Ch 5. The Link Layer and Local Area Networks Myungchul Kim

Slides:



Advertisements
Similar presentations
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
Advertisements

1 Ethernet EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April.
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
15 – Data link layer Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Link-layer Addressing r Ethernet.
11/11/ /13/2003 DLL, Error Detection, MAC, ARP November 11-13, 2003.
Review r Multicast Routing m Three options m source-based tree: one tree per source shortest path trees reverse path forwarding m group-shared tree: group.
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
5: DataLink Layer – Ethernet, Hubs and Switches.
Review r Multicast Routing m Three options m source-based tree: one tree per source shortest path trees reverse path forwarding m group-shared tree: group.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 21.
1 CSE401N: COMPUTER NetworkS LAN address & ARP Ethernet Basics.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Introduction1-1 1DT014/1TT821 Computer Networks I Chapter 5 Link Layer and LANs.
Data Link Layer5-1 Chapter 5 Link Layer and LANs (Part I) SCSC 512.
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Data Link Layer5-1 Link Layer: Introduction Terminology:  hosts and routers are nodes  communication channels that connect adjacent nodes along communication.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 4: Link Layer addressing Ethernet Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, Myungchul Kim
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Link Layer5-1 Chapter 5: Link layer our goals:  understand principles behind link layer services:  error detection, correction  sharing a broadcast.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Link Layer Fundamentals NWEN302 Computer Network Design.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
4: DataLink Layer1 Chapter 4: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Ch 5. Link layer and Local Area Networks Myungchul Kim
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer LANs.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer5-1.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
5: DataLink Layer5-1 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame r If channel sensed.
CS 1652 Jack Lange University of Pittsburgh 1. 5: DataLink Layer5-2 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram.
Multiple Access Links and Protocols
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
Ch 5. Link layer and Local Area Networks Myungchul Kim
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, error correction.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
Data Link Layer5-1 Chapter 5 Link Layer and LANs (Part I) SCSC 512.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Link Layer 5.1 Introduction and services
Chapter 5 Link Layer and LANs
Computer Communication Networks
CS 457 – Lecture 6 Ethernet Spring 2012.
Data Link Issues Relates to Lab 2.
Data Link Issues Relates to Lab 2.
Link Layer and LANs Its not about how hard you hit... It's about how hard you can get hit and keep moving forward 5: DataLink Layer.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Link Layer 5.1 Introduction and services
Presentation transcript:

Ch 5. The Link Layer and Local Area Networks Myungchul Kim

2 – Frame – Error detection, retransmission, flow control, random access – Ethernet, IEEE wireless LAN (WiFi), Token Ring, PPP, ATM – Services offered by a link-layer protocol  Framing  Link access: Medium Access Control (MAC) protocol  Reliable delivery  Flow control  Error detection  Error correction  Half-duplex and full-duplex – The services by the link layer vs the transport layer

3

4 – The link layer is implemented in a network adaptor known as a network interface card (NIC) – LAN-on-motherboard configuration

5 Error-Detection and –Correction Techniques

6 o Parirty checks

7 – Forward error correction (FEC) o Checksumming methods – The receiver checks the checksum by taking the 1s complement of the sum of the received data (including the checksum). – Why checksumming at the Transport layer and CRC at the link layer?

8 o Cyclic Redundancy Check (CRC) - generator: The sender and receiver must agree on an r+1 bit pattern - D * 2 r XOR R = nG - D * 2 r = nG XOR R - R = remainder D * 2 r / G - The CRC standards can detect burst errors of fewer than r+1 bits.

9

10 Multiple access protocols – Point-to-point link – Broadcast link: medium access problem – Multiple access protocols – Channel partitioning protocols, random access rptocols and taking-turns protocols

11 Ideal Multiple Access Protocol Broadcast channel of rate R bps 1. when one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M 3. fully decentralized: – no special node to coordinate transmissions – no synchronization of clocks, slots 4. simple

12 o Channel partitioning protocols – Code Division Multiple Access (CDMA)

13 – ALOHA  All frames L bits  Time slots of size L/R seconds  The nodes are synchronized so that each node knows when the slots begin.  If two or more frames collide in a slot, then all the nodes detect the collision event before the slot ends.  Max efficiency of the protocol 1/e = 0.37

