business data communications

39
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 1 Business Data Communications Chapter Three Data Link Layer Fundamentals

Upload: adila

Post on 24-Feb-2016

26 views

Category:

Documents


0 download

DESCRIPTION

Business Data Communications. Chapter Three Data Link Layer Fundamentals. Primary Learning Objectives. Understand the function of the data link layer Distinguish Logical Link Control from Media Access Control Describe the two types of flow control Explain line discipline - PowerPoint PPT Presentation

TRANSCRIPT

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 1

Business Data Communications

Chapter ThreeData Link Layer Fundamentals

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 2

Primary Learning Objectives

Understand the function of the data link layer Distinguish Logical Link Control from Media Access

Control Describe the two types of flow control Explain line discipline Define the components of error control Recognize two methods of delineating data in a bit

stream Identify devices and components associated with

the data link layer

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 3

The Data Link Layer – Its Function

Sits above the physical and below the Network Layers

Formats data bits into frames Has two components:

Logical Link Control – 802.2 Media Access Control – 802.3 for Ethernet

Is responsible for: Line discipline Flow control Error control

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 4

Components of the Data Link Layer

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 5

Logical Link Control (LLC)

Designated by the IEEE as 802.2 and sits above the Media Access Control

Provides three types of frame delivery service using protocol data units:

Type 1 – connectionless without acknowledgement, the most used delivery service

Type 2 – connection-oriented with acknowledgement

Type 3 – connectionless with acknowledgement

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 6

Logical Link Control (LLC)

LLC supports three types of frames: I – Information

is connection-oriented S – Supervisory

manages the Information frames U – Unnumbered

used by connectionless services and terminates connection-oriented services

Only Type 2 delivery service uses all three types of frames

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 7

Logical Link Control (LLC)

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 8

Media Access Control (MAC)

Has various IEEE designations, with the most common being 802.3 for Ethernet

Determines how devices share a common circuit

Falls into one of two categories: Contention (802.3, Ethernet, for example) Controlled access (802.5, Token Ring, for example)

FDDI, another form of controlled access, is an ANSI/ITU-T standard

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 9

Media Access Control – 802.3

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 10

Media Access Control – 802.5

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 11

Media Access Control (MAC)

Standard 802.3 networks using hubs and bridges can suffer from significant collision impairment under high traffic:

Modern 802.3 networks using switching technology have greatly eased this problem

Switches do not change the underlying 802.3 architecture

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 12

Media Access Control (MAC)

Format of a MAC Protocol Data Unit (PDU)

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 13

Flow Control

Prevents a sender from overwhelming a receiver with traffic:

A sender and receiver each have a memory area in which they can store frames

This memory is sometimes referred to as a buffer A sender can overwhelm, or overflow, a

receiver’s memory buffer without proper flow control

If an overflow occurs, data would likely be lost

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 14

Flow Control

Two common forms of flow control are:

Stop-and-wait Each single frame sent requires receipt of one

acknowledgement

Sliding windows The sending of multiple frames requires a single

acknowledgement returned

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 15

Flow Control

Stop-and-wait: Most efficient for messages containing a few large

frames that traverse short links Requires one acknowledgement for each frame sent

Sliding windows: Most efficient for messages containing many small

frames that traverse long links Allows for one acknowledgement for multiple frames

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 16

Stop-and-Wait Flow Control

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 17

Sliding Windows Flow Control

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 18

Line Discipline

Can be viewed as a “polite” means of controlling a conversation between communicating devices

Associated with two types of network environments:

Point-to-point between communicating devices using half- or full-duplex circuits

Multipoint with communicating devices going through a central controlling device

The central control device is often a mainframe with connected terminals

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 19

Error Control

No system is perfect; errors should be expected

Errors can result when data is lost, corrupted, or damaged, making error control critical

Error control has two components: Error Detection Error Correction

The two components are equally important

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 20

Error Detection

Common error-detection methods include: Parity checking

50% probability of detection Longitudinal redundancy checking

98% probability of detection Checksum checking

99.6% probability of detection Cyclical redundancy checking

99.9%+ probability of detection

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 21

Parity Checking

An extra parity bit is added to the byte

Assuming even parity: 10000010 – data sent

10000110 - data received Error detected on receiver side (single bit)

