Computer Networks 1: Link Layer

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of the error detection and correction (EDC) bits?

  • To protect data from corruption (correct)
  • To increase data transmission speed
  • To enhance processing power of the link layer
  • To reduce the need for redundant data

What does a larger EDC field generally provide?

  • Faster error correction on the receiving end
  • Increased redundancy without affecting performance
  • More robust detection and correction capabilities (correct)
  • Lower overall data transmission size

Which of the following is NOT a feature typically associated with the link layer?

  • Addressing and ARP
  • Routing between different networks (correct)
  • Multiple access protocols
  • Error detection

Why might error detection at the link layer need additional focus?

<p>It has unique challenges and demands not seen in upper layers. (B)</p> Signup and view all the answers

What type of errors might error detection mechanisms miss?

<p>Some errors, though it rarely occurs (A)</p> Signup and view all the answers

Which protocol is related to managing data flow and addressing in local area networks?

<p>ARP (C)</p> Signup and view all the answers

What does each layer of the network architecture typically handle?

<p>Transmission and integrity of data (C)</p> Signup and view all the answers

What may result from a bit-error prone link in relation to error detection?

<p>A higher likelihood of false negatives in error detection (A)</p> Signup and view all the answers

What is the primary function of single bit parity in data transmission?

<p>Detect single bit errors (A)</p> Signup and view all the answers

How does two-dimensional bit parity improve upon single bit parity?

<p>It can correct single bit errors (D)</p> Signup and view all the answers

In the context of even parity, what condition must be met for the parity bit?

<p>The total number of 1's must be even (D)</p> Signup and view all the answers

What is the main goal of the Internet checksum?

<p>To detect errors in transmitted segments (C)</p> Signup and view all the answers

What action does the receiver take regarding the checksum field in the received segment?

<p>Compute the checksum of the received segment (A)</p> Signup and view all the answers

If the computed checksum equals the checksum field value upon receipt, what does this indicate?

<p>No errors were detected (B)</p> Signup and view all the answers

What method is used to compute the checksum in the UDP segment?

<p>Addition (one's complement sum) of the segment content (D)</p> Signup and view all the answers

Which parity scheme can detect errors but not correct them?

<p>Single bit parity (A)</p> Signup and view all the answers

What is the primary responsibility of the link layer?

<p>Transferring datagrams from one node to an adjacent node. (A)</p> Signup and view all the answers

Which layer-2 packet format encapsulates the datagram?

<p>Frame (A)</p> Signup and view all the answers

What do MAC addresses in frame headers identify?

<p>The source and destination nodes. (A)</p> Signup and view all the answers

Which of the following is NOT a service of the link layer?

<p>Congestion control across multiple networks. (D)</p> Signup and view all the answers

Which option describes a situation where different link protocols are used?

<p>WiFi providing the first link followed by Ethernet. (D)</p> Signup and view all the answers

What analogy is used to explain the function of the link layer?

<p>Transportation modes for travelers between cities. (B)</p> Signup and view all the answers

What is the outcome of error detection and correction in link layer services?

<p>It ensures the integrity of data delivered over the link. (D)</p> Signup and view all the answers

What does the term 'multiple access' in link layer services refer to?

<p>The ability of one device to share a channel with multiple devices. (C)</p> Signup and view all the answers

Which of these best describes a local area network (LAN)?

<p>A network that connects a limited geographical area, usually within one building. (B)</p> Signup and view all the answers

Which component of the datagram’s journey is analogous to a routing algorithm?

<p>The travel agent managing connections. (D)</p> Signup and view all the answers

What is a primary benefit of Slotted ALOHA regarding transmission?

<p>It can allow a single active node to transmit continuously at full rate. (A)</p> Signup and view all the answers

What is the primary characteristic of channel partitioning MAC protocols?

<p>Each node is assigned exclusive use of a channel piece. (C)</p> Signup and view all the answers

What is a significant drawback of the Slotted ALOHA protocol?

<p>It can lead to wasted slots due to collisions. (A)</p> Signup and view all the answers

In the context of Slotted ALOHA, what does the term 'max efficiency' refer to?

