Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
Computer Networks Ethernet I Professor Hui Zhang
1 Ethernet EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Link-layer Addressing r Ethernet.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
5: DataLink Layer – Ethernet, Hubs and Switches.
Review r Multicast Routing m Three options m source-based tree: one tree per source shortest path trees reverse path forwarding m group-shared tree: group.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
11/18/ /20/2003 Ethernet, Hubs/Bridges/Switches, Wireless November 19-20, 2003.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
LAN Technologies. LAN technologies Data link layer so far: –services, error detection/correction, multiple access Next: LAN technologies –addressing –Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Ch 5. Link layer and Local Area Networks Myungchul Kim
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern.
5: DataLink Layer5-1 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame r If channel sensed.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Ch 5. Link layer and Local Area Networks Myungchul Kim
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
LAN Technologies.
Chapter 5 Link Layer and LANs
Hubs Hubs are essentially physical-layer repeaters:
CS 457 – Lecture 6 Ethernet Spring 2012.
Services of DLL Framing Link access Reliable delivery
Hubs Hubs are essentially physical-layer repeaters:
CS 457 – Lecture 7 Wireless Networks
Data Link Issues Relates to Lab 2.
EEC-484/584 Computer Networks
EEC-484/584 Computer Networks
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, Myungchul Kim

2 o A transmitting node encapsulates the datagram in a link-layer frame and transmits the frame into the link; and a receiving node receives the frame and extracts the datagram. o Error detection, retransmission, flow control, and random access o A single link in the path o A link-layer protocol includes – Framing – Link access: multiple access problem – Reliable delivery – Flow control: frame buffering capacity – Error detection – Error correction – Half-duplex and full-duplex Data link layer

3 o Adaptors: network interface cards (NICs) o Fig 5.3 o The link interface is responsible for implementing the link-layer protocol

4 o Point-to-point link: PPP, HDLC o Broadcast link: multiple sending and receiving nodes all connected to the same, single, shared broadcast channel. o Fig 5.9 Multiple access protocol

5 o Multiple access protocols: channel partitioning protocols, random access protocols, and taking-turns protocols. o Channel partitioning protocols – TDM, FDM – Fig 5.10

6 o Code Division Multiple Access (CDMA) – Assigns a different code to each node – Allows different nodes to transmit simultaneously and yet have their respective receivers correctly receive a sender’s encoded data bits in spite of interfering transmissions by other node. – Partitions the codespace – Issues: 1. codes must be carefully chosen, 2. the received signal strengths from various senders at a receiver are the same.

7 o Fig 5.11

8 o Random access protocols: slotted ALOHA, ALOHA, CSMA o Slotted ALOHA – Page 440. – Fig 5.13 – At best only 37 percent of the slots do useful work.

9 o CSMA – Listen before speaking: carrier sensing – If someone else begins talking at the same time, stop talking: collision detection. – CSMA vs CSMA/CD – The longer this propagation delay, the larger the chance that a carrier-sensing node is not yet able to sense a transmission that has already begun at another node in the network. – When a node performs collision detection, it will cease transmission as soon as it detects a collision.

10 o Fig 5.15

11 o Fig 5.16

12 o Taking-turns protocol – Polling protocol – Token-passing protocol

13 o LAN address, physical address, Ethernet address, MAC address: six bytes in hexadecimal notation o Fig 5.18 o LAN broadcast address: FF-FF-FF-FF-FF-FF LAN addresses and ARP

14 o Address resolution protocol (ARP): an IP address to a LAN address o Fig 5.19 o DNS? o ARP query within a broadcast message and plug-and- play using ARP table (Fig 5.20)

15 o Sending a datagram to a node off the LAN o Fig 5.21

16 o Reasons for success – Deployed early – Simple and cheap – Producing competent versions o Use the same frame structure o Fig 5.23 o Data field (46 to 1500 bytes): carries the IP datagram, MTU Ethernet

