Part 2-Data Link Layer
Part 2-Data Link Layer
1. Introduction & Physical Layer - Introduction to the Internet - Services and Protocols, Edge -
Protocol Layers and Service Models OSI and TCP/IP models.
2. Data link Layer - Link Layer – Services - Error Detection and Correction; Multiple Access
protocols- channel partitioning - Random access - Taking-Turns protocols - Switched LANs ARP - Ethernet
- Link layer switching – VLANs – MPLS.
3. Network Layer - Data plane forwarding vs. Control plane routing - Software Defined Networking
(SDN) approach - Network Services - Router architecture - Switching fabrics - Input and output queueing-
Core, Packet Switching vs. Circuit Switching - Performance Metrics Delay - Loss – Throughput - IPv4 and
IPv6 addressing DHCP -NAT - IPv4 and IPv6 fragmentation – SDN-based generalized forwarding -
Routing and Supporting Algorithms - Link State vs. Distance Vector - RIP - OSPF – BGP – ICMP - SNMP
- SDN Control Plane.
4.Transport Layer - Unreliable Connectionless vs. Reliable Connection-Oriented Services -
Multiplexing; Stop-and-Wait - Go-Back-N and Selective-Repeat - UDP vs. TCP - Flow and Congestion
Control.
5. Application Layer - Client-Server and Peer-to-Peer architectures - Application Layer protocols
6. Introduction to Wireless and Mobile Networks - Link characteristics - CDMA - 802.11 WiFi -
Bluetooth and Zigbee - Cellular Networks - GSM – UMTS – LTE - Mobility management and handoff -
Mobile IP.
Part-2 (Lecture Flow & Book Details)
Data link Layer - Link Layer – Services - Error Detection and Correction: Behrouz Forouzan, “Data
Communication and Networking”, Tata McGraw Hill 3rd edition. Chapter-10, Page Nos: 243-259.
Multiple Access protocols Channel partitioning - Random access - Taking-Turns protocols: Behrouz
Forouzan, “Data Communication and Networking”, Tata McGraw Hill 3rd edition. Chapter-13, Page
Nos: 311-325.
Switched LANs ARP: James Kurose and Keith Ross, “Computer Networking: A Top-down Approach”
6th edition, Addison Wesley 2010. Chapter-5- Only 5.4.1. Page Nos: 462 to 469.
Ethernet: James Kurose and Keith Ross, “Computer Networking: A Top-down Approach” 6th edition,
Addison Wesley 2010. Chapter-5- Only 5.4.2. Page Nos: 469 to 474.
Link layer switching: Behrouz Forouzan, “Data Communication and Networking”, Tata McGraw Hill
4th edition. Chapter-15— only page no.-447(Bridges).
The Link Layer and Local Area Networks
0 1 1 0 0 0 1 0
0 0 0 0 0 0 0 1
1
0
Sender 1 Receiver
1
0
1
Error detection:
• Redundancy
• Parity Check
• Cyclic Redundancy Check (CRC)
• Checksum
Ist method:
• Error detection is done by sending every data twice
• Receiver does bit by bit comparison between the two sets of the data
• Any discrepancy results in error and correction has to be done
Advantage:
Accuracy
Disadvantage:
Slow
Transmission time is doubled and takes more time for bit by bit comparison
Redundancy:
• Adding extra bits for detecting errors at the destination.
• Sender appends shorter group of bits and transmits
• Receiver checks the data and redundant bits are discarded
Error Detection Methods:
Simple Parity Check:
• Even or Odd parity check: Parity bit is added to every data unit so that the total number of 1s
is even (or odd for odd-parity)
Numerical:
Ex:1
Suppose the sender wants to send the word world. In ASCII the five characters are coded as
1110111 1101111 1110010 1101100 1100100
The following shows the actual bits sent
11101110 11011110 11100100 11011000 11001001
Ex:2
Now suppose the word world in Ex:1 is received by the receiver without being corrupted in
transmission.
11101110 11011110 11100100 11011000 11001001
The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4).
The data are accepted.
Numerical:
Ex3:
Now suppose the word world in Ex:1 is corrupted during transmission.
11111110 11011110 11101100 11011000 11001001
The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5,
4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
Note:
• It can detect burst errors only if the total number of errors in each data unit is odd.
