《Computer Networking:A Top Down Approach》英文教材教学资源(PPT课件讲稿,3rd edition)Chapter 5 Link Layer and LANs

Chapter 5 Computer Networkin Link Layer and LANs 17lAa学ms A note on the use of these ppt slides James F Kurse. keith w Ross Al material copyright 1996-2007 J F Kurose and K.W. Ross, All Rights reserved Computer Networking A Top Down Approach 4th edition Jim Kurose. Keith ross Addison-Wesley, Jul 2007 5: Dat
5: DataLink Layer 5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007

Link Layer 5. 1 Introduction and o5.6 Hubs and switches services o5.7PPP o 5.2 Error detection and correction 6 5.3 Multiple access protocols o 5.4 Link-Layer Addressing o5.5 Ethernet 5: Dat
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3 Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5: DataLink Layer 5-2

Link Layer: Setting the Context o Two physically connected devices e Host-router, router-router host-host ● Unit of data: frame M lication M l transport TH M network data link network protoco HnH+I M link link Hi HnHtM physical physical hys link frame adapter card 5: Dat
Link Layer: Setting the Context Two physically connected devices: Host-router, router-router, host-host Unit of data: frame 5: DataLink Layer 5-3 application transport network link physical network link physical M M M M Ht HnHt Hl HnHt Hl HnHt M frame phys. link data link protocol adapter card

Link layer Services ◆ framing, link access: Encapsulate datagram into frame, adding header, trailer e Channel access if shared medium MAC addresses used in frame headers to identify source, dest Different from ip address! o Reliable delivery between adjacent nodes We learned how to do this already chapter 3) o Seldom used on low bit error link(fiber, some twisted pair) o Wireless links: high error rates Q: why both link-level and end-end reliability? 5: Dat
Link Layer Services Framing, link access: Encapsulate datagram into frame, adding header, trailer Channel access if shared medium “MAC” addresses used in frame headers to identify source, dest Different from IP address! Reliable delivery between adjacent nodes We learned how to do this already (chapter 3)! Seldom used on low bit error link (fiber, some twisted pair) Wireless links: high error rates Q: why both link-level and end-end reliability? 5: DataLink Layer 5-4

Link Layer Services(more) o Flow Control o Pacing between adjacent sending and receiving nodes o Error detection o Errors caused by signal attenuation, noise o Receiver detects presence of errors Signals sender for retransmission or drops frame o Error correction: o Receiver identifies and corrects bit error(s] without resorting to retransmission o Half-duplex and full-duplex e With half duplex, nodes at both ends of link can transmit but not at same time 5: Dat
Link Layer Services (more) Flow Control: Pacing between adjacent sending and receiving nodes Error Detection: Errors caused by signal attenuation, noise. Receiver detects presence of errors: Signals sender for retransmission or drops frame Error Correction: Receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex With half duplex, nodes at both ends of link can transmit, but not at same time 5: DataLink Layer 5-5

Link Layer o5.1 Introduction and o5.6 Hubs and switches services o5.7PPP 5.2 Error detection and correction o 5.mUltiple access protocols o 5.4 Link-Layer Addressing o5.5 Ethernet 5: Dat
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5: DataLink Layer 5-6

Error detection EDC= Error Detection and Correction bits (redundancy) D Data protected by error checking, may include header fields Error detection not 100% reliable Protocol may miss some errors, but rarely Larger edc field yields better detection and correction datagram datagram all bits in d N OK detected error d data bits- D EDC D EDC bit-error prone link 5: Dat
Error Detection 5: DataLink Layer 5-7 EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields • Error detection not 100% reliable! • Protocol may miss some errors, but rarely • Larger EDC field yields better detection and correction

Checksumming: Cyclic Redundancy Check View data bits, D, as a binary number Choose r+1 bit pattern( generator , G o Goal: choose r crc bits, R, such that o exactly divisible(polynomial division by g(modulo 2 e Receiver knows G, divides by G. If non-zero remainder: error detected! e Can detect all burst errors less than r+1 bits o Widely used in practice (ATM, HDLC d bits ← r bits bit D: data bits to be sent R: CRC bits, pattern D* 2 XOR R mathematica formula 5: Dat
Checksumming: Cyclic Redundancy Check View data bits, D, as a binary number Choose r+1 bit pattern (generator), G Goal: choose r CRC bits, R, such that exactly divisible (polynomial division) by G (modulo 2) Receiver knows G, divides by G. If non-zero remainder: error detected! Can detect all burst errors less than r+1 bits Widely used in practice (ATM, HDLC) 5: DataLink Layer 5-8

CRC EXample Want D2r XORR=nG 10101 00 01110000 equivalently. 001 D2r=nG XORR 000 equivalently 1010 001 if we divide d2 by g 110 want remainder r 000 1100 1001 R: remainder 2 1010 001 011 R 5: Dat
CRC Example Want: D.2 r XOR R = nG equivalently: D.2 r = nG XOR R equivalently: if we divide D.2 r by G, want remainder R 5: DataLink Layer 5-9 R = remainder[ ] D.2 r G

