0% found this document useful (0 votes)
8 views

Lecture 7 - The Data-link Layer-2.Pptx

The document provides an overview of the Logical Link Control (LLC) sub-layer of the Data Link Layer, focusing on its role in managing communication and ensuring data integrity through error detection and correction mechanisms. It discusses various transmission impairments such as attenuation, noise, distortion, and interference that can affect signal quality, as well as error detection techniques like parity checks, checksums, and cyclic redundancy checks. Additionally, it covers flow control techniques that manage data transmission rates to prevent buffer overflow and network congestion.

Uploaded by

gafferdesigning
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Lecture 7 - The Data-link Layer-2.Pptx

The document provides an overview of the Logical Link Control (LLC) sub-layer of the Data Link Layer, focusing on its role in managing communication and ensuring data integrity through error detection and correction mechanisms. It discusses various transmission impairments such as attenuation, noise, distortion, and interference that can affect signal quality, as well as error detection techniques like parity checks, checksums, and cyclic redundancy checks. Additionally, it covers flow control techniques that manage data transmission rates to prevent buffer overflow and network congestion.

Uploaded by

gafferdesigning
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

DATA LINK LAYER

Logical Link Control Sub-layer


INTRODUCTION
The Logical Link Control (LLC) layer is one of
the two sub-layers within the Data Link Layer
(Layer 2).
The LLC layer is responsible for certain aspects
of data link layer functionality, particularly in
the context of connecting and managing
communication between devices on a local
network.
INTRODUCTION
Error detection and correction are essential
functions performed by the Data Link Layer of
the OSI model to ensure the accuracy and
reliability of data transmission over a network.
These mechanisms help detect errors that
might occur during the transmission process
and, in some cases, correct those errors to
ensure the integrity of the transmitted data.
Firstly, lets take about impairments:
TRANSMISSION IMPAIRMENTS
TRANSMISSION IMPAIRMENTS
Transmission Impairments
Transmission impairments, also known as signal
impairments or channel impairments, refer to
various types of degradation or distortion that
affect the quality of a signal as it travels through a
communication channel. These impairments can
arise due to various factors such as noise,
attenuation, distortion, and interference.
Understanding transmission impairments is crucial
for designing reliable communication systems
and ensuring accurate data transmission.
TRANSMISSION IMPAIRMENTS
Here are some common types of transmission
impairments:
Attenuation: Attenuation refers to the loss of
signal strength as it travels through a medium.
It's a natural consequence of signal
propagation and affects signals over long
distances. To counteract attenuation,
repeaters or amplifiers can be used to boost
the signal strength at regular intervals.
TRANSMISSION IMPAIRMENTS
Attenuation:
TRANSMISSION IMPAIRMENTS
Noise: Noise is unwanted random electrical
signals that interfere with the desired signal. It
can be caused by various sources, such as
thermal noise (caused by the random motion
of electrons), electromagnetic interference,
and crosstalk (interference from adjacent
communication channels). Noise can distort
the original signal and reduce its quality.
TRANSMISSION IMPAIRMENTS
Noise
TRANSMISSION IMPAIRMENTS
Distortion: Distortion occurs when the shape of
the signal waveform changes during
transmission. This can be due to factors like
frequency-dependent attenuation, multipath
propagation (signals taking multiple paths
and arriving at different times), and
non-linearities in the transmission medium.
Distortion can result in signal smearing and
difficulty in recovering the original data.
TRANSMISSION IMPAIRMENTS
Distortion:
TRANSMISSION IMPAIRMENTS
Interference: Interference arises when
external signals disrupt the desired