CRC ( CYCLIC REDUNDANCY CHECK):
• Most powerful technique
• Performs binary division
• Sequence of redundant bits called the CRC( remainder) which is appended to the end of data
unit
• Resulting data unit is exactly divisible by predetermined binary number
• At the destination, incoming data unit is divisible by the same binary number
• No remainder – data is proper and accepted
• There is remainder – data is damaged and rejected
• Redundancy bits are derived by dividing the data unit by a predetermined divisor and
remainder is the CRC
Two qualities:
• CRC must have exactly one bit less than the divisor
• After appending CRC at the end of the data, resulting sequence exactly divisible by the divisor
CRC ( CYCLIC REDUNDANCY CHECK):
Note:
• CRC can be all zeros
CRC:
CRC Polynomial:
• Divisor is represented as a algebraic
polynomial but not as a string of o’s and 1’s
Reason for using polynomial:
• Short
• Used to prove the concept mathematically
CRC Generator:
• Uses mod 2 division
• Size of divisor is n+1
• n= Number of appended
zeros
• Divisor always begins
with 1
• Dividend – divisor and
leftmost bit of dividend
should be 1
• First bit of remainder is
zero then use 0000
• If second bit is also
zero then it is
retained
CRC Checker:
• Uses mod 2 division
• Data is received as data
followed by CRC
• Remainder=0, CRC is
dropped and data is
accepted
• Else data is discarded and
resent
Checksum
Now, suppose receiver receives the pattern and
there is no error
Error Correction Methods:
• Retransmission
1 2 3
2 3 5
3 3 6
4 3 7
5 4 9
6 4 10
7 4 11
r8 r4 r2 r1 No. of
bits
0 0 0 1 1 r1 : 1 , 3, 5, 7, 9, 11, 13……..
0 0 1 0 2
0 0 1 1 3 r2 : 2, 3, 6, 7, 10, 11………….
0 1 0 0 4
0 1 0 1 5
r4 : 4, 5, 6,7, 12, 13, 14, 15,………..
0 1 1 0 6
0 1 1 1 7
r8 : 8, 9, 10, 11, 12, 13, 14, 15,………
1 0 0 0 8
1 0 0 1 9
1 0 1 0 10
1 0 1 1 11
1 1 0 0 12
1 1 0 1 13
1 1 1 0 14
1 1 1 1 15
Hamming code:
Finding r values:
Hamming code:
Hamming code:
• Easily implemented using hardware
• Code is corrected before the receiver knows about it
Multiple access protocols
Multiple access protocols- Random access
• In random access or contention methods, no station is superior to
another station and none is assigned the control over another. No
station permits, or does not permit, another station to send. At each
instance, a station that has data to send uses a procedure defined by
the protocol to make a decision on whether or not to send.
Persistence strategies
Multiple access protocols- Random access
• CSMA/CD
Multiple access protocols- Random access
• CSMA/CA
Multiple access protocols- Controlled access
• Reservation
• Polling
• Token Passing
Multiple access protocols- Controlled access
• Token-passing network
Multiple access protocols- Channelization
1A-2F-BB-76-09-AD
LAN
(wired or adapter
wireless)
71-65-F7-2B-08-53
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
Question: how to determine interface’s MAC address, knowing its IP address?
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
IP
Eth
Phy
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
IP IP
Eth Eth
Phy Phy
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
IP
Eth
Phy
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
switch
star
bus: coaxial cable
Ethernet frame structure
preamble:
• 7 bytes with pattern 10101010 followed by one
byte with pattern 10101011
• used to synchronize receiver, sender clock rates
Ethernet frame structure
• addresses: 6 byte source, destination MAC addresses
• if station receives frame with matching destination address,
or with broadcast address (e.g. ARP packet), it passes data
in frame to network layer protocol
• otherwise, station discards frame
• type: 2 bytes indicates higher layer protocol
• CRC: 4 bytes cyclic redundancy check at receiver
• error detected: frame is dropped
type
dest. source
preamble address address data CRC
(payload)
Ethernet: unreliable, connectionless
• connectionless: no handshaking between sending and
receiving NICs
• unreliable: receiving NIC doesn't send acks or nacks
to sending NIC
• Ethernet’s MAC protocol: CSMA/CD
Link Layer Switching
Link Layer Switching
Transparent bridge is a bridge in which the stations are completely unware of the bridge existence
• Frame Forwarding
• Address Learning