Unit 5 Physical and Data Link Layer 16052023
Unit 5 Physical and Data Link Layer 16052023
– Distortion: Distortion can occur when the shape or timing of the transmitted
signal is altered during transmission. This can result in errors in the received
data, as the receiver may not be able to accurately interpret the distorted
signal.
– Delay: Delay can occur when the signal takes longer than expected to reach
the receiver, resulting in a delay between the transmitted and received data.
This can be especially problematic in real-time applications, such as voice or
video communication, where delays can lead to a loss of synchronization or
degraded quality.
Performance
• Bandwidth ( Throughput )
• Latency ( Delay )
Abstract Details
• Bandwidth: Bandwidth refers to the maximum
data transfer rate of a network connection.
– Higher bandwidth allows for faster data
transmission and better network performance.
• Latency: Latency is the time it takes for a data
packet to travel from its source to its
destination.
– Lower latency results in quicker response times
and better network performance,
• Bandwidth : No of bits transmitted in a certain period of time
– A link may have a bandwidth of “B” bps, but we can send only “T” bps ; T
< B always;
Problem :
A network with bandwidth of 10 mbps can pass only an average of 12000
frames per minute and each frame carrying an average of 10000 bits, what
is the throughput of this network ?
• Solution:
To calculate the propagation time, we need to determine the time it takes for a
signal to travel from one device to another.
• Step 2: The result obtained above represents the propagation time. However, it's
often more convenient to express it in milliseconds (ms).
• You are playing an online game, and you measure the round-trip
time (RTT) between your computer and the game server.
• Solution: Since the RTT measures the time it takes for a round
trip, the latency can be calculated by dividing the RTT by 2.
– Latency = RTT / 2 = 50 ms / 2 = 25 ms
Transmission Media
• Transmission media, also known as
communication channels, are the physical
paths or mediums used to transmit data and
information from one point to another in a
communication system.
Twisted Pair cable
• Twisted pair cable is a type of transmission
medium commonly used in computer
networks and telephone systems.
– When a user initiates a call, the network sets up a dedicated circuit between the calling and receiving
devices.
– This involves reserving the necessary resources along the entire path, including transmission lines
and switching equipment.
– Once the circuit is established, data (such as voice or video) is transmitted directly over the dedicated
path without any intermediate processing.
– The devices communicate in real-time, and the dedicated resources ensure a consistent quality of
service throughout the call.
• Call Termination:
– When the call is ended by either party, the dedicated circuit is released, and the resources are freed
up for other connections.
– The circuit is no longer available for use by any other communication until it is set up again for a new
call.
• Circuit switching has several advantages,
– guaranteed bandwidth and low latency,
– which are particularly beneficial for real-time
applications like voice and video calls.
– It also provides a predictable quality of service since
the dedicated resources ensure consistent
performance throughout the connection.
• Circuit switching has limitations.
– It requires the reservation of resources even during
periods of silence or inactivity, resulting in inefficient
use of network capacity.
– Additionally, establishing and tearing down circuits can
take some time, which can lead to delays in call setup.
Data Link Layer
• Two main functions of the data link layer
• Data link control, deals with the design and procedures for
communication between two adjacent nodes:
– node-to-node communication.
• Data link control functions include framing, flow and error control, and
• In a character-oriented protocol,
– data to be carried are 8-bit characters from a coding system such as
ASCII.
– The header, which normally carries the source and destination addresses
and other control information,
– To separate one frame from the next, an 8-bit (I-byte) flag is added at
the beginning and the end of a frame.
Bit-Oriented Protocols
• the data section of a frame is a sequence of bits to be
interpreted by the upper layer as text, graphic, audio, video,
and so on.
• Error Control
– Error control is both error detection and error correction.
– Error control in the data link layer is based on automatic repeat request,
which is the retransmission of data.
– receiver immediately removes the header from the frame and hands the data
packet to its network layer,
– In other words, the receiver can never be overwhelmed with incoming frames
Stop-and-Wait Protocol
NOISY CHANNELS
0, 1,2,3,4,5,6, 7,8,9, 10, 11, 12, 13, 14, 15,0, 1,2,3,4,5,6,7,8,9,10, 11, .....