<p>The highest fraction of slot usage for successful transmissions. (B)</p> Signup and view all the answers

In a TDMA protocol, what happens to unused slots?

<p>They are ignored and not used in the next round. (C)</p> Signup and view all the answers

What mathematical expression determines the probability of success for a node in Slotted ALOHA?

<p>Np(1-p)N-1 (B)</p> Signup and view all the answers

How does FDMA allocate resources to nodes?

<p>By assigning each station a fixed frequency band. (D)</p> Signup and view all the answers

What is the main feature of random access protocols?

<p>Nodes transmit only when they have data to send. (D)</p> Signup and view all the answers

What is a crucial step in maximizing efficiency in the Slotted ALOHA protocol?

<p>Determine the optimal probability p* that maximizes Np(1-p)N-1. (B)</p> Signup and view all the answers

Which of the following best describes the operation of TDMA?

<p>Time is divided into slots for fixed length data transmission. (A)</p> Signup and view all the answers

What happens during collisions in random access protocols?

<p>Nodes must wait for a certain interval before attempting to resend. (B)</p> Signup and view all the answers

In an FDMA system, what do idle frequency bands signify?

<p>Those nodes have no data to send. (D)</p> Signup and view all the answers

Which statement accurately describes the difference between TDMA and FDMA?

<p>TDMA divides time, while FDMA divides frequency. (C)</p> Signup and view all the answers

What is the primary goal of using a cyclic redundancy check (CRC)?

<p>To detect burst errors in data transmission (D)</p> Signup and view all the answers

In the CRC formula, what do the symbols D and G represent respectively?

<p>Data bits and generator bit pattern (D)</p> Signup and view all the answers

What does a non-zero remainder indicate when dividing by G in the context of CRC?

<p>An error has been detected (B)</p> Signup and view all the answers

Which of the following protocols commonly utilizes cyclic redundancy checks for error detection?

<p>Ethernet (D)</p> Signup and view all the answers

In a point-to-point link, what type of connection is established?

<p>A direct connection between two devices (A)</p> Signup and view all the answers

Which of the following is a characteristic of broadcast links?

<p>They involve multiple users sharing a communication medium (D)</p> Signup and view all the answers

What does the 'r' in the CRC formula represent?

<p>The number of CRC bits chosen for error detection (C)</p> Signup and view all the answers

What is a key feature of the CRC technique in error detection?

<p>It requires the receiver to know the generator pattern (A)</p> Signup and view all the answers

In error detection methods like CRC, burst errors are defined as errors in what?

<p>A sequence of bits that all malfunction (C)</p> Signup and view all the answers

Which of the following best describes point-to-point links?

<p>They are characterized by a direct connection between two endpoints (C)</p> Signup and view all the answers

Flashcards

Error Detection and Correction (EDC)

EDC bits are added to data to detect and sometimes correct errors during transmission.

Link Layer Error Detection

The link layer checks data for errors before transferring it to the next layer.

Datagram

A packet of data transmitted through a network.

Error Detection Reliability

Error detection isn't foolproof; some errors might go undetected.

Signup and view all the flashcards

EDC Field Size

A larger EDC field improves error detection and correction.

Signup and view all the flashcards

Bit Error Prone Link

A link that has a high chance of transmitting data with errors.

Signup and view all the flashcards

Data Protected by Error Checking

A piece of data that has EDC attached for error detection.

Signup and view all the flashcards

Link Layer Importance

The link layer is critical for ensuring data integrity during transmission.

Signup and view all the flashcards

Link Layer

The layer in the network that handles communication between adjacent network nodes on a single link.

Signup and view all the flashcards

Link Layer Services

Includes framing (encapsulation of data), link access (managing shared channels), and reliable delivery between adjacent nodes.

Signup and view all the flashcards

Frame

A packet at the link layer, encapsulating data from a higher layer (like an IP datagram).

Signup and view all the flashcards

MAC Address

A unique address identifying a device on a local network (e.g., Ethernet).

Signup and view all the flashcards

Link

A physical or wireless communication channel connecting adjacent network nodes.

