CS 640: Computer Networks Aditya Akella Lecture 6 - Error/Flow Control & Intro to Switching and Medium Access Control.

Slides:



Advertisements
Similar presentations
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
The Data Link Layer Chapter 3. Position of the data-link layer.
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 20.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
1 ELEN Lecture 13 LAN Bridges Routers, Switches, Gateways Network layer -IP Reading: 6.7,
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
Review on Networking Technologies Linda Wu (CMPT )
1 Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Networking, Spring 2008
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Switching Techniques Student: Blidaru Catalina Elena.
Process-to-Process Delivery:
3-1 Last time □ Finished introduction and overview: ♦ Network access and physical media ♦ Internet structure and ISPs ♦ Delay & loss in packet-switched.
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 5 outline 5.1 Introduction and services
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
CPS 356: Introduction to Computer Networks Lecture 7: Switching technologies Ch 2.8.2, 3.1, 3.4 Xiaowei Yang
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 2.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
CS 640: Introduction to Computer Networks
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Chapt 3 Data Link Layer1 Data Link Layer Functions –Provides services to network layer Well-defined interface –Framing –Flow control – between adjacent.
Lecture © 2008 Lecture 6 Physical Layer (Cont) & Data Link Layer 1.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 13.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
William Stallings Data and Computer Communications
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
1 Lecture 6 Datalink – Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University.
Review of Network Technologies. Basic of Network concepts Computer Network – A Communication system for connecting computers/hosts Why? – Better connectivity.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 16/Cisco 4 - Module 9 CCNA Certification Exam Review By Your Name.
CS 640: Computer Networks Aditya Akella Lecture 6 - Datalink Layer I.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CH. 8: SWITCHING & DATAGRAM NETWORKS 7.1.
Univ. of TehranComputer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr. Nasser Yazdani.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
The Transport Layer Implementation Services Functions Protocols
Lecture (2).
EE 122: Lecture 19 (Asynchronous Transfer Mode - ATM)
COMPUTER NETWORKS CS610 Lecture-45 Hammad Khalid Khan.
Packet Switching Outline Store-and-Forward Switches
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Hubs Hubs are essentially physical-layer repeaters:
Switching Techniques.
Network Architecture for Cyberspace
Computer Networks Protocols
Virtual LAN (VLAN).
Presentation transcript:

CS 640: Computer Networks Aditya Akella Lecture 6 - Error/Flow Control & Intro to Switching and Medium Access Control

Error Coding Transmission process may introduce errors into a message. –Single bit errors versus burst errors Detection: e.g. CRC –Requires a check that some messages are invalid –Hence requires extra bits –“redundant check bits” Correction –Forward error correction: many related code words map to the same data word –Detect errors and retry transmission

Parity Even parity –Append parity bit to 7 bits of data to make an even number of 1’s –Odd parity accordingly defined. 1 in 8 bits of overhead? –When is this a problem? Can detect a single error But nothing beyond that

2-D Parity Make each byte even parity Finally, a parity byte for all bytes of the packet Example: five 7-bit character packet, even parity

Effectiveness of 2-D Parity 1-bit errors can be detected, corrected Example with even parity per byte: error bit odd number of 1’s

2-bit errors can also be detected Example: What about 3-bit errors? >3-bit errors? error bits odd number of 1’s Effectiveness of 2-D Parity even number of 1’s - Ok

Cyclic Redundancy Codes (CRC) Commonly used codes that have good error detection properties –Can catch many error combinations with a small number or redundant bits Based on division of polynomials –Errors can be viewed as adding terms to the polynomial –Should be unlikely that the division will still work Can be implemented very efficiently in hardware Examples: –CRC-32: Ethernet –CRC-8, CRC-10, CRC-32: ATM

Link Flow Control and Error Control Dealing with receiver overflow: flow control. Dealing with packet loss and corruption: error control. Actually these issues are relevant at many layers. –Link layer: sender and receiver attached to the same “wire” –End-to-end: transmission control protocol (TCP) - sender and receiver are the end points of a connection How can we implement flow control? –“You may send” (windows, stop-and-wait, etc.) –“Please shut up” (source quench, 802.3x pause frames, etc.)

