Link layer process, Computer Networking

Assignment Help:

Each link layer process will have two connections: one "up" to the appropriate IP layer process, and one "sideways" to the link layer process on the simulated machine at the other end of its link.

Each link layer uses variable-length frames with these ?elds in this order:

  • Source (1 byte)
  • Destination (1 byte)
  • Protocol (1 byte)
  • Length, in bytes, of data ?eld (1 byte)
  • Data (0-MTU bytes)

There is no CRC. You must ensure that every frame sent among link processes has correct values for all ?elds. The MTUs are as follows:

  • A-R1 = 64 bytes
  • B-R1 = 64
  • C-R2 = 80
  • D-R2 = 80
  • R1-R2 = 56

Notice that all MTUs must be 255 or less because each link layer's frame length ?eld is a single byte.

The link addresses of A, B, C, D are 2, 3, 5, and 7, respectively. The link address of R1 to be used by A and B is 11. The link address of R2 to be used by C and D is 13. R1 and R2 are attached to a third link. The link address of R1 to be used by R2 is 17. The link address of R2 to be used by R1 is 19. The protocol number for IP is 42.

A link layer process is simple: it calls select(2), awaiting input on either connection. When input is available from the IP process, it is read, encapsulated in a single frame if possible, and then the frame is written into the connection to the other link process. (If the IP process attempts to send an IP datagram that is too big to ?t in a single frame, an error should be returned. On UNIX, this error is EMSGSIZE.)

When input is available from the other link process it is veri?ed to be a frame carrying IP data, and, if so, the frame's header is stripped and its data ?eld written into the IP connection. If the frame is erroneous, it is silently dropped.


Related Discussions:- Link layer process

Pvm library routines, In this part we shall give a short description of the...

In this part we shall give a short description of the routines in the PVM 3 user library. Each PVM program should include the PVM header file "pvm3.h" (in a C program) or "fpvm3.h"

Firewall, confiriguration,capabilities,implementation

confiriguration,capabilities,implementation

What is primary and secondary ring - fddi, What is primary and secondary ri...

What is primary and secondary ring One of the two FDDI rings is known as the primary ring; the other is called the secondary ring. The primary ring is utilized for data tra

Subletting, Ask Design private subnetworks (using Class A range for CIDR) f...

Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table. Hints: Consider how many network bits are required to a

Determine 10base5 - thicknet, 10Base5 - Thicknet A rigid coaxial c...

10Base5 - Thicknet A rigid coaxial cable (RG-8) approx 0.4 in' thick used in the original Ethernet networks Bus topology LAN utilize base signalling with a maximum se

What are the key elements of protocols, What are the key elements of protoc...

What are the key elements of protocols? The key elements of protocols are a. Syntax   It refers to the structure or format of the data that is the order in which they a

What are the advantages of star topology, What are the advantages of Star T...

What are the advantages of Star Topology? The advantages of star topology are: a. Relatively easy to configure. b. Simple to troubleshoot c. Media faults are automatic

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd