3-1 Last time □ Finished introduction and overview: ♦ Network access and physical media ♦ Internet structure and ISPs ♦ Delay & loss in packet-switched.

Slides:



Advertisements
Similar presentations
Transport Layer3-1 Transport Overview and UDP. Transport Layer3-2 Goals r Understand transport services m Multiplexing and Demultiplexing m Reliable data.
Advertisements

5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
15 – Data link layer Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
Transport Layer3-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Review r The Internet (IP) Protocol m Datagram format m IP fragmentation m ICMP: Internet Control Message Protocol m NAT: Network Address Translation r.
VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can.
Review r Multicast Routing m Three options m source-based tree: one tree per source shortest path trees reverse path forwarding m group-shared tree: group.
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 20.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
8-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer m flow.
Point to Point protocol (PPP) Point to point, wired data link easier to manage than broadcast link: no Media Access Control Several Data Link Protocols:
HDLC and PPP. The Data Link Layer in the Internet A home personal computer acting as an internet host. Technology like Ethernet cannot provide “high-level”
Introduction1-1 1DT014/1TT821 Computer Networks I Chapter 5 Link Layer and LANs.
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Chapter 5 outline 5.1 Introduction and services
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Introduction 1 Lecture 26 Link Layer (PPP, Virtualization) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Chapter 5: The Data Link Layer
Link Layer5-1 Chapter 5: Link layer our goals:  understand principles behind link layer services:  error detection, correction  sharing a broadcast.
CS 1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Part.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
4: DataLink Layer1 Chapter 4: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Error Detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 Week 5 Lecture 3 Data Link Layer. 2 Data Link Layer location application: supporting network applications –FTP, SMTP, STTP transport: host-host data.
11/25/20151 EEC-484 Computer Networks Lecture 12 Wenbing Zhao Cleveland State University
5: DataLink Layer5-1 The Data Link Layer Chapter 5 Kurose and Ross Today 5.1 and 5.3.
Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
5: DataLink Layer5-1 Point to Point Data Link Control r one sender, one receiver, one link: easier than broadcast link: m no Media Access Control m no.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
EEC-484/584 Computer Networks
Chapter 7 OSI Data Link Layer.
MULTIPLEXING/DEMULTIPLEXING, CONNECTIONLESS TRANSPORT.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
Shashank Srivastava Motilal Nehru national Institute Of Information Technology, Allahabad Data Link Layer.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, error correction.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Introduction 1-1 source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
CPSC 441: Link Layer1 Link Layer Addressing Slides originally from Carey Williamson Notes derived from “ Computer Networking: A Top Down Approach”, by.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
1 Path attributes & BGP routes r advertised prefix includes BGP attributes m prefix + attributes = “route” r two important attributes: m AS-PATH: contains.
Chapter 5 Link Layer A note on the use of these ppt slides:
Hubs Hubs are essentially physical-layer repeaters:
Point to Point Data Link Control
EEC-484/584 Computer Networks
Hubs Hubs are essentially physical-layer repeaters:
Data Link Issues Relates to Lab 2.
Link Layer and LANs Its not about how hard you hit... It's about how hard you can get hit and keep moving forward 5: DataLink Layer.
Instructor Mazhar Hussain
Chapter 3 Transport Layer
Data Link Layer: Overview; Error Detection
Presentation transcript:

3-1 Last time □ Finished introduction and overview: ♦ Network access and physical media ♦ Internet structure and ISPs ♦ Delay & loss in packet-switched networks ♦ Protocol layers, service models

3-2 This time □ Link layer ♦ Overview ♦ Error detection and correction ♦ PPP

3-3 Chapter 5: The Data Link Layer Our goals: □ Understand principles behind data link layer services: ♦ error detection, correction ♦ sharing a broadcast channel: multiple access ♦ link layer addressing ♦ reliable data transfer, flow control □ Instantiation and implementation of various link layer technologies

3-4 Link Layer □ 5.1 Introduction and services □ 5.2 Error detection and correction □ 5.3Multiple access protocols □ 5.4 Link-Layer Addressing □ 5.5 Ethernet □ 5.6 Hubs and switches □ 5.7 PPP □ 5.8 Link Virtualization: ATM and MPLS

3-5 Link Layer: Introduction Some terminology: □ Hosts and routers are nodes □ Communication channels that connect adjacent nodes along communication path are links ♦ wired links ♦ wireless links ♦ LANs □ A layer-2 packet is a frame, and encapsulates a layer-3 datagram “link” The data-link layer has the responsibility of transferring datagrams from one node to an adjacent node over a link

3-6 Link layer: context □ Datagram transferred by different link protocols over different links: ♦ e.g., Ethernet on first link, frame relay on intermediate links, on last link □ Each link protocol provides different services ♦ e.g., may or may not provide reliable delivery over link Transportation analogy □ Trip from Princeton to Lausanne ♦ limo: Princeton to JFK ♦ plane: JFK to Geneva ♦ train: Geneva to Lausanne □ Tourist = datagram □ Transport segment = communication link □ Transportation mode = link layer protocol □ Travel agent = routing algorithm

3-7 Link Layer Services Different link layers offer different combinations of these services: □ Framing, link access: ♦ encapsulate datagram into frame, adding header, trailer ♦ channel access if shared medium ♦ “MAC” addresses used in frame headers to identify source, destination □ Reliable delivery between adjacent nodes ♦ based on acknowledgements and retransmissions details later in the course (transport layer) ♦ seldom used on low bit error link (fiber, some twisted pair) ♦ wireless links: high error rates Q: why both link-level and end-to-end reliability?