Signup and view all the flashcards

Node

A device participating in a network (a computer, router, etc.).

Signup and view all the flashcards

Multiple Access Protocols

Protocols governing how multiple devices share a common link or channel.

Signup and view all the flashcards

Error Detection/Correction

Methods used by the link layer to identify and correct errors that occur during data transmission.

Signup and view all the flashcards

Local Area Network (LAN)

A network covering a geographically small area, like a home or office.

Signup and view all the flashcards

Single-bit parity

A method for detecting a single bit error in data.

Signup and view all the flashcards

Two-dimensional bit parity

A method for detecting and correcting single bit errors by using both row and column parity bits.

Signup and view all the flashcards

Even parity

A parity scheme where the parity bit is set so that there is an even number of 1s.

Signup and view all the flashcards

Internet Checksum

A method used by the sender and receiver to detect errors in transmitted network segments.

Signup and view all the flashcards

Checksum calculation (sender)

Sender calculates the checksum by treating the segment's content as a sequence of 16-bit integers and adding them using one's complement.

Signup and view all the flashcards

Checksum verification (receiver)

Receiver computes the checksum of the received segment and compares it to the sender's checksum.

Signup and view all the flashcards

Error detection (checksum)

If the computed checksums don't match, an error is detected.

Signup and view all the flashcards

Error correction (checksum)

This method detects errors but doesn't correct them; it's part of error detection mechanism.

Signup and view all the flashcards

Slotted ALOHA

A multiple access protocol where time is divided into slots, and nodes can only transmit during their assigned slots. This reduces collisions, but still allows for some wasted slots.

Signup and view all the flashcards

Collision in Slotted ALOHA

When multiple nodes attempt to transmit during the same slot, their data collides and becomes unusable.

Signup and view all the flashcards

Efficiency of Slotted ALOHA

The efficiency measures the percentage of successful transmissions in a given time. The theoretical maximum efficiency is 1/e, which is about 37%.

Signup and view all the flashcards

What does 'p' represent in the Slotted ALOHA equation?

'p' represents the probability that a node will transmit in a given slot. It's a crucial factor influencing the overall efficiency of the system.

Signup and view all the flashcards

Why is the maximum efficiency of Slotted ALOHA only 37%?

The maximum efficiency is limited by the inherent possibility of collisions. Even with carefully calculated probability, collisions will always occur to some extent.

Signup and view all the flashcards

MAC Protocols

Rules governing how devices share a network channel (e.g., wireless or wired). There are three main categories: channel partitioning, random access, and taking turns.

Signup and view all the flashcards

Channel Partitioning

Divides the network channel into smaller pieces (time slots, frequencies, or codes) so devices can have exclusive access to specific parts.

Signup and view all the flashcards

Random Access

Allows devices to transmit data whenever they want, but collisions can occur. There are mechanisms to recover from these collisions.

Signup and view all the flashcards

TDMA (Time Division Multiple Access)

Divides transmission time into fixed-length 'slots'. Each device gets a slot in each round, allowing it to transmit data exclusively during its slot.

Signup and view all the flashcards

FDMA (Frequency Division Multiple Access)

Divides the available frequency spectrum into bands. Each device is assigned a band, allowing it to transmit on that frequency.

Signup and view all the flashcards

Collisions in Random Access

When two or more devices transmit data simultaneously on a random access network, their signals interfere, resulting in a collision.

Signup and view all the flashcards

How to Recover from Collisions

Random access protocols have mechanisms to detect and recover from collisions, such as backoff strategies (devices wait a random time before trying again) and retransmission (devices retransmit the data after a collision).

Signup and view all the flashcards

Taking Turns MAC Protocols

Devices take turns transmitting data, but devices with more data can have longer turns. This ensures fairness and efficient resource allocation.

Signup and view all the flashcards

Cyclic Redundancy Check (CRC)

A more robust error-detection mechanism that utilizes a generator polynomial to calculate a 'checksum' and verify data integrity.

Signup and view all the flashcards

CRC Generator Polynomial (G)

A specific bit pattern (r+1 bits) used in CRC calculations to detect errors. The receiver knows G and uses it to divide the received data, looking for a zero remainder.

