Data Link Layer IS250 Spring 2010

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Ethernet – CSMA/CD Review
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Reliability & Channel Coding
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
Long distance communication Multiplexing  Allow multiple signals to travel through one medium  Types Frequency division multiplexing Synchronous time.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
CS335 Networking & Network Administration Wednesday, April 7 PacketsPackets, Frames, and Error DetectionFramesError Detection.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Chapter 9 Hardware Addressing & Frame Type Identification EE 526 Presentation by Ryan Star.
Review on Networking Technologies Linda Wu (CMPT )
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Network Topologies An introduction to Network Topologies and the Link Layer.
Lecture 2 Computer Communications and Networks Boriana Koleva Room: C54 Phone:
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Network Layer4-1 Lower limit on the number of check bits r We want to design a code m with m message bits and r check bits Allowing all single errors to.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Part 2: Packet Transmission Packets, frames Local area networks (LANs) Wide area networks (LANs) Hardware addresses Bridges and switches Routing and protocols.
1 Part III Packet Transmission Chapter 7 Packets, Frames, and Error Detection.
Lecture 6: Framing and Error Detection-Data Link Layer Functions
Networks. Common Xmit Media Shared Media Networks are a shared communication resource Only one user can access at a time.
1 Packets, Frames, and Error Detection. 2 The Problem Cannot afford individual network connection per pair of computers Reasons –Installing wires consumes.
CENG 490/510 Network Programming Russell Deaton Rm
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
11/25/20151 EEC-484 Computer Networks Lecture 12 Wenbing Zhao Cleveland State University
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
Ethernet Overview it the IEEE standard for Ethernet.
1 Chapter 7 Switching, Packets, Frames, Parity, Checksums, and CRCs.
SEPT, 2005CSI Part I.2 Packets, Frames, Parity, Checksums, and CRCs Dr. R.L. Probert, SITE, University of Ottawa.
1 Chapter 8-10 Local Area Networks (LANs). Comparison 4e and 5e  Ch 7, 4eCh 8, 5e Ch 10, Forouzan  Ch 8, 4eCh 14, 5e Ch 13, Forouzan  Ch 9, 4eCh 13,
1 Hardware Addressing and Frame Type Identification.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
Data Link Layer.
Local Area Networks: Topologies
Data-link Layer Computer Networks.
Packets, Frames, Parity, Checksums, and CRCs
COMPUTER NETWORKS CS610 Lecture-5 Hammad Khalid Khan.
Packets, Frames, Parity, Checksums, and CRCs
Local Area Networks (LANs)
Switching, Packets, Frames, Parity, Checksums, and CRCs
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Data Link Layer IS250 Spring 2010

2 Network Technologies  Ethernet  WiFi  WiMax  DSL  Cable modem  Cellular (3G, 2.5G, …)  SONET, STS, OC  …  LAN: local area network  MAN: metropolitan area network  WAN: wide area network  Backbone network  Access network  The “last mile” aka “first mile” aka “local loop”

3 Link Layer Functionalities  Framing  Error detection or correction  Media access control

4 Framing  Message transmitted over link as string of 0’s and 1’s  Sender and receiver has to agree where is the beginning and end of a message  framing  A frame is a link layer message unit -The prelude and/or postlude are special characters or character sequences that help establish the beginning and end of the frame -The header contains control information that is used by the network (e.g., network address; error detection) -The payload contains data that is meaningful only for the sender and receiver

5 Dealing with Errors  Data can be corrupted during transmission -Bits lost -Bit values changed  Frame includes additional information to help detect or correct errors -Set by sender; checked by receiver  Statistical guarantee

6 Error Detection  Message M  H = f(M)  Transmitted T = M || H  Received R = M’ || H’  If H’ = f(M’) then no error M H f MH M’H’

7 Error Detection Schemes  Parity -Send an additional parity bit (H) per character -Even parity: if # of 1’s in character is odd, H = 1; else H = 0 -Odd parity: if # of 1’s in character is odd, H = 0; else H = 1 -Cannot detect even numbers of bit errors  Checksum -Treat data as sequence of integers -Compute and send arithmetic sum (H) -Handles multiple bit errors, but not all errors  Cyclic Redundancy Check (CRC)

8 Checksum Examples  Checksum computed over data  Checksum appended to frame  2 nd bit reversed in each item, but checksum is the same

