The document provides an overview of the Logical Link Control (LLC) sub-layer of the Data Link Layer, focusing on its role in managing communication and ensuring data integrity through error detection and correction mechanisms. It discusses various transmission impairments such as attenuation, noise, distortion, and interference that can affect signal quality, as well as error detection techniques like parity checks, checksums, and cyclic redundancy checks. Additionally, it covers flow control techniques that manage data transmission rates to prevent buffer overflow and network congestion.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
8 views
Lecture 7 - The Data-link Layer-2.Pptx
The document provides an overview of the Logical Link Control (LLC) sub-layer of the Data Link Layer, focusing on its role in managing communication and ensuring data integrity through error detection and correction mechanisms. It discusses various transmission impairments such as attenuation, noise, distortion, and interference that can affect signal quality, as well as error detection techniques like parity checks, checksums, and cyclic redundancy checks. Additionally, it covers flow control techniques that manage data transmission rates to prevent buffer overflow and network congestion.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50
DATA LINK LAYER
Logical Link Control Sub-layer
INTRODUCTION The Logical Link Control (LLC) layer is one of the two sub-layers within the Data Link Layer (Layer 2). The LLC layer is responsible for certain aspects of data link layer functionality, particularly in the context of connecting and managing communication between devices on a local network. INTRODUCTION Error detection and correction are essential functions performed by the Data Link Layer of the OSI model to ensure the accuracy and reliability of data transmission over a network. These mechanisms help detect errors that might occur during the transmission process and, in some cases, correct those errors to ensure the integrity of the transmitted data. Firstly, lets take about impairments: TRANSMISSION IMPAIRMENTS TRANSMISSION IMPAIRMENTS Transmission Impairments Transmission impairments, also known as signal impairments or channel impairments, refer to various types of degradation or distortion that affect the quality of a signal as it travels through a communication channel. These impairments can arise due to various factors such as noise, attenuation, distortion, and interference. Understanding transmission impairments is crucial for designing reliable communication systems and ensuring accurate data transmission. TRANSMISSION IMPAIRMENTS Here are some common types of transmission impairments: Attenuation: Attenuation refers to the loss of signal strength as it travels through a medium. It's a natural consequence of signal propagation and affects signals over long distances. To counteract attenuation, repeaters or amplifiers can be used to boost the signal strength at regular intervals. TRANSMISSION IMPAIRMENTS Attenuation: TRANSMISSION IMPAIRMENTS Noise: Noise is unwanted random electrical signals that interfere with the desired signal. It can be caused by various sources, such as thermal noise (caused by the random motion of electrons), electromagnetic interference, and crosstalk (interference from adjacent communication channels). Noise can distort the original signal and reduce its quality. TRANSMISSION IMPAIRMENTS Noise TRANSMISSION IMPAIRMENTS Distortion: Distortion occurs when the shape of the signal waveform changes during transmission. This can be due to factors like frequency-dependent attenuation, multipath propagation (signals taking multiple paths and arriving at different times), and non-linearities in the transmission medium. Distortion can result in signal smearing and difficulty in recovering the original data. TRANSMISSION IMPAIRMENTS Distortion: TRANSMISSION IMPAIRMENTS Interference: Interference arises when external signals disrupt the desired communication signal. This can include radio frequency interference (RFI) from other devices, electromagnetic interference (EMI) from nearby electrical equipment, and cross-channel interference. Interference can lead to signal degradation and data corruption. TRANSMISSION IMPAIRMENTS Jitter: Jitter refers to the variation in the timing of signal elements due to network congestion, clock variations, or other factors. It can cause problems in timing-sensitive applications like voice and video communication. Delay: Delay is the time it takes for a signal to travel from the sender to the receiver. Excessive delay can lead to synchronization issues in real-time applications and hinder interactive communication. TRANSMISSION IMPAIRMENTS Echo: Echoes occur when a portion of the transmitted signal is reflected back due to impedance mismatches in the communication path. Echoes can interfere with voice communication and impair data integrity. Cross-talk: Cross-talk happens when signals from one communication channel interfere with signals in another channel. It's common in situations where multiple wires or transmission lines are close to each other. ERROR DETECTION TECHNIQUES ERROR DETECTION TECHNIQUES Simple Parity Check Blocks of data from the source are subjected to a check bit or parity bit generator form, where a parity of : •1 is added to the block if it contains odd number of 1’s, and •0 is added if it contains even number of 1’s This scheme makes the total number of 1’s even, that is why it is called even parity checking. ERROR DETECTION TECHNIQUES …Simple Parity Check ERROR DETECTION TECHNIQUES Two-Dimensional Parity Check •Parity check bits are calculated for each row, which is equivalent to a simple parity check bit. Parity check bits are also calculated for all columns, then both are sent along with the data. At the receiving end these are compared with the parity bits calculated on the received data. ERROR DETECTION TECHNIQUES …Two Dimensional Parity Check ERROR DETECTION TECHNIQUES Checksum In checksum error detection scheme, the data is divided into k segments each of m bits. In the sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum is complemented