Ch 4: Data Link Layer Flashcards
(30 cards)
Three Functions of the Data Link Protocol
- Controls when computers transmit (media access control)
- Detects and corrects transmission errors (error control)
- Identifies the start and end of a message by using a PDU (message
delineation)
Media Access Control
- Media access control refers to the need to control when computers
transmit - With point-to-point full-duplex configurations, media access control is unnecessary
- Media access control becomes important when several computers share the same communication circuit
- Here, it is critical to ensure that no two computers attempt to transmit data at the same time
Two fundamental approaches to media access control
- Contention
- Controlled access
Contention
- With contention, computers wait until the circuit is free and then transmit whenever they have data to send
- Contention is commonly used in Ethernet LANs
- There must be some technique to continue after a collision
Controlled Access
- With controlled access, one device controls the circuit and determines which clients can transmit at what time
- There are two commonly used controlled access techniques
1. Access requests
2. Polling - With the access request technique, client computers that want to transmit send a request to transmit to the device that is controlling the circuit
- The controlling device grants permission for one computer at a time to transmit
Polling
- Polling is the process of sending a signal to a client computer that permits it to transmit
- Periodically, the controlling device polls the client to see if it has data to send
- There are several types of polling:
o With roll-call polling, the controller works consecutively through a list of clients
o With hub polling (often called token passing), one device starts the poll and passes it to the next computer on the multipoint circuit, and so on
Relative Performance
- Contention approaches work better than controlled
approaches for small networks that have low usage - For large networks with high usage controlled access works
better - The key to selecting the best access control technique is to
find the crossover point
Error Control
- There are human errors and network errors
o Human errors are controlled through the application program
o Network errors are controlled by the network hardware and software
There are two categories of network errors:
- Corrupted data (data that have been changed)
- Lost data
* Networks should be designed to (1) prevent, (2) detect, and (3) correct both
Burst Error
- Normally, errors appear in bursts
- In a burst error, more than 1 data bit is changed by the error-causing condition
- In other words, errors are not uniformly distributed
Why is it both good and bad that errors tend to occur in bursts?
o If the errors were not clustered, character-checking schemes would be effective at detecting errors
o With burst errors, more reliance must be placed on error detection and correction methods
Error Detection
- Parity Checking
- Checksum
- Cyclic Redundancy Check
Parity Checking
o With this technique, one additional bit is added to each byte in the message
o The value of this additional parity bit is based on the number of 1s in each byte transmitted
Checksum
o With the checksum technique, a checksum (typically 1 byte) is added to the end of the message
o The checksum is calculated by adding the decimal value of each character in the message, dividing the sum by 255, and using the remainder as the checksum
Cyclic Redundancy Check(CRC)
o With CRC, a message is treated as one long binary number, which is divided by a preset number, and the remainder is used as the CRC code
Forward Error Correction
- Forward error correction uses codes containing sufficient redundancy to prevent errors by detecting and correcting them at the receiving end without retransmission of the original message
- The redundancy, or extra bits required, varies with different schemes
o It ranges from a small percentage of extra bits to 100% redundancy - Forward error correction is commonly used in satellite transmission
Error Control in Practice
- Most network cables—especially LAN cables—are very reliable, and errors are far less common than they were in the 1980s
- Most data link layer software used in LANs is configured to detect errors, but not correct them
- Any time a packet with an error is discovered, it is simply discarded
Asynchronous Transmission
- Asynchronous transmission is often
referred to as start–stop transmission because the transmitting computer can transmit a character whenever it is convenient, and the receiving computer will accept that character - With asynchronous transmission, each character is transmitted independently of all other characters
Asynchronous Transmission Continued
- To separate the characters and synchronize transmission, a start bit and a stop bit are put on the front and back of each individual character
- The recognition of the start and stop of each message (called synchronization) takes place for each individual character
Synchronous Transmission
- With synchronous transmission, all the letters or data in one
group of data are transmitted at one time as a block of data - This block of data is called a frame
- The start and end of the entire frame must be marked, not the
start and end of each letter
Four Commonly used Synchronous Data Link Protocols
- Synchronous data link control (SDLC)
- High-level data link control (HDLC)
- Ethernet
- Point-to-point protocol (PPP)
Synchronous Data Link Control (SDLC)
- This is a mainframe protocol developed by IBM in 1972 that is
still in use today - Each SDLC frame begins and ends with a special bit pattern
(01111110), known as the flag - The address field identifies the destination
- The control field identifies the kind of frame that is being
transmitted
Synchronous Data Link Control (SDLC) Continued
- An information frame is used for the transfer and reception of
messages, frame numbering of contiguous frames, and the like - A supervisory frame is used to transmit acknowledgments and
negative acknowledgment - The message field is of variable length and is the user’s message
- The frame check sequence field is a 32-bit CRC code
High-Level Data Link Control (HDLC)
- This is a formal standard developed by the ISO often used in WANs
o HDLC is essentially the same as SDLC, except that the address and control fields can be longer - HDLC also has several additional benefits:
o A larger sliding window for continuous ARQ
o It uses a controlled-access media access protocol