• Sliding Window
– The send window is an imaginary box covering the
sequence numbers of the data frames which can be
in transit.
m
– The maximum size of the window is 2 – 1
– The window at any time divides the possible
sequence numbers into four regions.
– The first region, from the far left to the left wall of
the window, defines the sequence numbers
belonging to frames that are already acknowledged
The sender does
not worry about
these frames and
keeps no copies of
them.
In Figure 11.12b, frames 0, I, and 2 are acknowledged, so the window has slid to the right
three slots.
Note that the value of Sf is 3 because frame 3 is now the first outstanding frame.
HDLC
• High-level Data Link Control (HDLC) is a bit-oriented protocol for communication
over point-to-point and multipoint links.
• Configurations and Transfer Modes HDLC provides two common transfer modes
that can be used in different configurations:
– normal response mode (NRM) and asynchronous balanced mode (ABM).
• A primary station can send commands; a secondary station can only respond.
The NRM is used for both point-to-point and multiple-point links, as shown in
Figure 11.25
• Asynchronous Balanced Mode In
asynchronous balanced mode (ABM), the
configuration is balanced.
• The link is point-to-point, and each station can
function as a primary and a secondary (acting
as peers), as shown in Figure 11.26. This is the
common mode today.
POINT-TO-POINT PROTOCOL (PPP)
• Although HDLC is a general protocol that can be used for both point-to-point and
multipoint configurations,
• one of the most common protocols for point-to-point access is the Point-to-Point
Protocol (PPP).
• Today, millions of Internet users who need to connect their home computers to
the server of an Internet service provider use PPP.
• The majority of these users have a traditional modem; they are connected to the
Internet through a telephone line, which provides the services of the physical
layer.
• But to control and manage the transfer of data, there is a need for a point-to-
point protocol at the data link layer.
• PPP provides several services:
2. PPP defines how two devices can negotiate the establishment of the link and the
exchange of data.
3. PPP defines how network layer data are encapsulated in the data link frame.
1. PPP does not provide flow control. A sender can send several frames
one after another with no concern about overwhelming the receiver.
• They help identify and fix errors that may occur during
the transmission of data across the network.
• Checksum:
– Checksum is another widely used error detection technique.
– It involves adding a checksum value to the data being transmitted.
– The checksum is calculated by summing up all the data words and then taking
the complement of the result.
– The receiver recalculates the checksum using the received data and compares
it with the received checksum.
– If they don't match, an error is detected.
• Cyclic Redundancy Check (CRC):
– CRC is a more sophisticated error detection technique.
– It uses polynomial division to generate a checksum, which is appended to the
data.
– At the receiver's end, the received data and checksum are divided by the same
polynomial.
– If the remainder is zero, no error is detected; otherwise, an error has occurred.
• Physical Addressing:
– The Data Link Layer uses physical addressing, such as MAC (Media Access Control)
addresses, to identify the source and destination nodes on the same network segment.
– MAC addresses are typically assigned to network interface cards (NICs) and are globally
unique.
– The Data Link Layer employs various error detection and correction techniques, such as
checksums and cyclic redundancy checks (CRC), to ensure data integrity during
transmission.
– These techniques help detect and, in some cases, correct errors that occur due to noise
or other impairments on the physical medium.
• Flow Control:
– Flow control mechanisms in the Data Link Layer ensure that the sender does not
overwhelm the receiver with data.
– It manages the rate of data transmission by implementing techniques like sliding
window protocols, which allow a sender to transmit a certain number of frames before
receiving acknowledgments from the receiver.
• Error Handling:
– The Data Link Layer handles error conditions, such as frame loss or corruption, by
requesting retransmissions using protocols like Automatic Repeat Request (ARQ).
– It also handles frame sequencing and reassembly at the receiver's end.
Common protocols and standards associated with the Data Link Layer include Ethernet (IEEE
802.3), Wi-Fi (IEEE 802.11), Point-to-Point Protocol (PPP), High-Level Data Link Control
(HDLC), and Asynchronous Transfer Mode (ATM).