9 Cyclic Redundancy Check  CRC is a mathematical function of data, computed as the remainder from a division of two binary numbers, one representing the message M, and the other a fixed divisor P.  Example: CRC-CCITT: -P(X) = x 16 + x 12 + x 5 + 1; or -P =  CRC-CCITT can detect: -all single/double bit errors -All odd-numbered bit errors -100% of burst errors <= 16 bits % of burst errors = 17 bits % of burst errors >= 18 bits

10 CRC Algorithm  CRC can be computed and verified using binary long division  Numerical example -Use CRC scheme with P(x) = x 5 + x 4 + x + 1 -P: (6 bits) -Message M: (8 bits) -Divide M by P; use the remainder as the CRC (what we call ‘H’ on slide 6) [Note: remainder one bit shorter than P] -Transmitted message T = M || H -Receiver performs CRC verification on received message T’: divide T’ by P will produce zero remainder if no error

11 Numerical Example ) = H T = M || H =

12 Verification ) No error since remainder is 0

13 CRC Implementation  CRC can be efficiently computed in hardware using XOR gates and shift registers  Example: 16 bit CRC -Registers initialized to zeros -Bits of message shifted in -CRC found in value of registers Before shift After shift

14 Media Access Control  How do multiple, independent computers coordinate access to a shared communication medium? Ethernet Wi-Fi

15 Local Area Networks  LAN characteristics: -High throughput -Relatively low cost -Distance limitations -Often rely on shared media  Different topologies

16 Ethernet  Most widely deployed LAN technology  IEEE standard  Several generations -Same frame format -Different data rates (10Mbps, 100Mbps, 1Gbps, 10Gbps) -Different media (coax, twisted pair, fiber)

17 Shared Medium  Shared medium used for all transmissions  Only one station transmit at any time  Stations take turns using medium  Media access control (MAC) policy ensures fairness

18 Data Transmission in Ethernet  Only one station transmit at any time  Signal propagates across entire cable  All stations receive transmission  CSMA/CD media access scheme

19 CSMA/CD  Multiple access (MA) -Multiple computers attach to shared media -Each uses same access algorithm  Carrier Sense (CS) -Wait until medium is idle -Begin to transmit frame  Simultaneous transmission possible

20 CSMA/CD (2)  Two simultaneous transmissions -Interfere with one another -Called a collision  CSMA plus collision detection (CD) -Listen to medium during transmission -Detect whether another station’s signal interferes -Back off from interference and try again

21 Example

22 Back-off after Collision  When collision occurs -Wait random time t 1, 0 <= t 1 <= d -Use CSMA and try again  If second collision occurs -Wait random time t 2, 0 <= t 2 <= 2d  Double range for each successive collision  Called exponential backoff

23 Wireless Ethernet (Wi-Fi)  Uses unlicensed spectrum (ISM band)

24 WLAN Media Access  Limited range -Not all stations receive all transmissions -Cannot use CSMA/CD  Example -Maximum transmission distance is d -Stations 1 and 3 do not receive each other’s transmissions  Known as the “hidden terminal” problem

25 CSMA/CA  Collision avoidance (CA) -upon sensing idle channel, waits for a random backoff duration before attempting to transmit  RTS/CTS Mechanism -Handshake before data transmission -Request to Send (RTS): “X is about to send to Y” -Clear to Send (CTS): “Y is about to receive from X” -Data frame sent from X to Y -Collisions of control messages possible; but control messages are much shorter than data frames

26 Addressing in Shared Medium  All stations on shared media receive all transmissions  Each frame contains address of intended recipient  Stations discard any frame addressed to another station  Shared media provide no confidentiality -Network analyzers can run in promiscuous mode -Designed for testing/debugging -Allows network interface to accept all packets

27 Ethernet Addressing & Frame Format  Each station assigned unique 48-bit (6 byte) address -Known as Ethernet address, MAC address, or Physical address  Address assigned when network interface card (NIC) manufactured  Ethernet frame format: /Size

28 Ethernet Evolution  Original Ethernet: bus topology  Modern Ethernet: star topology  Ethernet hub: -Propagates each incoming signal to all connections -noise and collisions also propagated  Ethernet switch: -Operates on frames -Does not forward noise or collisions -Understands addresses -Only forwards when necessary -Allows independent transmission on different segments

29 Layer 2 is not limited to LANs  Backbone operators (e.g., AT&T) deploy and operate long-haul copper-based or fiber-based digital circuits  SONET (Synchronous Optical Network) and SDH (Synchronous Digital Hierarchy) standards support framing, multiplexing, synchronization. OC Gbps OC Gbps