communication signal. This can include radio
frequency interference (RFI) from other
devices, electromagnetic interference (EMI)
from nearby electrical equipment, and
cross-channel interference. Interference can
lead to signal degradation and data
corruption.
TRANSMISSION IMPAIRMENTS
Jitter: Jitter refers to the variation in the timing
of signal elements due to network congestion,
clock variations, or other factors. It can cause
problems in timing-sensitive applications like
voice and video communication.
Delay: Delay is the time it takes for a signal to
travel from the sender to the receiver.
Excessive delay can lead to synchronization
issues in real-time applications and hinder
interactive communication.
TRANSMISSION IMPAIRMENTS
Echo: Echoes occur when a portion of the
transmitted signal is reflected back due to
impedance mismatches in the communication
path. Echoes can interfere with voice
communication and impair data integrity.
Cross-talk: Cross-talk happens when signals from
one communication channel interfere with signals
in another channel. It's common in situations
where multiple wires or transmission lines are
close to each other.
ERROR DETECTION TECHNIQUES
ERROR DETECTION TECHNIQUES
Simple Parity Check
Blocks of data from the source are subjected
to a check bit or parity bit generator form,
where a parity of :
•1 is added to the block if it contains odd
number of 1’s, and
•0 is added if it contains even number of 1’s
This scheme makes the total number of 1’s
even, that is why it is called even parity
checking.
ERROR DETECTION TECHNIQUES
…Simple Parity Check
ERROR DETECTION TECHNIQUES
Two-Dimensional Parity Check
•Parity check bits are calculated for each
row, which is equivalent to a simple
parity check bit. Parity check bits are
also calculated for all columns, then both
are sent along with the data. At the
receiving end these are compared with
the parity bits calculated on the received
data.
ERROR DETECTION TECHNIQUES
…Two Dimensional Parity Check
ERROR DETECTION TECHNIQUES
Checksum
In checksum error detection scheme, the
data is divided into k segments each of m
bits.
In the sender’s end the segments are
added using 1’s complement arithmetic
to get the sum. The sum is complemented
to get the checksum.
ERROR DETECTION TECHNIQUES
…checksum
The checksum segment is sent along with
the data segments.
At the receiver’s end, all received
segments are added using 1’s complement
arithmetic to get the sum. The sum is
complemented.
If the result is zero, the received data is
accepted; otherwise.
ERROR DETECTION TECHNIQUES
Checksum
ERROR DETECTION TECHNIQUES
Cyclic Redundancy
Unlike checksum scheme, which is based on
addition, CRC is based on binary division.
In CRC, a sequence of redundant bits, called
cyclic redundancy check bits, are
appended to the end of data unit so that the
resulting data unit becomes exactly divisible
by a second, predetermined binary number.
ERROR DETECTION TECHNIQUES
…Cyclic Redundancy
•At the destination, the incoming data unit
is divided by the same number. If at this
step there is no remainder, the data unit is
assumed to be correct and is therefore
accepted.
•A remainder indicates that the data unit
has been damaged in transit and
therefore must be rejected.
ERROR DETECTION TECHNIQUES
Crc generation
Find the length of the divisor “l”
Append “l-1” bits to the original
message
Perform binary division operation using
the xor operation.
Remainder of the division = crc
ERROR DETECTION TECHNIQUES
• Cyclic redundancy
ERROR DETECTION TECHNIQUES
Importance of Error Detection and
Correction:
Reliability: Error detection and correction
mechanisms enhance the reliability of
data transmission by reducing the
chances of undetected errors causing
data corruption.
ERROR DETECTION TECHNIQUES
…Quality of Service: In networks where
data integrity is critical, error detection
and correction ensure that the received
data is accurate and complete,
contributing to a higher quality of service.
ERROR DETECTION TECHNIQUES
Efficiency: By detecting and correcting
errors at the Data Link Layer, higher layers
of the OSI model can focus on their
intended functions without being
burdened by error handling.
