Podcast
Questions and Answers
Which of the following is the primary responsibility of the data link layer in computer networks?
Which of the following is the primary responsibility of the data link layer in computer networks?
- Reliable transfer of datagrams across a single link. (correct)
- Compressing data to improve transmission efficiency.
- Routing data packets across multiple networks.
- Dividing data into packets and determining the path.
In the context of the data link layer, what is the purpose of 'framing'?
In the context of the data link layer, what is the purpose of 'framing'?
- To optimize the routing path for data transmission.
- To compress the size of the data being transmitted.
- To fragment large packets into smaller, manageable pieces.
- To encapsulate a datagram into a frame, adding header and trailer. (correct)
Which of the following is a key difference between MAC addresses and IP addresses?
Which of the following is a key difference between MAC addresses and IP addresses?
- MAC addresses are assigned dynamically, while IP addresses are statically assigned.
- MAC addresses are used for routing between networks, while IP addresses are for identifying devices within a network.
- MAC addresses are used for link-layer addressing within a single network, while IP addresses are used for routing across multiple networks. (correct)
- MAC addresses are shorter and easier to read than IP addresses.
Why is reliable delivery between adjacent nodes not always implemented in the data link layer, especially over fiber optic cables?
Why is reliable delivery between adjacent nodes not always implemented in the data link layer, especially over fiber optic cables?
In data communication, what happens when a receiver detects an error using error detection techniques at the data link layer?
In data communication, what happens when a receiver detects an error using error detection techniques at the data link layer?
What is the key difference between half-duplex and full-duplex communication?
What is the key difference between half-duplex and full-duplex communication?
Where is the link layer typically implemented in a host?
Where is the link layer typically implemented in a host?
What is the purpose of 'byte stuffing' in the context of framing?
What is the purpose of 'byte stuffing' in the context of framing?
What is the role of the 'frame header' in data link layer framing?
What is the role of the 'frame header' in data link layer framing?
Which framing method is most susceptible to errors if the count field is corrupted?
Which framing method is most susceptible to errors if the count field is corrupted?
In byte stuffing, what is the purpose of the 'escape character' (ESC)?
In byte stuffing, what is the purpose of the 'escape character' (ESC)?
During bit stuffing, what action is taken when five consecutive 1s are encountered in the data stream?
During bit stuffing, what action is taken when five consecutive 1s are encountered in the data stream?
In the context of physical layer coding violations for framing, what is the significance of using bit patterns '11' or '00'?
In the context of physical layer coding violations for framing, what is the significance of using bit patterns '11' or '00'?
Which error detection method involves adding the data segments and then taking the 1's complement of the sum?
Which error detection method involves adding the data segments and then taking the 1's complement of the sum?
What is a key limitation of single-bit parity checking?
What is a key limitation of single-bit parity checking?
How does two-dimensional bit parity improve upon single-bit parity?
How does two-dimensional bit parity improve upon single-bit parity?
In the context of the Internet checksum, what happens if the sum of segments results in more bits than the checksum field can hold?
In the context of the Internet checksum, what happens if the sum of segments results in more bits than the checksum field can hold?
Which of the following is a characteristic of Cyclic Redundancy Check (CRC)?
Which of the following is a characteristic of Cyclic Redundancy Check (CRC)?
What is the purpose of adding CRC bits to a data frame?
What is the purpose of adding CRC bits to a data frame?
Which of the following is a key characteristic of Utopian Simplex Protocol?
Which of the following is a key characteristic of Utopian Simplex Protocol?
What is the primary function of the Simplex Stop-and-Wait protocol?
What is the primary function of the Simplex Stop-and-Wait protocol?
In the Simplex Stop-and-Wait ARQ protocol, what action does the sender take if it does not receive an acknowledgement (ACK) after a certain period?
In the Simplex Stop-and-Wait ARQ protocol, what action does the sender take if it does not receive an acknowledgement (ACK) after a certain period?
What is the main feature that distinguishes sliding window protocols from Stop-and-Wait protocols?