to get the checksum. ERROR DETECTION TECHNIQUES …checksum The checksum segment is sent along with the data segments. At the receiver’s end, all received segments are added using 1’s complement arithmetic to get the sum. The sum is complemented. If the result is zero, the received data is accepted; otherwise. ERROR DETECTION TECHNIQUES Checksum ERROR DETECTION TECHNIQUES Cyclic Redundancy Unlike checksum scheme, which is based on addition, CRC is based on binary division. In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to the end of data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number. ERROR DETECTION TECHNIQUES …Cyclic Redundancy •At the destination, the incoming data unit is divided by the same number. If at this step there is no remainder, the data unit is assumed to be correct and is therefore accepted. •A remainder indicates that the data unit has been damaged in transit and therefore must be rejected. ERROR DETECTION TECHNIQUES Crc generation Find the length of the divisor “l” Append “l-1” bits to the original message Perform binary division operation using the xor operation. Remainder of the division = crc ERROR DETECTION TECHNIQUES • Cyclic redundancy ERROR DETECTION TECHNIQUES Importance of Error Detection and Correction: Reliability: Error detection and correction mechanisms enhance the reliability of data transmission by reducing the chances of undetected errors causing data corruption. ERROR DETECTION TECHNIQUES …Quality of Service: In networks where data integrity is critical, error detection and correction ensure that the received data is accurate and complete, contributing to a higher quality of service. ERROR DETECTION TECHNIQUES Efficiency: By detecting and correcting errors at the Data Link Layer, higher layers of the OSI model can focus on their intended functions without being burdened by error handling. ERROR DETECTION TECHNIQUES …Minimization of Retransmissions: Error detection and correction help minimize the need for retransmissions of data frames, which can improve overall network efficiency. ERROR DETECTION TECHNIQUES It's important to note that while error detection and correction mechanisms enhance data reliability, they are not fool-proof. There is always a trade-off between the level of error detection and correction capability and the overhead introduced by the additional data used for these purposes. ERROR DETECTION TECHNIQUES …Different networking technologies and protocols may employ different error detection and correction methods based on their specific requirements and constraints. FLOW CONTROL TECHNIQUES FLOW CONTROL TECHNIQUES Flow control is a crucial function performed by the Data Link Layer in the OSI model to manage the pace of data transmission between devices on a network. It ensures that data is sent at a rate that the receiving device can handle without overwhelming its buffers or causing congestion. FLOW CONTROL TECHNIQUES …Flow control mechanisms help prevent data loss, minimize data retransmissions, and maintain efficient communication between sender and receiver. FLOW CONTROL TECHNIQUES Importance of Flow Control: Buffer Management: Flow control prevents the receiver's buffer from overflowing due to a rapid influx of data. If the buffer becomes full, incoming data could be lost, leading to data loss and inefficiencies. FLOW CONTROL TECHNIQUES …Congestion Prevention: Effective flow control helps prevent network congestion by regulating the rate of data transmission. This prevents data from being sent too quickly, which could cause bottlenecks and decreased performance. FLOW CONTROL TECHNIQUES …Quality of Service (QoS): Flow control contributes to improved QoS by ensuring that critical data is delivered promptly while minimizing the risk of data loss due to congestion. FLOW CONTROL TECHNIQUES Types of Flow Control: There are two main types of flow control: Stop-and-Wait Flow Control: In this method, the sender transmits a frame to the receiver and then waits for an acknowledgment (ACK) FLOW CONTROL TECHNIQUES …This ensures that the receiver has successfully received and processed the previous frame before more data is sent. If the sender doesn't receive an ACK within a certain timeframe, it assumes that the frame was lost or corrupted and retransmits it. FLOW CONTROL TECHNIQUES Stop and Wait FLOW CONTROL TECHNIQUES Sliding Window Flow Control: Sliding window flow control allows the sender to transmit multiple frames before waiting for acknowledgments. The receiver maintains a window that specifies the maximum number of frames it can accept. FLOW CONTROL TECHNIQUES …As the receiver processes frames and frees up buffer space, it sends acknowledgments back to the sender. The sender's window slides forward as acknowledgments are received, allowing it to send new frames. FLOW CONTROL TECHNIQUES Sliding Window Principle FLOW CONTROL TECHNIQUES Go-Back-N (ARQ) Go-Back-N Automatic Repeat reQuest (ARQ) is a specific type of error control and flow control mechanism used to ensure reliable transmission of data across unreliable or noisy communication channels. FLOW CONTROL TECHNIQUES …Go-Back-N ARQ operates by allowing the sender to transmit multiple frames (packets) consecutively without waiting for individual acknowledgments from the receiver after each frame. The receiver acknowledges the successful receipt of frames by sending cumulative acknowledgments. FLOW CONTROL TECHNIQUES Go-Back N FLOW CONTROL TECHNIQUES Selective Repeat ARQ Selective Repeat Automatic Repeat reQuest (ARQ) is another type of ARQ protocol used for error control and flow control in data communication. Like Go-Back-N ARQ, Selective Repeat ARQ aims to ensure reliable data transmission across unreliable or noisy communication channels. FLOW CONTROL TECHNIQUES …However, unlike Go-Back-N, Selective Repeat ARQ allows individual lost or corrupted frames to be retransmitted, rather than requiring the retransmission of a whole window of frames. FLOW CONTROL TECHNIQUES Selective Repeat ARQ
(Cambridge Studies in Nineteenth-Century Literature and Culture) Hilary Fraser - Women Writing Art History in The Nineteenth Century - Looking Like A Woman (2014, Cambridge University Press)