14 – ALOHA  Max efficiency of the protocol 1/2e

15 – Carrier Sense Multiple Access (CSMA)  Listen before speaking: carrier sensing  If someone else begins talking at the same time, stop talking: collision detection  CSMA, CSMA/CD

16

17

18 o Taking-Turns protocols – Polling protocols: a master node – Token-passing protocol: no master node o Local Area Networks (LANs) – Ethernet: IEEE – Token Ring: IEEE – Fiber Distribution Data Interface (FDDI)

19 Link-layer addressing o MAC address – Link-layer address, LAN address, MAC address – 6 bytes long = 2 48 possible MAC addresses

20 – No two adaptors have the same address – A flat structure o Address Resolution Protocol (ARP) – To send a datagram, the source node must give its adapter not only the IP datagram but also the MAC address for destination node. – An ARP module in the sending node takes any IP address on the same LAN as input, and returns the corresponding MAC address. – DNS vs ARP – ARP query and response

21

22 – Sending a datagram to a node off the subnet

23 o A creates IP datagram with source A, destination B  A uses ARP to get R ’ s MAC address for o A creates link-layer frame with R's MAC address as dest, frame contains A-to-B IP datagram  A ’ s NIC sends frame  R ’ s NIC receives frame o R removes IP datagram from Ethernet frame, sees its destined to B  R uses ARP to get B ’ s MAC address o R creates frame containing A-to-B IP datagram sends to B R 1A-23-F9-CD-06-9B E6-E BB-4B CC-49-DE-D0-AB-7D A C-E8-FF B2-2F-54-1A-0F B BD-D2-C7-56-2A

24 Ethernet – Success factors  First widely deployed  Simple and cheap  Kept up with speed race – Hub: whenever a hub receives a bit from one of its interfaces, it sends a copy of the bit to all of its other interfaces.

25 – Ethernet frame structure  Data field (46 to 1,500 bytes): MTU  Destination address (6bytes)  Source address (6 bytes)  Type field (2 bytes): IP and other network layer protocols  CRC (4 bytes)  Preamble (8 bytes) – Connectionless service – Unreliable service

26 o CSMA/CD: Ethernet’s Multiple Access Protocol 1. An adapter may begin to transmit at any time. 2. An adapter never transmits a frame when it senses that some other adapter is transmitting. (carrier sensing) 3. A transmitting adapter aborts its transmission as soon as it detects that another adapter is also transmitting. (collision detection) 4. Before attempting a retransmission, and adapter waits a random time that is typically samll compared with the time to transmit a frame. (exponential backoff)

27 – Ethernet efficiency = 1 / (1 + 5 d prop / d trans ) where d prop = max time to propagate between any two adapters and d trans = the time to transmit a maximum-size Ethernet fame. o Ethernet Technologies – Repeater – Point-to-point linkes use switches (no collision, no MAC protocol) while broadcast channels use hubs

28 Link-layer switches – The role of the switch is to receive incoming link-layer frames and forward them onto outgoing links. – Filtering – Forwarding – Switch table

29

30 – Suppose a frame arrives at the switch on interface x, the switch does  If there is no entry for the destination address, the switch broadcasts the frame.  There is an entry in the table with interface x, the switch performs the filtering by discarding the frame.  There is an entry in the table with interface y ≠ x, the switch performs its forwarding. – As long as the switch table is complete and accurate, the switch forwards frames towards destination without any broadcasting.

31 o Self-Learning – The switch table is initially empty. – For each incoming frame received on an interface, the switch stores in its table … – Aging time – Plug-and-play devices

32 o Properties of link-layer switching – Elimination of collisions – Heterogeneous links – Management o Switches vs routers – Switch: layer 2, router: layer 3 – Switch: plug-and-play, a spanning tree, hundreds hosts – Router: hierachical, thousands of hosts

33 PPP: The Point-to-Point Protocol – Error detection – No flow control – No sequencing – Single point link – Information: max length 1,500 bytes

34

35 Link Virtualization: A Network as a Link Layer – ATM, MPLS: packet-switched, virtual-circuit networks o Asynchronous Transfer Mode (ATM) networks

36 – An ATM inferface will have an IP address and an ATM address.

37 o Mulitprotocol Label Switching (MPLS) – Like a switched LAN or ATM network, the MPLS-capable routers do without ever touching the IP header of a packet. – Traffic engineering – Virtual private network

38