What is the main feature that distinguishes sliding window protocols from Stop-and-Wait protocols?
What is the purpose of the 'window' in a sliding window protocol?
What is the purpose of the 'window' in a sliding window protocol?
In the Go-Back-N ARQ protocol, what happens when a frame is found to be in error?
In the Go-Back-N ARQ protocol, what happens when a frame is found to be in error?
How does Selective Repeat ARQ differ from Go-Back-N ARQ in handling errors?
How does Selective Repeat ARQ differ from Go-Back-N ARQ in handling errors?
What is the primary advantage of using Selective Repeat ARQ over Go-Back-N ARQ?
What is the primary advantage of using Selective Repeat ARQ over Go-Back-N ARQ?
Which of the following is a key feature of High-Level Data Link Control (HDLC)?
Which of the following is a key feature of High-Level Data Link Control (HDLC)?
In HDLC, what is the purpose of the frame check sequence (FCS)?
In HDLC, what is the purpose of the frame check sequence (FCS)?
What technique does HDLC employ to ensure that the bit pattern of the delimiter flag does not inadvertently appear within the data being transmitted?
What technique does HDLC employ to ensure that the bit pattern of the delimiter flag does not inadvertently appear within the data being transmitted?
In the context of data link layer protocols, what does ARQ stand for?
In the context of data link layer protocols, what does ARQ stand for?
Which of the following data link layer protocols is best suited for a channel with a high error rate where lost frames are common?
Which of the following data link layer protocols is best suited for a channel with a high error rate where lost frames are common?
Which of the following is a key characteristic of an I-frame in HDLC?
Which of the following is a key characteristic of an I-frame in HDLC?
Which statement accurately compares and contrasts 'byte stuffing' and 'bit stuffing'?
Which statement accurately compares and contrasts 'byte stuffing' and 'bit stuffing'?
Parity bits of odd-parity are added to make the number of 1s odd, while parity bits of even-parity are added to make the number of 1s even. If a frame being transmitted has the bit sequence 1011001, what paritiy bits will be added for odd-parity and even-parity
Parity bits of odd-parity are added to make the number of 1s odd, while parity bits of even-parity are added to make the number of 1s even. If a frame being transmitted has the bit sequence 1011001, what paritiy bits will be added for odd-parity and even-parity
Flashcards
Data-Link Layer responsibility
Data-Link Layer responsibility
Transferring a datagram from one node to a physically adjacent node over link
Framing and Link Access
Framing and Link Access
Adding header/trailer, medium access control, and using MAC addresses for source/destination
Flow Control
Flow Control
Pacing data to ensure the receiver can handle the rate
Error Detection
Error Detection
Signup and view all the flashcards
Error Correction
Error Correction
Signup and view all the flashcards
Half-Duplex
Half-Duplex
Signup and view all the flashcards
Full-Duplex
Full-Duplex
Signup and view all the flashcards
Adaptor
Adaptor
Signup and view all the flashcards
Framing
Framing
Signup and view all the flashcards
Frame Header
Frame Header
Signup and view all the flashcards
Payload Field
Payload Field
Signup and view all the flashcards
Trailer
Trailer
Signup and view all the flashcards
Flags (Framing)
Flags (Framing)
Signup and view all the flashcards
Byte Count
Byte Count
Signup and view all the flashcards
Flag with Byte Stuffing
Flag with Byte Stuffing
Signup and view all the flashcards
Flag with Bit Stuffing
Flag with Bit Stuffing
Signup and view all the flashcards
Physical Layer Coding Violations
Physical Layer Coding Violations
Signup and view all the flashcards
Error Detection and Correction (EDC) bits
Error Detection and Correction (EDC) bits
Signup and view all the flashcards
Error Detection
Error Detection
Signup and view all the flashcards
Single Bit Parity
Single Bit Parity
Signup and view all the flashcards
Two-Dimensional Bit Parity
Two-Dimensional Bit Parity
Signup and view all the flashcards
Internet Checksum
Internet Checksum
Signup and view all the flashcards
Cyclic Redundancy Check (CRC)
Cyclic Redundancy Check (CRC)
Signup and view all the flashcards
Utopian Simplex Protocol
Utopian Simplex Protocol
Signup and view all the flashcards
Simplex Stop-and-Wait Protocol
Simplex Stop-and-Wait Protocol
Signup and view all the flashcards
Study Notes
Chapter 3: Datalink Layer
- Goals include understanding link layer services, framing, error detection/correction, multiple access sharing, MAC addressing, and local area networks like Ethernet and VLANs.