ERROR DETECTION TECHNIQUES
…Minimization of Retransmissions: Error
detection and correction help minimize
the need for retransmissions of data
frames, which can improve overall
network efficiency.
ERROR DETECTION TECHNIQUES
It's important to note that while error
detection and correction mechanisms
enhance data reliability, they are not
fool-proof. There is always a trade-off
between the level of error detection and
correction capability and the overhead
introduced by the additional data used
for these purposes.
ERROR DETECTION TECHNIQUES
…Different networking technologies and
protocols may employ different error
detection and correction methods based
on their specific requirements and
constraints.
FLOW CONTROL TECHNIQUES
FLOW CONTROL TECHNIQUES
Flow control is a crucial function
performed by the Data Link Layer in the
OSI model to manage the pace of data
transmission between devices on a
network. It ensures that data is sent at a
rate that the receiving device can handle
without overwhelming its buffers or
causing congestion.
FLOW CONTROL TECHNIQUES
…Flow control mechanisms help prevent
data loss, minimize data retransmissions,
and maintain efficient communication
between sender and receiver.
FLOW CONTROL TECHNIQUES
Importance of Flow Control:
Buffer Management: Flow control
prevents the receiver's buffer from
overflowing due to a rapid influx of data.
If the buffer becomes full, incoming data
could be lost, leading to data loss and
inefficiencies.
FLOW CONTROL TECHNIQUES
…Congestion Prevention: Effective flow
control helps prevent network congestion
by regulating the rate of data
transmission. This prevents data from
being sent too quickly, which could
cause bottlenecks and decreased
performance.
FLOW CONTROL TECHNIQUES
…Quality of Service (QoS): Flow control
contributes to improved QoS by ensuring
that critical data is delivered promptly
while minimizing the risk of data loss due
to congestion.
FLOW CONTROL TECHNIQUES
Types of Flow Control:
There are two main types of flow control:
Stop-and-Wait Flow Control:
In this method, the sender transmits a
frame to the receiver and then waits for
an acknowledgment (ACK)
FLOW CONTROL TECHNIQUES
…This ensures that the receiver has
successfully received and processed the
previous frame before more data is sent.
If the sender doesn't receive an ACK
within a certain timeframe, it assumes that
the frame was lost or corrupted and
retransmits it.
FLOW CONTROL TECHNIQUES
Stop and Wait
FLOW CONTROL TECHNIQUES
Sliding Window Flow Control:
Sliding window flow control allows the
sender to transmit multiple frames before
waiting for acknowledgments. The
receiver maintains a window that
specifies the maximum number of frames
it can accept.
FLOW CONTROL TECHNIQUES
…As the receiver processes frames and
frees up buffer space, it sends
acknowledgments back to the sender.
The sender's window slides forward as
acknowledgments are received, allowing
it to send new frames.
FLOW CONTROL TECHNIQUES
Sliding Window Principle
FLOW CONTROL TECHNIQUES
Go-Back-N (ARQ)
Go-Back-N Automatic Repeat reQuest
(ARQ) is a specific type of error control
and flow control mechanism used to
ensure reliable transmission of data
across unreliable or noisy communication
channels.
FLOW CONTROL TECHNIQUES
…Go-Back-N ARQ operates by allowing
the sender to transmit multiple frames
(packets) consecutively without waiting
for individual acknowledgments from the
receiver after each frame. The receiver
acknowledges the successful receipt of
frames by sending cumulative
acknowledgments.
FLOW CONTROL TECHNIQUES
Go-Back N
FLOW CONTROL TECHNIQUES
Selective Repeat ARQ
Selective Repeat Automatic Repeat
reQuest (ARQ) is another type of ARQ
protocol used for error control and flow
control in data communication. Like
Go-Back-N ARQ, Selective Repeat ARQ
aims to ensure reliable data transmission
across unreliable or noisy communication
channels.
FLOW CONTROL TECHNIQUES
…However, unlike Go-Back-N, Selective
Repeat ARQ allows individual lost or
corrupted frames to be retransmitted,
rather than requiring the retransmission of
a whole window of frames.
FLOW CONTROL TECHNIQUES
Selective Repeat ARQ

You might also like