Link layer process, Computer Networking

Assignment Help:

Each link layer process will have two connections: one "up" to the appropriate IP layer process, and one "sideways" to the link layer process on the simulated machine at the other end of its link.

Each link layer uses variable-length frames with these ?elds in this order:

  • Source (1 byte)
  • Destination (1 byte)
  • Protocol (1 byte)
  • Length, in bytes, of data ?eld (1 byte)
  • Data (0-MTU bytes)

There is no CRC. You must ensure that every frame sent among link processes has correct values for all ?elds. The MTUs are as follows:

  • A-R1 = 64 bytes
  • B-R1 = 64
  • C-R2 = 80
  • D-R2 = 80
  • R1-R2 = 56

Notice that all MTUs must be 255 or less because each link layer's frame length ?eld is a single byte.

The link addresses of A, B, C, D are 2, 3, 5, and 7, respectively. The link address of R1 to be used by A and B is 11. The link address of R2 to be used by C and D is 13. R1 and R2 are attached to a third link. The link address of R1 to be used by R2 is 17. The link address of R2 to be used by R1 is 19. The protocol number for IP is 42.

A link layer process is simple: it calls select(2), awaiting input on either connection. When input is available from the IP process, it is read, encapsulated in a single frame if possible, and then the frame is written into the connection to the other link process. (If the IP process attempts to send an IP datagram that is too big to ?t in a single frame, an error should be returned. On UNIX, this error is EMSGSIZE.)

When input is available from the other link process it is veri?ed to be a frame carrying IP data, and, if so, the frame's header is stripped and its data ?eld written into the IP connection. If the frame is erroneous, it is silently dropped.


Related Discussions:- Link layer process

What is error detection, What is Error Detection? What are its methods? ...

What is Error Detection? What are its methods? Data can be corrupted during transmission. For reliable communication errors must be deducted and corrected. Error Detection uses

Explain the rad methodology with a suitable diagram, Question : (a) Exp...

Question : (a) Explain the ‘RAD' methodology with a suitable diagram. (b) One of the activities to be performed during Rapid Application Development is Rapid Business Analys

Nak free reliable data transfer protocol, Normal 0 false fal...

Normal 0 false false false EN-IN X-NONE X-NONE

State the example of intranet security, State the example of intranet secur...

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all

Binary addition, using binary adition, what is the result of 1010 + 10? Usi...

using binary adition, what is the result of 1010 + 10? Using binary addition, how would you repeatedly increment a number by 2?

advance routing, i need help with this assigmnet reply asap pleas

i need help with this assigmnet reply asap please

Method of ip multicasting or multicast ip address, Can you describe the con...

Can you describe the concept of IP multicasting or multicast IP address?

Memory pools-input and output pool-pci pool, Memory Pools IOS manages a...

Memory Pools IOS manages available free memory thorugh  memory pool series, which are essentially heaps in the generic sense; each pool is a set of memory blocks that can be al

Troubleshoot and correct vtp and configuration errors-ccna, Troubleshoot an...

Troubleshoot and Correct VTP and Configuration Errors When all errors are corrected, you should be capable to ping PC4 from PC1, PC5 from PC2, and PC6 from PC3. You should also

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd