Professional Documents
Culture Documents
Error control and flow control in data link layer
Error control and flow control in data link layer
DLL uses the techniques of error control simply to ensure and confirm that all
the data frames or packets, i.e. bit streams of data, are transmitted or
transferred from sender to receiver with certain accuracy.
Using or providing error control at this data link layer is an optimization, it
was never a requirement.
Error control is basically process in data link layer of detecting or identifying
and re-transmitting data frames that might be lost or corrupted during
transmission.
In both of these cases, receiver or destination does not receive correct data
frame and sender or source does not even know anything about any such
loss regarding data frames.
Therefore, in such type of cases, both sender and receiver are provided with
some essential protocols that are required to detect or identify such types of
errors as loss of data frames.
The Data-link layer follows a technique known as re-transmission of frames
to detect or identify transit errors and also to take necessary actions that are
required to reduce or remove such errors.
Each and every time an error is detected during transmission, particular
data frames are retransmitted and this process is known as ARQ (Automatic
Repeat Request).
Stop-and-Wait Flow Control : This method is the easiest and simplest form of flow
control. In this method, basically message or data is broken down into various multiple
frames, and then receiver indicates its readiness to receive frame of data. When
acknowledgement is received, then only sender will send or transfer the next frame.
This process is continued until sender transmits EOT (End of Transmission) frame. In
this method, only one of frames can be in transmission at a time. It leads to
inefficiency i.e. less productivity if propagation delay is very much longer than the
transmission delay and Ultimately In this method sender sent single frame and
receiver take one frame at a time and sent acknowledgement(which is next frame
number only) for new frame.
Advantages –
This method is very easiest and simple and each of the frames is checked and acknowledged well.
This method is also very accurate.
Disadvantages –
This method is fairly slow.
In this, only one packet or frame can be sent at a time.
It is very inefficient and makes the transmission process very slow.
2. Sliding Window Flow Control : This method is required where reliable in-order delivery of packets or
frames is very much needed like in data link layer. It is point to point protocol that assumes that none of the
other entity tries to communicate until current data or frame transfer gets completed. In this method,
sender transmits or sends various frames or packets before receiving any acknowledgement. In this method,
both the sender and receiver agree upon total number of data frames after which acknowledgement is
needed to be transmitted. Data Link Layer requires and uses this method that simply allows sender to have
more than one unacknowledged packet “in-flight” at a time. This increases and improves network
throughput. and Ultimately In this method sender sent multiple frame but receiver take one by one
and after completing one frame acknowledge(which is next frame number only) for new frame.
Advantages –
It performs much better than stop-and-wait flow control.
This method increases efficiency.
Multiples frames can be sent one after another.
Disadvantages –
The main issue is complexity at the sender and receiver due to the transferring of multiple frames.
The receiver might receive data frames or packets out the sequence.
Connection-oriented service and Connection-less service
Connection-oriented service is
Connection-less Service is preferred
2. preferred by long and steady
by bursty communication.
communication.
Connection-oriented Service is Connection-less Service is not
3.
necessary. compulsory.
Connection-oriented Service is Connection-less Service is not
4.
feasible. feasible.
Connection-oriented services
Connection-less Service requires a
8. require a bandwidth of a high
bandwidth of low range.
range.
Ex: TCP (Transmission Control
9. Ex: UDP (User Datagram Protocol)
Protocol)
Connection-oriented requires Connection-less Service does not
10.
authentication. require authentication.
IPv4 and IPv6
The address through which any computer communicates with our computer
is simply called an Internet Protocol Address or IP address.
For example, If we want to load a web page or we want to download
something, we require the address for delivery of that particular file or
webpage. That address is called an IP Address.
Types of IP Addresses
IPv4 (Internet Protocol Version 4)
IPv6 (Internet Protocol Version 6)
IPv4
IPv4 address consists of two things that are the network address and the
host address. It stands for Internet Protocol version four. It was
introduced in 1981 by DARPA and was the first deployed version in 1982 for
production on SATNET and on the ARPANET in January 1983.