10000010 – data sent10011010 – data received

No error detected on receiver side (multiple bit)

Simple parity detects only single bit errors

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 22

Longitudinal Redundancy Checking -- LRC Longitudinal literally means “lengthwise” The sender, for each byte in the message, calculates

a parity value, creating an additional block check character or BCC

As with parity checking, the parity value is odd or even The BCC is added to the end of the message block The receiver performs the same lengthwise LRC

computation If the receiver’s calculated BCC does not equal the

sender’s calculated BCC, the receiver assumes a transmission error

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 23

Longitudinal Redundancy Checking

01000010 01011001 01010100 01000101 – Before BCC

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 24

Longitudinal Redundancy Checking

01000010 01011001 01010100 01000101 00001010 – After BCC The BCC added to the end of the data block.

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 25

Checksum Checking – CC The message sender:

Evaluates each binary byte in the message to its decimal value

Totals the decimal values of all bytes Divides the total by 255, creating a remainder Using the remainder for the CC, adds the CC to the

end of the message block The message receiver:

Performs the same byte-by-byte calculation and creates his own CC

Compares his calculated CC to the sender’s Assumes a transmission error if the two CC values

differ

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 26

Checksum Checking – CC

Char Col 1

Col 2

Col 3

Col 4

Col 5

Col 6

Col 7

Col 8

B 0 1 0 0 0 0 1 0

Y 0 1 0 1 1 0 0 1

T 0 1 0 1 0 1 0 0

E 0 1 0 0 0 1 0 1

TOTAL

DecimalEquivalent

66898469308

308 / 255 = 1.21 CC = 21

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 27

Error Control

The most common error correction technique is to simply retransmit the data in error

Easy, but requires time for the retransmission

A second error correction technique is called forward error correction:

The core message is sent along with redundant data bits The redundant data bits can, if necessary, be used by the

receiving device to correct errors on site without retransmission

However, forward error correction results in inefficient use of a circuit if too many redundant data bits are sent and not used

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 28

Data Delineation

A transmitted bit stream contains not only the core message but control information as well

Control information could include: Source address Destination address Length of message field Error control data Other “non-core” information

Data delineation differentiates between core and other data

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 29

Data Delineation

Two key methods providing data delineation are: Asynchronous data link protocols Synchronous data link protocols

Asynchronous protocols: Are used mostly by mainframes and their

connected terminals Provide byte-by-byte delineation

Synchronous protocols: Are used in LANs, BNs, MANs, and WANs Provide delineation for groups of bytes

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 30

Data Delineation

Popular asynchronous protocols include: XModem YModem ZModem Kermit

Asynchronous protocols require that every data byte have a start and stop bit before and after it

Generally less efficient than synchronous protocols

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 31

Asynchronous Transmission

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 32

Data Delineation

Synchronous protocols are either bit- or byte-oriented

Bit-oriented protocols are more flexible: They do not require a predetermined “byte”

character format, such as EBCDIC or ASCII They are more complicated

Bit stuffing may be required HDLC is a formalized bit-based protocol

Byte-oriented protocols: Are based upon known “byte” based data Ethernet is a very common byte-based protocol

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 33

Simple Synchronous Transmissions

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 34

Data Link LayerDevices and Components

A Network Interface Card is: A component rather than device Essential to connect a device to a network

Bridges: Link segments of the same logical network Filter traffic, and so can improve network performance

Switches: Offer more functionality than hubs and bridges Provide point-to-point connections to devices plugged

into them Have transformed how standard Ethernet is configured

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 35

A 3Com Network Interface Card (NIC)

NICs have a physical address

NIC addresses must be unique

NIC addresses can be bypassed, or overridden, by software, but care must be taken when doing this to avoid address duplication

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 36

A Linksys Wireless Bridge

Bridges filter network traffic

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 37

A Bridge Filtering Traffic

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 38

A standard Cisco Switch

Switches have mostly replaced hubs in modern Ethernet networks

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Three 39

In Summary

The data link layer: Is stacked above the physical and below the network

layers Formats data bits into units called frames Is composed of two stacks, the logical link and the

media access controls Performs error control Has devices such as bridges and switches with which

it is particularly associated