CSCI-1680 Link Layer Reliability Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.

Slides:



Advertisements
Similar presentations
COS 461 Fall 1997 Data Link Layer u Today: LANs other than Ethernet –token rings –switched networks –cellular technology u remaining issues –error detection.
Advertisements

CSCI-1680 Link Layer Reliability Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
CPS-365 Link Layer Reliability Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Theophilus Benson.
EE 4272Spring, 2003 Chapter 7 Data Link Control Objectives: Effective & reliable data communication between two directly connected transmitting-receiving.
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
Chapter 6 Errors, Error Detection, and Error Control.
Spring 2002CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
Chapter 2 Designing Reliable Protocols Professor Rick Han University of Colorado at Boulder
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 13 Introduction to Computer Networks.
EE 122: Error detection and reliable transmission Ion Stoica September 16, 2002.
1 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Spring 2004 EE4272 Direct Link Networks (I) Hardware Building Blocks (nodes & links) 5 Issues before Exchanging Packets  Encoding  Framing  Error Detection.
Spring 2003CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Adapted from Tanenbaum's Slides for Computer Networking, 4e The Data Link Layer Chapter 3.
Error Detection and Reliable Transmission EECS 122: Lecture 24 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Networking. Protocol Stack Generally speaking, sending an message is equivalent to copying a file from sender to receiver.
18-Aug-154/598N: Computer Networks Overview Direct link networks –Error detection - Section 2.4 –Reliable transmission - Section 2.5.
CSCI-1680 Link Layer Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.3: Reliable Transmission Dr. Nghi.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
PART III DATA LINK LAYER. Position of the Data-Link Layer.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Cyclic Code. Linear Block Code Hamming Code is a Linear Block Code. Linear Block Code means that the codeword is generated by multiplying the message.
Lecture 6: Framing and Error Detection-Data Link Layer Functions
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 15.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Detection (§3.2.2)
Link Layer Dr. Mozafar Bag-Mohammadi Ilam University.
Computer Science Division
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 12: Reliability Slides used with permissions.
Spring 2001CS 5851 Outline Building Blocks Shannon’s Theorem Encoding 11. Physical Layer.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
CHAPTER 3: DATA LINK CONTROL Flow control, Error detection – two dimensional parity checks, Internet checksum, CRC, Error control, Transmission efficiency.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSCI-1680 Link Layer Reliability Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca John Jannotti.
Error Detection and Correction
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Coding Overview (§3.2)
Transport Layer: Sliding Window Reliability
Transmission Errors Error Detection and Correction.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
1 Direct Link Networks: Reliable Transmission Sections 2.5.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Reliability Some slides used with permissions.
CSE331: Introduction to Networks and Security Lecture 4 Fall 2002.
Computer Networking Lecture 16 – Reliable Transport.
Reliable Transmission
Part III. Data Link Layer
Advanced Computer Networks
Data Link Layer What does it do?
Introduction of Transport Protocols
COMP/ELEC 429/556 Introduction to Computer Networks
CSCI-1680 Link Layer Reliability
Reliable transmission
Point-to-Point Links Outline Encoding Framing Error Detection
Advanced Computer Networks
CSCI-1680 Link Layer I Rodrigo Fonseca
The Transport Layer Reliability
CSE 461: Framing, Error Detection and Correction
Transport Layer Outline Intro to transport UDP
Error detection: Outline
Presentation transcript:

CSCI-1680 Link Layer Reliability Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca

Last time –Physical layer: encoding, modulation –Link layer framing Today –Getting frames across: reliability, performance

Sending Frames Across Transmission Delay Propagation Delay Latency

Sending Frames Across Throughput: bits / s … …

Which matters most, bandwidth or delay? How much data can we send during one RTT? E.g., send request, receive file Time Request Response For small transfers, latency more important, for bulk, throughput more important

Performance Metrics Throughput - Number of bits received/unit of time –e.g. 10Mbps Goodput - Useful bits received per unit of time Latency – How long for message to cross network –Process + Queue + Transmit + Propagation Jitter – Variation in latency

Latency Processing –Per message, small, limits throughput –e.g. or 120μs/pkt Queue –Highly variable, offered load vs outgoing b/w Transmission –Size/Bandwidth Propagation –Distance/Speed of Light

Reliable Delivery Several sources of errors in transmission Error detection can discard bad frames Problem: if bad packets are lost, how can we ensure reliable delivery? –Exactly-once semantics = at least once + at most once

At Least Once Semantics How can the sender know packet arrived at least once? –Acknowledgments + Timeout Stop and Wait Protocol –S: Send packet, wait –R: Receive packet, send ACK –S: Receive ACK, send next packet –S: No ACK, timeout and retransmit

Stop and Wait Problems Duplicate data Duplicate acks Slow (channel idle most of the time!) May be difficult to set the timeout value

Duplicate data: adding sequence numbers

At Most Once Semantics How to avoid duplicates? –Uniquely identify each packet –Have receiver and sender remember Stop and Wait: add 1 bit to the header –Why is it enough?

Going faster: sliding window protocol Still have the problem of keeping pipe full –Generalize approach with > 1-bit counter –Allow multiple outstanding (unACKed) frames –Upper bound on unACKed frames, called window

How big should the window be? How many bytes can we transmit in one RTT? –BW B/s x RTT s => “Bandwidth-Delay Product”

Maximizing Throughput Can view network as a pipe –For full utilization want bytes in flight ≥ bandwidth × delay –But don’t want to overload the network (future lectures) What if protocol doesn’t involve bulk transfer? –Get throughput through concurrency – service multiple clients simultaneously

Sliding Window Sender Assign sequence number (SeqNum) to each frame Maintain three state variables –send window size (SWS) –last acknowledgment received (LAR) –last frame sent (LFS) Maintain invariant: LFS – LAR ≤ SWS Advance LAR when ACK arrives Buffer up to SWS frames

Sliding Window Receiver Maintain three state variables: –receive window size (RWS) –largest acceptable frame (LAF) –last frame received (LFR) Maintain invariant: LAF – LFR ≤ RWS Frame SeqNum arrives: –if LFR < SeqNum ≤ LAF, accept –if SeqNum ≤ LFR or SeqNum > LAF, discard Send cumulative ACKs

Tuning Send Window How big should SWS be? –“Fill the pipe” How big should RWS be? –1 ≤ RWS ≤ SWS How many distinct sequence numbers needed? –SWS can’t be more more than half of the space of valid seq#s.