Signup and view all the flashcards

CRC Bits (R)

The result of the CRC calculation, a set of bits added to the data to help detect transmission errors.

Signup and view all the flashcards

What is the goal of CRC?

The goal is to choose a set of CRC bits (R) that will be exactly divisible by the generator polynomial (G) when added to the original data (D). This ensures a zero remainder after division at the receiver, indicating no errors.

Signup and view all the flashcards

How does CRC detect errors?

The receiver calculates the CRC using the received data and the known generator polynomial. If the remainder is non-zero, an error is detected.

Signup and view all the flashcards

What kind of errors can CRC detect?

CRC can detect all burst errors (multiple consecutive bits flipped) less than r+1 bits in length.

Signup and view all the flashcards

Point-to-Point Links

A direct connection between two devices, like a single cable between a host and an Ethernet switch.

Signup and view all the flashcards

Broadcast (shared) Link

A communication medium where all devices on the link listen to every transmission, such as a typical cable network or wireless LAN.

Signup and view all the flashcards

Ethernet

A widely used networking protocol for local area networks (LANs), supporting both point-to-point and broadcast communications.

Signup and view all the flashcards

802.11 (WiFi)

A standard for wireless local area networks, utilizing radio waves to connect devices.

Signup and view all the flashcards

Study Notes

Course Information

  • Course: CNT 4007 - Computer Networks 1
  • Topic: Link Layer
  • Professor: Patrick Traynor
  • Semester: Fall 2024

Reminders/Notes

  • Homework 3 due Thursday
  • Project 3 due next Tuesday
  • Midterm grading started yesterday and progress is being tracked
  • Students should keep an eye on the calendar for important dates.
  • Understand link layer services (error detection, correction, broadcast channel sharing, multiple access)
  • Learn about link layer addressing (e.g., Ethernet, VLANs)
  • Learn about datacenter networks
  • Implement various link layer technologies
  • Introduction to Link Layer
  • Error detection and correction
  • Multiple access protocols
  • Local Area Networks (LANs):
    • Addressing (e.g., ARP)
    • Ethernet
    • Switches
    • VLANs
  • Link virtualization (e.g., MPLS)
  • Data center networking
  • Day in the life of a web request
  • Terminology:
    • Hosts and routers as nodes
    • Communication channels connecting nodes: links (wired, wireless, LANs)
    • Layer-2 packet: frame that encapsulates datagram.
  • Link Layer's responsibility: Transferring datagrams between physically adjacent nodes.
  • Datagrams transferred by different link protocols over different links (e.g., WiFi to Ethernet)
  • Each link protocol provides different services (e.g., reliable data transfer may or may not be available)
  • Framing, link access: encapsulating datagrams into frames and adding headers/trailers
  • Channel access: relevant when multiple nodes share a common medium. MAC Addresses identify source and destination.
  • Reliable delivery between adjacent nodes (though not frequently used on links with low error rates).
  • Wireless links often have high error rates so link-level reliability is needed
  • Flow control: pacing of data transmission between sending and receiving nodes
  • Error detection methods: for identifying errors caused by signal attenuation, noise, etc.; receiver signals retransmission or drops frame.
  • Error correction: identifying and correcting bit errors without retransmission
  • Half-duplex and full-duplex: with half duplex transmissions are sent simultaneously, but full duplex ones aren't
  • Implemented in each network interface card (NIC) or on chip
  • Specific to chip: Ethernet, WiFi cards or chips.
  • Implemented using combination of hardware, software, and firmware. The NIC attaches to host's system buses

Interfaces Communicating

  • Sending side encapsulates datagram into frame, adds error-checking bits, and handles reliable data transfer and flow control
  • Receiving side checks for errors, extracts the datagram, and passes it to the upper layer
  • Introduction
  • Error detection and correction
  • Multiple access protocols
  • Local Area Networks (LANs): Addressing, ARP; Ethernet; Switches; VLANs
  • Link virtualization (e.g., MPLS)
  • Data center networking
  • A day in the life of a web request

Error Detection

  • EDC: error detection and correction bits (redundancy)
  • Data protected by error checking (headers included).
  • Error detection isn't 100% reliable.
  • Larger EDC field improves accuracy and correctness

Why?

