Review of Internet Protocols Link Layer

Slides:



Advertisements
Similar presentations
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Advertisements

Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
CPSC 441 TUTORIAL TA: FANG WANG HUBS, SWITCHES AND BRIDGES Parts of the slides contents are courtesy of the following people: Jim Kurose, Keith Ross:
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can.
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
5: DataLink Layer5-1 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r Multi-tier design provides.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
5: DataLink Layer5-1 Link-layer switches. 5: DataLink Layer5-2 Hubs … physical-layer (“dumb”) repeaters: m bits coming in one link go out all other links.
The Medium Access Control Sublayer
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Chapter 3 Part 1 Switching and Bridging
Data Link Layer Lower Layers Local Area Network Standards
Chapter 5 Link Layer A note on the use of these ppt slides:
Link Layer 5.1 Introduction and services
Networking Devices.
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
MAC Addresses and ARP 32-bit IP address:
Chapter 4 Data Link Layer Switching
Hubs Hubs are essentially physical-layer repeaters:
University of Pittsburgh
ARP: Address Resolution Protocol
Session 16 INST 346 Technologies, Infrastructure and Architecture
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Data Link Issues Relates to Lab 2.
Services of DLL Framing Link access Reliable delivery
Multiple access.
Mac Addressing, Ethernet, and Interconnections
Hubs Hubs are essentially physical-layer repeaters:
CS 457 – Lecture 7 Wireless Networks
Data Link Issues Relates to Lab 2.
EEC-484/584 Computer Networks
Overview Jaringan Komputer (3)
Protocol layering and data
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Dr. Mozafar Bag-Mohammadi University of Ilam
EEC-484/584 Computer Networks
Instructor: Mr. Malik Zaib
18: Ethernet, Hubs, Bridges, Switches
Protocol layering and data
Link Layer: Multiple Access
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Chapter 5 Data Link Layer – Hub, Switch
Link Layer 5.1 Introduction and services
Presentation transcript:

Review of Internet Protocols Link Layer ECE 671 – Lecture 2 Review of Internet Protocols Link Layer

Structuring networks and protocols Goal of network: Provide communication for distributed applications How to organize networks in such a way that they Work correctly? Are scalable to large number of nodes? Can achieve high performance? Are interoperable across different technologies and uses? ECE 671

Example network How to achieve end-to-end data exchange? ECE 671

Internet architecture Designing the structure of the Internet was a difficult problem Many contributions One example: TCP/IP ECE 671

Internet architecture “Hourglass architecture” Achieves interoperability Single, common network layer protocol: Internet Protocol (IP) All network nodes need to support this protocol Supports diversity Different link/physical layer protocols below Different transport/application layer protocols above ECE 671

Next Gen. Internet Architecture Information Centric Networking (ICN): Move from host-centric to content/information-centric paradigm ECE 671

Services provided by layers Each layer in protocol stack provides a “service” Uses service from lower layers Benefits of layering Isolates complexity Clearly defined interfaces Protocols implement functionality within layer ECE 671

Protocols Protocols define communication between entities Format and order of messages Actions taken on transmission and/or receipt of message or other event Protocols use headers (and trailers) for control information Naming depends on layer ECE 671

Network devices Network devices differ by highest layer processed Devices can process/modify headers up to that layer Switches and routers are most common ECE 671

Review of specific protocols We will briefly review three protocols Link layer: Ethernet Network layer: Internet Protocol (IP) Transport layer: Transmission Control Protocol (TCP) For full details Networking textbooks RFCs ECE 671

Link layer Communication between “neighboring” interfaces What are the challenges? ECE 671

Link layer Point-to-point guided medium is straightforward One side sends, other side receives (coding, timing, etc. is handled by physical layer) Duplex operation by duplicating medium Multiple access case is more interesting Multiple nodes share guided or unguided medium Need to consider: Naming Medium access protocol “Strange” cases (e.g., hidden terminal problem) ECE 671

Medium access principles How should nodes share a medium? ECE 671

Medium access principles How should nodes share a medium? Do not interrupt ongoing transmissions When transmitting, stop after a while Allow for fair sharing among all nodes Allow efficient use of medium Do not require central control Etc. ECE 671

Side note: delays in networking What delays are encountered in networks? What is a typical range of each delay? ECE 671

Side note: delays in networking What delays are encountered in networks? Transmission delay Propagation delay Processing delay Queuing delay What is a typical range of each delay? Assumption: 1Gbps, 1250-byte packet, 1000km, 200000km/s Transmission delay: 10 microseconds Propagation delay: 5 milliseconds Processing delay: low microseconds Queuing delay: transmission delay of queued packets ECE 671

Signal propagation At link layer, signal propagation delay matters Space-time diagram illustrates events Slope of lines determined by propagation speed Typically: 2/3 speed of light of light (~200,000 km/s) ECE 671

ALOHA protocol Propagation delay may cause collisions on medium Even if all stations check to see if medium is available Slotted ALOHA protocol Discrete time slots Each node makes random choice to transmit in slot or not Pure ALOHA No time slots Each note makes random choice to transmit at any time ECE 671

Slotted ALOHA Assumptions: Operation: all frames same size time divided into equal size slots (time to transmit 1 frame) nodes start to transmit only at slot beginning nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation: when node obtains fresh frame, transmits in next slot if no collision: node can send new frame in next slot if collision: node retransmits frame in each subsequent slot with prob. p until success ECE 671