Link Layer o5.1 Introduction and o5.6 Hubs and switches services o5.7PPP o 5.2 Error detection and correction ●5.3 Multiple access protocols o 5.4 Link-Layer Addressing o5.5 Ethernet 5: Dat
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3 Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5: DataLink Layer 5-10
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 《计算机网络安全》课程电子教案(PPT教学课件)第一章 计算机网络安全概述.ppt
- 并发程序精化验证及其应用(PPT讲稿)Refinement Verification of Concurrent Programs and Its Applications.pptx
- 《单片机原理与其应用》课程教学资源(PPT课件讲稿)第8章 单片机的存储器的扩展.pptx
- 南京大学:模型检验(PPT课件讲稿)model checking.pptx
- 苏州大学:《中文信息处理》课程教学资源(PPT课件讲稿)第二章 汉字代码体系.ppt
- 《C语言程序设计》课程教学资源(PPT课件讲稿)第4章 选择结构程序设计.ppt
- 《机器学习》课程教学资源(PPT课件讲稿)第六章 特征降维和选择.ppt
- 数据挖掘实现的住院病人的实时预警(PPT讲稿)Real-Time Clinical Warning for Hospitalized Patients via Data Mining.pptx
- 《PHP程序设计》教学资源(PPT课件讲稿)项目四 面向对象网站开发.ppt
- 《软件工程》课程教学资源(PPT课件讲稿)第3章 软件需求分析.ppt
- 四川大学:《操作系统 Operating System》课程教学资源(PPT课件讲稿)Chapter 3 Process Description and Control.ppt
- 随机图与复杂网络(PPT讲稿)随机演化博弈的算法研究及其在复杂网络中的应用.ppt
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第四章 存储器.ppt
- 中国人民大学:《数据库系统概论 An Introduction to Database System》课程教学资源(PPT课件讲稿)第一章 绪论.ppt
- 《编译原理》课程教学资源(PPT课件讲稿)语法分析 Syntax analysis(自底向上分析 Bottom-Up Parsing).ppt
- 《计算机网络安全》课程教学资源(PPT课件讲稿)第二章 密码学技术.ppt
- 《软件工程》课程教学资源(PPT课件讲稿)第7章 软件测试.ppt
- 上海交通厌:《通信网络》课程教学资源(PPT讲稿)DELAY MODELS IN DATA NETWORKS、LITTLE’S LAW、ARRIVAL MODEL、M/M/X QUEUING MODELS.pptx
- 《高级语言程序设计》课程教学资源(试卷习题)试题四(无答案).doc
- 《计算机网络和因特网》教学资源(PPT讲稿)网络互连(概念, IP 地址, IP 路由, IP 数据报, 地址解析).ppt
- 上海交通大学:操作系统安全(PPT课件讲稿)操作系统安全 OS Security(邹恒明).pps
- 某高校计算机专业课程教学大纲合集(汇编).pdf
- 电子科技大学:《网络安全与网络工程》课程教学资源(PPT课件讲稿)第六章 杂凑函数(主讲:聂旭云).ppt
- 中国科学技术大学:《嵌入式操作系统 Embedded Operating Systems》课程教学资源(PPT课件讲稿)第六讲 死锁及其处理.ppt
- 西华大学:《电子商务概论》课程教学资源(PPT课件讲稿)第7章 电子商务物流.ppt
- 《软件工程》课程教学资源(PPT课件讲稿)第12章 软件开发工具StarUML及其应用.ppt
- 《计算机网络》课程PPT教学课件(Windows)第09讲 DNS服务.ppt
- 中国科学技术大学:《数据结构》课程教学资源(PPT课件讲稿)第三章 线性表.pps
- 西安理工大学:面向主题的服务(PPT讲稿)综合集成支撑平台业务化——互联网信息化(平台、内容、服务).ppt
- 《数据科学》课程教学资源(PPT课件讲稿)第2章 数据预处理.ppt
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第2章 运算方法和运算器.ppt
- 《数据库系统原理》课程PPT教学课件(SQLServer)第12章 并发控制.ppt
- 关键词抽取、社会标签推荐及其在社会计算中的应用.pptx
- 克里特大学:The Application of Artificial Neural Networks in Engineering and Finance.ppt
- 山东大学:IPv6试商用的进展和挑战(PPT讲稿,网络与信息中心:秦丰林).pptx
- 清华大学:域内路由选择(PPT课件讲稿)Intra-domain routing.pptx
- 清华大学:TCP and Congestion Control(1).pptx
- 《人工智能技术导论》课程教学资源(PPT课件讲稿)第3章 图搜索与问题求解.ppt
- 《网页设计》课程教学资源:课程教学大纲.doc
- 西安电子科技大学:《操作系统 Operating Systems》课程教学资源(PPT课件讲稿)Chapter 04 Memory Management.ppt