- Includes instantiation, implementation of various link layer technologies
Link Layer/LAN Outline
- The data link layer: introduction, services
- Framing as a link layer characteristic
- Error detection and correction as part of link layer functions
- Data link protocols like stop-n-wait and stop-n-wait ARQ
Link Layer Introduction
- Hosts and routers are nodes within the data link layer.
- Communication channels connecting adjacent nodes compose links. Links can be wired, wireless, or LAN-based.
- Layer-2 packets, known as frames, encapsulate datagrams.
- The data-link layer transfers datagrams from one node to physically adjacent node over a link
Link Layer Context
- Datagrams are transferred across various links using different link protocols (e.g., Ethernet, Frame Relay, 802.11)
- Each link protocol offers varied services.
- Link protocols may or may not offer reliable data transfer (rdt) over a link.
- Analogy: Transportation of tourists (datagrams) via different transportation modes (link layer protocols), communication links representing transport segments.
Link Layer Services
- Framing/Link Access: Encapsulates datagrams into frames by adding headers and trailers; used for channel access in shared mediums; employs MAC addresses in frame headers for source/destination identification, which differ from IP addresses.
- Reliable Delivery between Adjacent Nodes: Achieved through protocols learned in Chapter 3, seldom used in low bit-error links (e.g., fiber), but often used with wireless links with high error rates, for link-level and end-to-end reliability.
More Link Layer Services
- Flow control: coordinates pacing between adjacent sending and receiving nodes
- Error Detection: Identifies errors from signal attenuation or noise; receivers detect errors, signaling sender for retransmission or frame drops.
- Error Correction: Corrects bit errors without retransmission
- Half and Full Duplex: Half-duplex nodes at both ends of link transmit, but not concurrently, full-duplex allows simultaneous transmission in both directions
Link Layer Implementation
- Implemented in every host's "adaptor" (adapter, network interface card-NIC) or on a chip.
- Adaptors may be Ethernet cards, 802.11 cards, or an Ethernet chipset.
- Implements the link and physical layers, attaches to the host's system buses
- Hardware, software, and firmware combine to implement the data link layer
Adaptor Communication
- Sending side: encapsulates datagram into a frame, adds error checking bits, rdt, flow control information.
- Receiving side: checks for errors, rdt, flow control, extracts datagram, and passes it to upper layer.
Framing Methods
- Byte count, flag bytes with byte stuffing, flag bytes with bit stuffing, and physical layer coding violations are framing methods.
- Frame Header: Contains source and destination addresses
- Payload Field: Contains the message to be delivered.
- Trailer: Contains error detection and error correction bits
- Flags: Start and end of frame, is protocol dependent
Framing: Byte Count
- Length of the frame indicated by a byte at the beginning.
- This method is problematic because a corrupted byte count can lead to misinterpretation of frame boundaries.
Framing: Flag with Byte Stuffing
- A frame is delimited by flag bytes.
- In byte stuffing, an escape character (ESC) is added before any byte in the message that matches the flag byte pattern
- If the ESC character itself is present, it is also escaped by adding another ESC before it.
Framing: Flag with Bit Stuffing
- Insert an extra 0 bit after any sequence of five consecutive 1s to prevent them from being misinterpreted as flag bytes, mainly for HDLC.
