Chapter 3 Computer Networks
Chapter 3 Computer Networks
Provide service interface to the network layer Dealing with transmission errors Regulating data flow
Slow receivers not swamped by fast senders
Framing
Framing (2)
(a) A frame delimited by flag bytes. (b) Four examples of byte sequences before and after stuffing.
Framing (3)
Bit stuffing (a) The original data. (b) The data as they appear on the line. (c) The data as they are stored in receivers memory after destuffing.
Error-Correcting Codes
Error-Detecting Codes
Protocol Definitions
Continued
Some definitions needed in the protocols to follow. These are located in the file protocol.h.
Some definitions needed in the protocols to follow. These are located in the file protocol.h.
A sliding window of size 1, with a 3-bit sequence number. (a) Initially. (b) After the first frame has been sent. (c) After the first frame has been received. (d) After the first acknowledgement has been received.
Continued
Two scenarios for protocol 4. (a) Normal case. (b) Abnormal case. The notation is (seq, ack, packet number). An asterisk indicates where a network layer accepts a packet.
Pipelining and error recovery. Effect on an error when (a) Receivers window size is 1. (b) Receivers window size is large.
Continued
Continued
Continued
Continued
Continued
Continued
(a) Initial situation with a window size seven. (b) After seven frames sent and received, but not acknowledged. (c) Initial situation with a window size of four. (d) After four frames sent and received, but not acknowledged.
Protocol Verification
Finite State Machined Models Petri Net Models
Control field of (a) An information frame. (b) A supervisory frame. (c) An unnumbered frame.