Example SWS = RWS = 5. Are 6 seq #s enough? Sender sends 0,1,2,3,4 All acks are lost Sender sends 0,1,2,3,4 again …

Summary Want exactly once –At least once: acks + timeouts + retransmissions –At most once: sequence numbers Want efficiency –Sliding window

Error Detection Idea: have some codes be invalid –Must add bits to catch errors in packet Sometimes can also correct errors –If enough redundancy –Might have to retransmit Used in multiple layers Three examples today: –Parity –Internet Checksum –CRC

Simplest Schemes Repeat frame n times –Can we detect errors? –Can we correct errors? Voting –Problem: high redundancy : n ! Example: send each bit 3 times –Valid codes: –Invalid codes : –Corrections :

Parity Add a parity bit to the end of a word Example with 2 bits: –Valid: –Invalid: –Can we correct? Can detect odd number of bit errors –No correction

In general Hamming distance: number of bits that are different –E.g.: HD ( , ) = 3 If min HD between valid codewords is d: –Can detect d-1 bit error –Can correct ⌊ (d-1)/2 ⌋ bit errors What is d for parity and 3-voting?

2-D Parity Add 1 parity bit for each 7 bits Add 1 parity bit for each bit position across the frame) –Can correct single-bit errors –Can detect 2- and 3-bit errors, most 4-bit errors Find a 4-bit error that can’t be corrected

IP Checksum Fixed-length code –n-bit code should capture all but 2 -n fraction of errors Why? –Trick is to make sure that includes all common errors IP Checksum is an example –1’s complement of 1’s complement sum of every 2 bytes

How good is it? 16 bits not very long: misses how many errors? –1 in 2 16, or 1 in 64K errors Checksum does catch all 1-bit errors But not all 2-bit errors –E.g., increment word ending in 0, decrement one ending in 1 Checksum also optional in UDP –All 0s means no checksums calculated –If checksum word gets wiped to 0 as part of error, bad news

From rfc791 (IP) “This is a simple to compute checksum and experimental evidence indicates it is adequate, but it is provisional and may be replaced by a CRC procedure, depending on further experience.”

CRC – Error Detection with Polynomials Goal: maximize protection, minimize bits Consider message to be a polynomial in Z 2 [x] –Each bit is one coefficient –E.g., message > m(x) = x 7 + x 5 + x Can reduce one polynomial modulo another –Let n(x) = m(x)x 3. Let C(x) = x 3 + x –n(x) “mod” C(x) : r(x) –Find q(x) and r(x) s.t. n(x) = q(x)C(x) + r(x) and degree of r(x) < degree of C(x) –Analogous to taking 11 mod 5 = 1

Polynomial Division Example Just long division, but addition/subtraction is XOR

CRC Select a divisor polynomial C(x), degree k –C(x) should be irreducible – not expressible as a product of two lower-degree polynomials in Z 2 [x] Add k bits to message –Let n(x) = m(x)x k (add k 0’s to m) –Compute r(x) = n(x) mod C(x) –Compute n(x) = n(x) – r(x) (will be divisible by C(x)) (subtraction is XOR, just set k lowest bits to r(x)!) Checking CRC is easy –Reduce message by C(x), make sure remainder is 0

Why is this good? Suppose you send m(x), recipient gets m’(x) –E(x) = m’(x) – m(x) (all the incorrect bits) –If CRC passes, C(x) divides m’(x) –Therefore, C(x) must divide E(x) Choose C(x) that doesn’t divide any common errors! –All single-bit errors caught if x k, x 0 coefficients in C(x) are 1 –All 2-bit errors caught if at least 3 terms in C(x) –Any odd number of errors if last two terms (x + 1) –Any error burst less than length k caught

Common CRC Polynomials Polynomials not trivial to find –Some studies used (almost) exhaustive search CRC-8: x 8 + x 2 + x CRC-16: x 16 + x 15 + x CRC-32: x 32 + x 26 + x 23 + x 22 + x 16 + x 12 + x 11 + x 10 + x 8 + x 7 + x 5 + x 4 + x 2 + x CRC easily computable in hardware

An alternative for reliability Erasure coding –Assume you can detect errors –Code is designed to tolerate entire missing frames Collisions, noise, drops because of bit errors –Forward error correction Examples: Reed-Solomon codes, LT Codes, Raptor Codes Property: –From K source frames, produce B > K encoded frames –Receiver can reconstruct source with any K’ frames, with K’ slightly larger than K –Some codes can make B as large as needed, on the fly

LT Codes Luby Transform Codes –Michael Luby, circa 1998 Encoder: repeat B times 1.Pick a degree d 2.Randomly select d source blocks. Encoded block t n = XOR or selected blocks

LT Decoder Find an encoded block t n with d=1 Set s n = t n For all other blocks t n’ that include s n, set t n’ =t n’ XOR s n Delete s n from all encoding lists Finish if 1.You decode all source blocks, or 2.You run out out blocks of degree 1

Next class Link Layer II –Ethernet: dominant link layer technology Framing, MAC, Addressing –Switching