IPv4 addresses are 32-bit integers that have to be expressed in Decimal
Notation. It is represented by 4 numbers separated by dots in the range of
0-255, which have to be converted to 0 and 1, to be understood by
Computers. For Example, An IPv4 Address can be written
as 189.123.123.90.
IPv4 Address Format
IPv4 Address Format is a 32-bit Address that comprises binary digits
separated by a dot (.).
IPv6
IPv6 is based on IPv4 and stands for Internet Protocol version 6. It was first
introduced in December 1995 by Internet Engineering Task Force. IP version
6 is the new version of Internet Protocol, which is way better than IP version
4 in terms of complexity and efficiency. IPv6 is written as a group of 8
hexadecimal numbers separated by colon (:). It can be written as 128 bits of
0s and 1s.
IPv6 Address Format
IPv6 Address Format is a 128-bit IP Address, which is written in a group of 8
hexadecimal numbers separated by colon (:).
Benefits of IPv6
The recent Version of IP IPv6 has a greater advantage over IPv4. Here are
some of the mentioned benefits:
Larger Address Space: IPv6 has a greater address space than IPv4, which
is required for expanding the IP Connected Devices. IPv6 has 128 bit IP
Address rather and IPv4 has a 32-bit Address.
Improved Security: IPv6 has some improved security which is built in with
it. IPv6 offers security like Data Authentication, Data Encryption, etc. Here,
an Internet Connection is more Secure.
Simplified Header Format: As compared to IPv4, IPv6 has a simpler and
more effective header Structure, which is more cost-effective and also
increases the speed of Internet Connection.
Prioritize: IPv6 contains stronger and more reliable support for QoS
features, which helps in increasing traffic over websites and increases audio
and video quality on pages.
Improved Support for Mobile Devices: IPv6 has increased and better
support for Mobile Devices. It helps in making quick connections over other
Mobile Devices and in a safer way than IPv4.
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It Supports Manual and DHCP It supports Auto and renumbering
address configuration address configuration
In IPv4 end to end, connection In IPv6 end-to-end, connection
integrity is Unachievable integrity is Achievable
The address space of IPv6 is quite
It can generate 4.29×109 address
large it can produce 3.4
space
×1038 address space
The Security feature is dependent on IPSEC is an inbuilt security feature in
the application the IPv6 protocol
Address representation of IPv4 is in Address Representation of IPv6 is in
decimal hexadecimal
Fragmentation performed by Sender In IPv6 fragmentation is performed
and forwarding routers only by the sender
In IPv6 packet flow identification are
In IPv4 Packet flow identification is
Available and uses the flow label field
not available
in the header
In IPv6 checksum field is not
In IPv4 checksum field is available
available
In IPv6 multicast and anycast
It has a broadcast Message
message transmission scheme is
Transmission Scheme
available
In IPv6 Encryption and
In IPv4 Encryption and
Authentication are provided
Authentication facility not provided
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are IPv6 consists of 8 fields, which are
separated by addresses dot (.) separated by a colon (:)
IPv4’s IP addresses are divided into
IPv6 does not have any classes of the
five different classes. Class A , Class
IP address.
B, Class C, Class D , Class E.
IPv4 supports VLSM(Variable Length
IPv6 does not support VLSM.
subnet mask).
Example of IPv6:
Example of IPv4: 66.94.29.13 2001:0000:3238:DFE1:0063:0000:0
000:FEFB
2. Variable size: In this, there is a need to define the end of the frame as
well as the beginning of the next frame to distinguish. This can be done in
two ways:
Length field – We can introduce a length field in the frame to indicate the
length of the frame. Used in Ethernet(802.3). The problem with this is
that sometimes the length field might get corrupted.
End Delimiter (ED) – We can introduce an ED(pattern) to indicate the
end of the frame. Used in Token Ring. The problem with this is that ED
can occur in the data.