Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.

Similar presentations


Presentation on theme: "Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these."— Presentation transcript:

1 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) that you mention their source (after all, we’d like people to use our book!)  If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Link Layer5-1

2 Link Layer5-2 Link layer, LAN s: outline  5.1 Introduction and services  5.2 Error detection and correction  5.3 Multiple access protocols  5.4 Link-layer Addressing  5.5 Ethernet  5.6 Link-layer switches  5.7 PPP  5.8 Link virtualization: MPLS  5.9 A day in the life of a web request

3 Link Layer5-3 Link layer: introduction terminology:  hosts and routers: nodes  communication channels that connect adjacent nodes along communication path: links  wired links  wireless links  layer-2 packet: frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to physically adjacent node over a link global ISP

4 Link Layer5-4 Link layer: context  datagram transferred by different link protocols over different links:  e.g., Ethernet on first link, frame relay on intermediate links, IEEE 802.11 on last link  each link protocol provides different services  e.g., may or may not provide rdt over link transportation analogy:  trip from Princeton to Lausanne ( 로잔 )  limousine: Princeton to JFK  plane: JFK to Geneva  train: Geneva to Lausanne  tourist = datagram  tour transport segment = communication link  tour transportation mode = link layer protocol  tour agent = routing algorithm

5 Link Layer5-5 Link layer services  framing, link access:  encapsulate datagram into frame, adding header, trailer  channel access if shared medium  “MAC” addresses used in frame headers to identify source, dest different from IP address!  reliable delivery between adjacent nodes  we learned how to do this already (chapter 3)!  seldom used on low bit-error link (fiber, some twisted pair)  wireless links: high error rates Q: why both link-level and end-end reliability?

6 Link Layer5-6  flow control:  pacing between adjacent sending and receiving nodes  error detection:  errors caused by signal attenuation ( 감쇄 ), noise.  receiver detects presence of errors: signals sender for retransmission or drops frame  error correction:  receiver identifies and corrects bit error(s) without resorting to retransmission  half-duplex and full-duplex  with half duplex, nodes at both ends of link can transmit, but not at same time Link layer services (more)

7 Link Layer5-7 Where is the link layer implemented?  in each and every host  link layer implemented in “adaptor” (aka network interface card NIC) and its driver software  Ethernet card, 802.11 card; Ethernet chipset  implements link, physical layer  Recent: LAN on motherboard  attaches into host’s system buses  combination of hardware, software, firmware controller physical transmission cpu memory host bus (e.g., PCI) network adapter (= network interface card) application transport network link physical

8 Link Layer5-8 Adaptors communicating  sending side:  encapsulates datagram in frame  adds error checking bits, rdt, flow control, etc.  receiving side  looks for errors, rdt, flow control, etc  extracts datagram, passes to upper layer at receiving side controller sending host receiving host datagram frame

9 Link Layer5-9 Link layer, LAN s: outline  5.1 Introduction and services  5.2 Error detection and correction  5.3Multiple access protocols  5.4 Link-layer Addressing  5.5 Ethernet  5.6 Link-layer switches  5.7 PPP  5.8 Link virtualization: MPLS  5.9 A day in the life of a web request

10 Link Layer5-10 Error detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields Error detection not 100% reliable! protocol may miss some errors, but rarely larger EDC field yields better detection and correction otherwise

11 5: DataLink Layer5-11 There are three ways for error detection. 1)Parity Checking 2)Internet Checksum -Not strong mechanism. -Simple and Fast: implemented by software -Used at TCP and UDP (see Ch. 3.3) 3)CRC: Cyclic Redundancy Check -Mostly used at link-layer -Complex and Slow: implemented by hardware Error detection

12 Link Layer5-12 Parity checking [ 참고 ] http://ko.wikipedia.org/wiki/%ED%8C%A8%EB%A6 %AC%ED%8B%B0_%EB%B9%84%ED%8A%B8 Single Bit Parity: Detect single bit errors – 홀수 패리티, 짝수 패리티  짝수 (even) 패리티 - 전체 비트에서 1 의 개수가 짝수가 되도록 패리티 비트를 설정 - 예를 들어, 데이터 비트에서 1 의 개수가 홀수이면 패리티 비트를 1 로 설정  홀수 (odd) 패리티 - 전체 비트에서 1 의 개수가 홀수가 되도록 패리티 비트를 설정

13 Link Layer5-13 Parity checking Single Bit Parity: Detect single bit errors *** Burst Error A burst error means that 2 or more bits in the data unit have changed.  Parity Checking 으로 검사 불가능

14 Link Layer5-14 Parity checking Two Dimensional Bit Parity: Detect and correct single bit errors 0 0 It is also called FEC (Forward Error Correction)

15 Link Layer5-15 Parity checking Two Dimensional Bit Parity: Detect and correct single bit errors

16 Link Layer5-16 Internet checksum (review) sender:  treat segment contents as sequence of “16-bit integers (words)”  checksum: addition (1’s complement sum) of segment contents  sender puts checksum value into UDP checksum field receiver:  compute checksum of received segment  check if computed checksum equals checksum field value:  NO - error detected  YES - no error detected. goal: detect “errors” (e.g., flipped bits) in transmitted packet (note: used at transport layer only)

17 Link Layer5-17 Cyclic redundancy check  more powerful error-detection coding  view data bits, D, as a binary number  choose r+1 bit pattern (generator), G  Sender and Receiver share the same G  goal: sender chooses r CRC bits, R, such that  exactly divisible by G (modulo 2)  receiver divides by G.  If non-zero remainder: error detected!  This CRC can detect all burst errors less than r+1 bits  widely used in practice (Ethernet, 802.11 WiFi, ATM)

18 Link Layer5-18 Cyclic redundancy check CRC operation G D R

19 Link Layer5-19 CRC example want: D. 2 r XOR R = nG equivalently: D. 2 r = nG XOR R equivalently: if we divide D. 2 r by G, want remainder R to satisfy: R = remainder[ ] D.2rGD.2rG

20 Link Layer5-20 CRC usage  ATM cell  Generator (G): 8bits  IEEE CRC-32  Generator (G CRC-32 ): 32bits 100000100110000010001110110110111  CRC is stronger than parity bit or checksum  It can always detect a burst error less than r+1 bits  With probability 1-0.5 r, it can detect a burst error more than r+1 bits


Download ppt "Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these."

Similar presentations


Ads by Google