3-8 Link Layer Services (more) □ Flow Control: ♦ pacing between adjacent sending and receiving nodes □ Error Detection: ♦ errors caused by signal attenuation, noise. ♦ receiver detects presence of errors: signals sender for retransmission or drops frame □ Error Correction: ♦ receiver identifies and corrects bit error(s) without resorting to retransmission □ Half-duplex and full-duplex: ♦ with half duplex, nodes at both ends of link can transmit, but not at same time

3-9 Adapters Communicating □ Link layer implemented in “adapter” (aka NIC) ♦ Ethernet card, PCMCIA card, card □ Sending side: ♦ encapsulates datagram in a frame ♦ adds error checking bits, flow control, etc. ♦ medium access control □ Receiving side: ♦ looks for errors, flow control, etc ♦ extracts datagram, passes to receiving node □ Adapter is semi- autonomous □ Link & physical layers sending node frame rcving node datagram frame adapter link layer protocol

3-10 Link Layer □ 5.1 Introduction and services □ 5.2 Error detection and correction □ 5.3Multiple access protocols □ 5.4 Link-Layer Addressing □ 5.5 Ethernet □ 5.6 Hubs and switches □ 5.7 PPP □ 5.8 Link Virtualization: ATM

3-11 Error Detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields Error detection not 100% reliable! protocol may miss some errors, but rarely larger EDC field yields better detection and correction

3-12 Parity Checking Single Bit Parity: Detect single bit errors Two Dimensional Bit Parity: Detect and correct single bit errors 0 0

3-13 Internet checksum Sender: □ Treat segment contents as sequence of 16-bit integers in 1's complement notation □ Checksum: ♦ add integers ♦ invert sum □ Put checksum value into checksum field Receiver: □ Compute checksum of received segment □ Check if computed checksum equals checksum field value: ♦ NO - error detected ♦ YES - no error detected. But maybe errors nonetheless? Goal: detect “errors” (e.g., flipped bits) in transmitted segment; easy to implement in software

3-14 Internet Checksum Example □ Note ♦ When adding numbers in 1’s complement notation, a carry-over from the most significant bit needs to be added to the result □ Example: add two 16-bit integers sum add wraparound checksum

3-15 Checksumming: Cyclic Redundancy Check □ Sender has data D, which is d bits long. □ Sender computes R, an r-bit CRC of those d bits ♦ r is usually 8, 12, 16, or 32 □ Sender sends D followed by R to the receiver □ Receiver computes the CRC of the received data ♦ If no match, there were certainly errors ♦ If match, no error detected

3-16 Checksumming: Cyclic Redundancy Check □ Better at detecting errors than other methods we've seen ♦ Can detect all burst errors up to r bits ♦ But much more complicated to compute □ Since the link layer is handled semi-autonomously in adapter hardware, CRCs are more appropriate for the link layer than for higher layers in the protocol stack. □ The mathematical details are in the text.

3-17 Link Layer □ 5.1 Introduction and services □ 5.2 Error detection and correction □ 5.3Multiple access protocols □ 5.4 Link-Layer Addressing □ 5.5 Ethernet □ 5.6 Hubs and switches □ 5.7 PPP □ 5.8 Link Virtualization: ATM

3-18 Point to Point Data Link Control □ This is the simplest kind of link layer ♦ One sender ♦ One receiver ♦ One link □ The most popular such protocol is PPP (point-to- point protocol) ♦ You probably use this at home to connect to the Internet Dialup: plain PPP ADSL: PPP over Ethernet (PPPoE)

3-19 PPP Design Requirements [RFC 1557] □ packet framing: encapsulation of network-layer datagram in data link frame ♦ carry network layer data of any network layer protocol (not just IP) at the same time ♦ ability to demultiplex upwards □ bit transparency: must carry any bit pattern in the data field □ error detection (no correction) □ connection liveness: detect, signal link failure to network layer □ network layer address negotiation: endpoint can learn/configure each other’s network address

3-20 PPP non-requirements □ no error correction/recovery □ no flow control □ out of order delivery OK □ no need to support multipoint links (e.g., polling) Error recovery, flow control, data re-ordering all relegated to higher layers!

3-21 PPP Link Control Protocol Before exchanging network- layer data, data link peers must □ configure PPP link (max. frame length, authentication) □ learn/configure network layer information These are straightforward two- party protocols, because PPP is point-to-point

3-22 PPP Data Frame □ Flag: delimiter (framing) □ Address: does nothing (only one option) □ Control: does nothing; in the future possible multiple control fields □ Protocol: upper layer protocol to which frame delivered (e.g. PPP-LCP, IP, Appletalk, etc.)

3-23 PPP Data Frame □ Info: upper layer data being carried □ Check: cyclic redundancy check for error detection

3-24 Byte Stuffing “Data transparency” requirement: protocol, info, checksum fields must be allowed to include flag pattern □ Q: is received the closing flag, or part of some other field? Sender: adds (“stuffs”) escape sequence byte before: □ each non-flag byte □ each byte Receiver: □ discard byte and treat next as data □ single : flag byte

3-25 Byte Stuffing flag byte pattern in data to send flag byte pattern plus stuffed byte in transmitted data

3-26 Recap □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing

3-27 Next time □ Multiple access protocols □ Link-layer addressing □ Ethernet