something when collision happens Round-robin: each user is in turn given opportunity to use channel Reservation: a user places a reservation for a channel In practice, a MAC may adopt one or more these strategies. For example, in GSM system, a user gains access to system by making a reservation on a channel but the reservation is made via a signalling channel and access to the signalling channel is through contention Multiple LANs can be connected via bridges (switches), which operate in data link layer, i.e. they do not examine the network layer header and simply pass network packets (unlike a router) 69

Summary Key design consideration is to have or not to have full data link layer functions Full data link layer functions (flow/error control etc.) depend on having sequence number Full data link layer class discussed include HDLC, LAPB, LAPD, LLC Bare data link layer class discussed include frame relay, ATM, Internet PPP Special issues for Internet: ability to support multiple protocols (not an issue in single network), and this is achieved via a protocol type field in frame header 70