Flow Control: A Naïve Protocol Sender simply sends to the receiver whenever it has packets. Potential problem: sender can outrun the receiver. –Receiver too slow, small buffer overflow,.. Not always a problem: receiver might be fast enough. Sender Receiver

Adding Flow Control Stop and wait flow control: sender waits to send the next packet until the previous packet has been acknowledged by the receiver. –Receiver can pace the sender Drawbacks: adds overheads, slowdown for long links. Sender Receiver

Window Flow Control Stop and wait flow control results in poor throughput for long-delay paths: packet size/ roundtrip-time. Solution: receiver provides sender with a window that it can fill with packets. –The window is backed up by buffer space on receiver –Receiver acknowledges the a packet every time a packet is consumed and a buffer is freed Sender Receiver

Window Limitations Sender Receiver Time Throughput = Window Size Roundtrip Time RTT Window Size = 4pkts

Error Control: Stop and Wait Case Packets can get lost, corrupted, or duplicated. Duplicate packet: use sequence numbers. Lost packet: time outs and acknowledgements. –Positive versus negative acknowledgements –Sender side versus receiver side timeouts Window based flow control: more aggressive use of sequence numbers (see transport lectures). Sender Receiver

What is Used in Practice? No flow or error control. –E.g. regular Ethernet, just uses CRC for error detection Flow control only. –E.g. Gigabit Ethernet Flow and error control. –E.g. X.25 (older connection-based service at 64 Kbs that guarantees reliable in order delivery of data)

Switching and Media Access Control How do we transfer packets between two hosts connected to the a switched network? Switches connected by point-to-point links -- store- and-forward. –Multiplexing and forwarding –Used in WAN, LAN, and for home connections –Conceptually similar to “routing” But at the datalink layer instead of the network layer Multiple access networks -- contention based. –Multiple hosts are sharing the same transmission medium –Used in LANs and wireless –Need to control access to the medium

A Switch-based Network Switches are connected by “point-to-point” links. Packets are forwarded hop-by-hop by the switches towards the destination. –Many forms of forwarding Many datalink technologies use switching. –Virtual circuits: Frame-relay, ATM, X.25,.. –Packets: Ethernet, MPLS, … PC at Home Switch Point-Point link PCs at Work

Three techniques for switching Global addresses - connection-less –Routers keep next hop for destination –Packets carry destination address Virtual circuits – connection oriented –Connection routed through network to set up state –Packets forwarded using connection state Source routing –Packet carries path

Global Address Example Receiver Packet R Sender S2 S3 S1 RR R  3 R  4 R  3 R

Global Addresses Advantages –Stateless – simple error recovery Disadvantages –Every switch knows about every destination Potentially large tables –All packets to destination take same route –Need special approach to fill table

Simplified Virtual Circuits Example Receiver Packet conn 5  3 Sender conn 5  conn 5  3 S2 S3 S1 5555

Virtual Circuits Advantages –Efficient lookup (simple table lookup) –Can reserve bandwidth at connection setup –Easier for hardware implementations Disadvantages –Still need to route connection setup request –More complex failure recovery – must recreate connection state Typical use  fast router implementations –ATM – combined with fix sized cells –MPLS – tag switching for IP networks

Source Routing Example Receiver Packet R1, R2, R3, R Sender S2 S3 S1 R2, R3, R R3, RR

Source Routing Advantages –Switches can be very simple and fast Disadvantages –Variable (unbounded) header size –Sources must know or discover topology (e.g., failures) Typical uses –Ad-hoc networks (DSR) –Machine room networks (Myrinet)

Comparison Source RoutingGlobal Addresses Header SizeWorstOK – Large address Router Table SizeNoneNumber of hosts Forward OverheadBestTable lookup Virtual Circuits Best Number of circuits Pretty Good Setup OverheadNone Error RecoveryTell all hostsTell all switches Connection Setup Tell all switches and Tear down circuit and re-route

Most Popular: Address Lookup-based Approach Address from header. –Absolute address (e.g. Ethernet) –(IP address for routers) –(VC identifier, e.g. ATM)) Next hop: output port for packet. Info: priority We will see how this table is filled (learning bridges) B Switch 38913C3C A21023C AddressNext Hop (2,34) Info

Multiple Access Protocols Prevent two or more nodes from transmitting at the same time over a broadcast channel. –If they do, we have a collision, and receivers will not be able to interpret the signal Several classes of multiple access protocols. –Partitioning the channel, e.g. frequency-division or time division multiplexing With fixed partitioning of bandwidth – not flexible –Taking turns, e.g. token-based, reservation-based protocols, polling based –Contention based protocols, e.g. Aloha, Ethernet Next lecture

Fiber Distributed Data Interface (FDDI) One token holder may send, with a time limit. –known upper bound on delay. Optical version of token ring, but multiple packets may travel in train: token released at end of frame. 100 Mbps, 100km. Optional dual ring for fault tolerance. CDDI: FDDI over unshielded twisted pair, shorter range

Other “Taking Turn” Protocols Central entity polls stations, inviting them to transmit. –Simple design – no conflicts –Not very efficient – overhead of polling operation Stations reserve a slot for transmission. –For example, break up the transmission time in contention-based and reservation based slots Contention based slots can be used for short messages or to reserve time Communication in reservation based slots only allowed after a reservation is made –Issues: fairness, efficiency