- At the receiver's end, these inserted bits are removed. This method is used to prevent flag byte patterns
Framing: Physical Layer Coding Violations
- Using some redundancies, some LANs encode 1 bit of data by using 2 physical bits such as a high-low pair represents 1 and a low-high pair represents 0.
- The bit sequences are not used for data but for delimiting frames.
Error Detection
- Error Detection and Correction (EDC) bits provide redundancy for this process
- “D" signifies data protected by error checking, potentially including header fields.
- Error detection, though valuable, is not 100% reliable.
- Larger EDC fields improve error detection and correction capabilities
Error Detection Methods
- Common methods for error detection include: Parity check, Internet checksum, and Cyclic redundancy check (CRC).
Parity Checking
- Single Bit Parity: Detects single bit errors
- Two-Dimensional Bit Parity: Detects and corrects single bit errors.
- Two types of parity checking are even parity and odd parity.
- Even Parity: Number of 1s bits is even, then the parity bit is 0
- Odd Parity: Number of 1s bits is odd, the parity bit is 1
Internet Checksum
- Goal: to detect "errors" (flipped bits) in the transmitted packet
- Specifically used at transport layer
- Sender: treats segment contents as sequence of 16-bit integers, computes checksum as the addition (1's ement su complement sum) of segment contents, and puts value into UDP checksum field.
- Receiver: computes checksum of received segment, and checks if computed checksum equals value: NO = error, YES = no error.
Cyclic Redundancy Check (CRC)
- Employs more powerful error-detection coding with data bits (D) viewed as a binary number.
- An r value represents the "degree" of a "generator" G.
- The r CRC bits (R) are chosen sush that
<D, R>
is exactly divisible by G - Known by receivers, G divides
<D, R>
by G. Zero remainder indicates no errors detected; non-zero reveals existence. - Can detect all burst errors less than bits.
- Used in Ethernet, 802.11 WiFi, and ATM.
Elementary Data Link Protocols
- Utopian Simplex Protocol
- Simplex Stop-and-Wait Protocol; Error-Free/Noisy Channel
- Sliding Window Protocol; Go-back-N/Selective repeat
Utopian Simplex Protocol
- Provides unidirectional data transmission over an ideal channel
- Has error free transmissions
- Not realistic, and is called utopian simplex protocol
Simplex Stop-and-Wait Protocol for a Noisy Channel
- Popularly known as Stop-and-Wait Automatic Repeat Request (ARQ) protocol.
- Adds error control facilities to the basic Stop-and-Wait protocol.
Sliding Window Protocols
- Multiple frames can be sent by a sender before receiving an acknowledgment from the receiver.
- Imaginary boxes hold frames and a buffer is called the sending window.
- The receiver has a buffer called the receiving window with two categories
Protocol using Go-Back-N
- This protocol uses error recovery and Pipelining.
- Receiver's window size is 1
Protocol using Selective Repeat
- A protocol provides sending multiple frames before receiving the first frame acknowledgment.
- Here only the good/erroneous/lost frames are retransmitted/buffered.
Data Link Protocols
- HDLC – High-Level Data Link Control
- Data Link Layer in the Internet
HDLC – High-Level Data Link Control
- Layer 2 protocols which transmit synchronous data packets between point-to-point nodes (RFC 1662).
- It uses a zero-insertion/deletion process (bit stuffing) which ensures bit pattern of delimiter flag does not occur in the fields between flags.
- Frame format:
- Bits 01111110 Address Control Data Checksum 01111110
- Contains the source, and destination addresses of the frame, as well as error detection and correction bits.
HDLC Control Field
- Information, supervisory, and unnumbered frames, data is usually sent in multiples of 8 bits
- Only some variations require this/others provide the data alignments other than 8 bit boundaries.
- The frame check sequence (FCS) is a 16 - bit CRC or a 32-bit CRC computed over the Address, Control, and Information fields.
Summary of Principles
- Framing link layer consists of byte count, byte/bit stuffing.
- Error detection and correction methods of Parity, checksum, and CRC.
- Elementary data link protocols such as Utopian, Simplex, or Sliding Window.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.