  • Repeated discussions of error detection highlight their importance in networking.
  • Special aspects of link layer requiring additional attention discussed.
  • Supporting considerations and justifications are provided for the extra effort.

Parity Checking

  • Single bit parity detects single bit errors (even parity ensures even number of 1's).
  • Two-dimensional bit parity detects and corrects single bit errors.

Internet Checksum (review)

  • Goal: Detect errors in transmitted segments.
  • Sender: treats UDP segment contents as 16-bit integers; finds ones complement sum; puts checksum into UDP checksum field.
  • Receiver: calculates checksum of received segment; checks if computed checksum equals checksum field value; error is indicated if checksums don't match.

Cyclic Redundancy Check (CRC)

  • More powerful error-detection coding.
  • Data bits (D) and generator bit pattern (G) used to calculate CRC bits (R).
  • <D,R> is divisible by G in modulo 2 if no errors occur

Cyclic Redundancy Check (CRC): Example

  • Specific example using a 10110111 generator formula to calculate the CRC bits.
  • Introduction, error detection and correction
  • Multiple access protocols
  • LANs: Addressing, ARP; Ethernet; Switches; VLANs
  • Link virtualization (e.g., MPLS)
  • Data center networking
  • A day in the life of a web request
  • Two types of links: point-to-point (e.g., PPP, Ethernet switch to host) and broadcast (shared wire or medium, e.g., old-fashioned Ethernet, wireless LAN, upstream HFC cable)

Multiple Access Protocols

  • Single shared broadcast channel. Interference occurs with two or more simultaneous transmissions.
  • Collision occurs if a receiving node receives more than one signal.
  • The multiple access protocol distributes the channel allocation among nodes by determining when nodes can transmit.
  • Sharing must use the channel. No out-of-band channel for coordination.

An Ideal Multiple Access Protocol

  • Desirable characteristics of an ideal multiple access protocol, a multiple access channel (MAC) operates at R bps

MAC Protocols: Taxonomy

  • Three broad classes of multiple access protocols (MAC) :
    • Channel partitioning (allocating exclusive use of channel parts)
    • Random access (allows collisions and recovery)
    • Taking turns (nodes take turns)

Channel Partitioning MAC Protocols: TDMA

  • TDMA: Time Division Multiple Access
  • Each station accesses channel at fixed time slots.
  • Unused slots remain idle.

Channel Partitioning MAC Protocols: FDMA

  • FDMA: Frequency Division Multiple Access
  • Channel spectrum divided into frequency bands.
  • Each station gets a fixed frequency band.
  • Unused transmission time is idle.

Random Access Protocols

  • When a node has a packet, it transmits at full channel capacity
  • Random access MAC protocol specifies procedures for collision detection, recovery (e.g., delayed retransmissions), etc.
  • Examples include ALOHA and variations.

Slotted ALOHA

  • Assumptions: frames are same size, time divided in equal size slots, synchronized nodes, etc.
  • Operation: Obtaining frame, transmitting in next slot, handling collisions, retransmission strategy.
  • Pro/con analysis: considering benefits and drawbacks.

Slotted ALOHA: Efficiency

  • Efficiency (long run) of successful slots when many nodes transmit many frames.
  • Maximum efficiency is calculated.

Pure ALOHA

  • Simple unslotted version, no synchronization.
  • Collision probability increases without synchronization.
  • Efficiency is lower compared to the slotted version.

Conclusions

  • Current topic is only a small piece of broader Link Layer concepts.
  • Students are progressing well.
  • Students should improve their reading and participation.
  • See you Thursday.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Link Layer Services and Local Area Networks Quiz
5 questions
Link Layer and LANs Quiz
5 questions

Link Layer and LANs Quiz

IlluminatingRhinoceros avatar
IlluminatingRhinoceros
Networking Chapter 6: Link Layer and LANs
60 questions
Use Quizgecko on...
Browser
Browser