17 o Type fields (2bytes): IP, Novell IPX, AppleTalk, ARP,.. o CRC: detect errors o Preamble (8bytes): (7times) and o Unreliable connectionless service vs IP, TCP, UDP o Baseband transmission o Manchester encoding (physical layer) o Fig 5.24

18 o CSMA/CD mechanisms 1. An adaptor may begin to transmit at any time; that is, no slots are used. 2. An adaptor never transmits a frame when it senses that some other adaptor is transmitting; that is, it uses carrier sensing. 3. A transmitting adapter aborts its transmission as soon as it detects that another adaptor is also transmitting; that is, it uses collision detection. 4. Before attempting a retransmission, an adaptor waits a random time that is typically small compared with the time to transmit a frame.

19 o 10Base2, 10BaseT, 100BaseT, Gigabit Ethernet o Repeater: a physical-layer device acts on individual bits rather than on frames. o Fig 5.25

20 o A hub is a repeater o Fig 5.26

21 o The hub simply broadcasts the bit on all the other interfaces. o The same collision domain o Fig 5.27 Hubs

22 o Limitations – Larger collision domain – Same Ethernet technologies – Max allowable number of nodes in a collision domain

23 o Layer-2 devices o Isolated collision domain, different LAN, no limit on the size of LAN o Filtering and forwarding using bridge table o Fig 5.28 Bridges

24 o Self-learning: a bridge table is build automatically. o Plug-and-play device o Bridges vs Routers – Plug-and-play or not – Layer 2 or 3 – Broadcast – Flat vs hierarchical addressing – Network size

25 o Fig 5.32

26 o Bridge (a small number of interfaces) switches (dozens of interfaces) o Full-duplex mode o Fig 5.34 o Neither collision detection nor carrier sending o No medium-access protocol Switches

27 o Cut-through switching: if the buffer becomes empty before the entire packet has arrived, the switch can start to transmit the front of the packet while the back of the packet continues to arrive. o Table 5.1

28 o Ubiquitous computing o IEEE b: wireless Ethernet, Wi-Fi – 2.4 GHz – 11 Mbps – Physical layer: Direct Sequence Spread Spectrum (DSSS) – MAC layer o a: 5-6GHz, 54Mbps o g: 2.4GHZ, 54Mbps o All of the standards have the same architecture and use the same MAC protocol Wireless Links

29 o Basic service set (BSS): a cell, Access point (AP) o ad hoc network o Fig 5.36

30 o Media access protocol – An explicit ack from back to the sender – Fig 5.38

31 o No collision detection – Costly – A collision still occur at the receiver, why o Hidden terminal problem and fading – Fig 5.39

32 o To avoid collisions (CSMA/CA) – A duration field indicating the length of time that its frame will be transmitting on the channel, network allocation vector (NAV) – RTS and CTS to reserve access to the channel  CTS frame helps avoid both the hidden station problem and the fading problem  The RTS and CTS frames are short.

33 – Fig 5.40

34 o Bluetooth – 2.45GHz – kbps – 10 – 100 meter – Replacement of cable – Cf. infrared technology

35 o Data link layer protocol – Packet framing – Transparency – Multiple network-layer protocols – Multiple types of links – Error detection – Connection liveness – Network-layer address negotiation – Simplicity o Not required to implement – Error correction – Flow control – Sequencing – Multipoint links PPP

36 o PPP data framing – Address and control fields not used – Fig 5.41

37 o Byte stuffing – Forbid the upper-layer protocol from sending data containing the flag field bit pattern. – Control escape byte, – Fig 5.43

38 o characteristics – From an application-level API to the physical layer – CBR, VBR, ABR and UBR – Cell: bytes – Virtual circuits: virtual channel identifier (VCI) – No retransmission on a link-by-link basis – Congestion control only within the ATM ABR – Run over any physical layer ATM

39 o Fig 5.44 and 5.45

40 o Fig 5.47

41 o IP over ATM – Dynamic vs Permanent virtual channel – pp – Fig 5.52