Slotted Aloha Pros: Cons: 1 2 3 node 1 node 2 node 3 C S E Pros: single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons: collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization ECE 671

Slotted ALOHA Efficiency efficiency: long-run fraction of successful slots (many nodes, all with many frames to send) max efficiency: find p* that maximizes Np(1-p)N-1 for many nodes, take limit of Np*(1-p*)N-1 as N goes to infinity, gives: max efficiency = 1/e = .37 suppose: N nodes with many frames to send, each transmits in slot with probability p prob that given node has success in a slot = p(1-p)N-1 prob that any node has a success = Np(1-p)N-1 ! at best: channel used for useful transmissions 37% of time! ECE 671

Analysis of ALOHA Slotted ALOHA analysis ALOHA analysis Probability that k frames are generated during interval Poisson distribution: Pr[k]=Gke-G/k! G is rate of frame generation (new and retransmission) Probability of successful transmission Success if no other frame generated (P0): S=GP0=Ge-G ALOHA analysis Frame overlaps two slots Probability that no other frame is generated during two slots: P0=e-2G Success S=GP0=Ge-2G Max throughput: 37%@G=1.0 (slotted ALOHA) 18%@G=0.5 (ALOHA) ECE 671

CSMA/CD protocol How can we improve ALOHA? Carrier Sensing (CS) Don’t send when somebody else has already started Stop when interference is already happening Why do we need to do that if we don’t start sending when somebody else sends? Carrier Sensing (CS) Listen on channel Only send when nobody else is transmitting Collision Detection (CD) Listen to own transmission on channel If garbled then stop transmitting ECE 671

spatial layout of nodes CSMA/CD Collision spatial layout of nodes Collisions can still occur: propagation delay means two nodes may not hear each other’s transmission Collision: entire packet transmission time wasted distance & propagation delay play role in in determining collision probability

CSMA/CD example ECE 671

Ethernet IEEE 802.3 protocol Medium access with CSMA/CD Truncated exponential backoff Wait for random number of 512 bit-times After c collisions: uniform distribution over [0…2min{c,10}-1] After 16 collisions: transmission aborted Limitations Max 2.5km of cable, thus RTT limited to 51.2s Corresponds to 64 bytes @ 10Mbps ECE 671

Ethernet Switch link-layer device: takes an active role store, forward Ethernet frames examine incoming frame’s MAC address, selectively forward frame to one-or-more outgoing links when frame is to be forwarded on segment, uses CSMA/CD to access segment transparent hosts are unaware of presence of switches plug-and-play, self-learning switches do not need to be configured ECE 671

Simultaneous Transmissions switch with six interfaces (1,2,3,4,5,6) A A’ B B’ C C’ 1 2 3 4 5 6 hosts have dedicated, direct connection to switch switches buffer packets Ethernet protocol used on each incoming link, but no collisions; full duplex each link is its own collision domain switching: A-to-A’ and B-to-B’ simultaneously, without collisions ECE 671

switch with six interfaces Switch Table switch with six interfaces (1,2,3,4,5,6) A A’ B B’ C C’ 1 2 3 4 5 6 Q: how does switch know that A’ reachable via interface 4, B’ reachable via interface 5? A: each switch has a switch table, each entry: (MAC address of host, interface to reach host, time stamp) looks like a routing table! Q: how are entries created, maintained in switch table? something like a routing protocol? ECE 671

Self-learning Switch Source: A Dest: A’ A A’ B B’ C C’ 1 2 3 4 5 6 A A’ switch learns which hosts can be reached through which interfaces when frame received, switch “learns” location of sender: incoming LAN segment records sender/location pair in switch table MAC addr interface TTL A 1 60 Switch table (initially empty) Data Link Layer

VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… 1 7 9 15 Virtual Local Area Network 2 8 10 16 … … Switch(es) supporting VLAN capabilities can be configured to define multiple virtual LANS over single physical LAN infrastructure. Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) … operates as multiple virtual switches 1 8 2 7 9 16 10 15 … … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-16) ECE 671

Electrical Engineering Port-based VLAN router traffic isolation: frames to/from ports 1-8 can only reach ports 1-8 can also define VLAN based on MAC addresses of endpoints, rather than switch port dynamic membership: ports can be dynamically assigned among VLANs forwarding between VLANS: done via routing (just as with separate switches) in practice vendors sell combined switches plus routers 1 7 9 15 2 8 10 16 … … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) ECE 671

Spanning Multiple Switches 1 7 9 15 16 1 3 5 7 2 8 10 2 4 6 8 … … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) Ports 2,3,5 belong to EE VLAN Ports 4,6,7,8 belong to CS VLAN trunk port: carries frames between VLANS defined over multiple physical switches frames forwarded within VLAN between switches can’t be vanilla 802.1 frames (must carry VLAN ID info) 802.1q protocol adds/removed additional header fields for frames forwarded between trunk ports ECE 671

802.1Q VLAN Frame Format 802.1 frame 802.1Q frame type dest. address source address preamble data (payload) CRC 802.1 frame type dest. address source preamble 802.1Q frame data (payload) CRC 2-byte Tag Protocol Identifier (value: 81-00) Recomputed CRC Tag Control Information (12 bit VLAN ID field, 3 bit priority field like IP TOS) ECE 671

Related topics Next: network layer Later: switches and bridges Combining links to a network Later: switches and bridges Organization of layer 2 links into local area networks (LAN) Algorithms for reaching particular nodes in a LAN ECE 671