Link Layer. Link Layer: Introduction. Link layer. Link Layer Services. Error Detection. Link Layer. Terminology:

Similar documents
Based on Computer Networking, 4 th Edition by Kurose and Ross

Random Access Protocols

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Ethernet, VLAN, Ethernet Carrier Grade

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Lecture 7 Multiple Access Protocols and Wireless

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

CSE 123A Computer Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

RTT 60.5 msec receiver window size: 32 KB

EPL 657 Wireless Networks

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

CS263: Wireless Communications and Sensor Networks

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

How To Make A Multi-User Communication Efficient

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

DATA COMMUNICATION AND NETWORKS

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

CSMA/CA. Information Networks p. 1

Controlled Random Access Methods

Communication Systems Internetworking (Bridges & Co)

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Level 2 Routing: LAN Bridges and Switches

11/22/

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Transport Layer Protocols

IT Data Communication and Networks (Optional)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Final for ECE374 05/06/13 Solution!!

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Data Link Layer. Page 1. Ethernet

Architecture and Performance of the Internet

How do I get to

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Data Link Layer Overview

Introduction to Ethernet

Ethernet. Ethernet. Network Devices

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Computer Networks CS321

Performance Analysis of Switches in High Speed LAN

Wiereless LAN

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Networking Test 4 Study Guide

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

- Hubs vs. Switches vs. Routers -

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

LAN Switching and VLANs

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Protocols and Architecture. Protocol Architecture.

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Module 15: Network Structures

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

WIRELESS ETHERNET (IEEE )

IT4405 Computer Networks (Compulsory)


Chapter 14: Distributed Operating Systems

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Process Control and Automation using Modbus Protocol

From Fieldbus to toreal Time Ethernet

Network Layer: Network Layer and IP Protocol

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

COMPUTER NETWORKS HANDOUTS LECTURERS # PREPARED BY: HAMMAD KHALID KHAN. Copyright Virtual University of Pakistan

WAN Data Link Protocols

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

How To Understand The Layered Architecture Of A Network

Chapter 16: Distributed Operating Systems

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Internet Control Protocols Reading: Chapter 3

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

ECE/CS 372 introduction to computer networks. Lecture 13

Chapter 7 Low-Speed Wireless Local Area Networks

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Written examination in Computer Networks

Industrial Networks & Databases. Protocols and Networks - Device Bus - - Field Bus -

Technical Support Information Belkin internal use only

Transport and Network Layer

Internet Packets. Forwarding Datagrams

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Overview of Computer Networks

The OSI and TCP/IP Models. Lesson 2

CSCI 362 Computer and Network Security

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Candidates should attempt FOUR questions. All questions carry 25 marks.

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Transcription:

Link Layer 5.4 Link-layer Link Layer: Introduction Terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links LANs layer-2 packet is a frame, encapsulates datagram Data Link Layer 5-1 Data Link Layer 5-2 Link layer datagram transferred by different link over different links: e.g., Ethernet on first link, frame relay on intermediate links, 802.11 on last link transportation analogy trip from Princeton to Lausanne limo: Princeton to JFK plane: JFK to Geneva train: Geneva to Lausanne tourist = datagram transport segment = communication link transportation mode = link layer protocol travel agent = routing algorithm Link Layer Services encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to identify source, dest different from IP address! Data Link Layer 5-3 Data Link Layer 5-4 Link Layer 5.4 Link-layer Error Detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields Error detection not 100% reliable! otherwise Data Link Layer 5-5 Data Link Layer 5-6 1

Parity Checking Checksumming: Cyclic Redundancy Check Single Bit Parity: Detect single bit errors Two Dimensional Bit Parity: Detect and correct single bit errors view data bits, D, as a binary number choose r+1 bit pattern (generator), G goal: choose r CRC bits, R, such that <D,R> exactly divisible by G (modulo 2) receiver knows G, divides <D,R> by G. If non-zero remainder: error detected! can detect all burst errors less than r+1 bits widely used in practice (Ethernet, 802.11 WiFi, ATM) 0 0 Data Link Layer 5-7 Data Link Layer 5-8 CRC Example Want: D. 2 r XOR R = ng equivalently: D. 2 r = ng XOR R equivalently: if we divide D. 2 r by G, want remainder R D R. 2 r = remainder[ ] G Link Layer 5.4 Link-layer Data Link Layer 5-9 Data Link Layer 5-10 Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet 802.11 wireless LAN MAC Protocols Three broad classes: Channel Partitioning divide channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusive use Random Access channel not divided, allow collisions recover from collisions Taking turns nodes take turns, but nodes with more to send can take longer turns shared wire (e.g., cabled Ethernet) shared RF (e.g., 802.11 WiFi) shared RF (satellite) humans at a cocktail party (shared air, acoustical) Data Link Layer 5-11 Data Link Layer 5-12 2

frequency bands Channel Partitioning MAC : TDMA TDMA: time division multiple access access to channel in "rounds" each station gets fixed length slot (length = pkt trans time) in each round unused slots go idle example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle Channel Partitioning MAC : FDMA FDMA: frequency division multiple access channel spectrum divided into frequency bands each station assigned a frequency band unused frequency bands are idle example: 6-station LAN, 1,3,4, frequency bands 2,5,6 idle 6-slot frame 1 3 4 1 3 4 FDM cable Data Link Layer 5-13 Data Link Layer 5-14 Random Access Protocols When node has packet to send transmit at full channel data rate two or more transmitting nodes collision, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC : slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA Slotted ALOHA Assumptions: all frames same size time divided into equal size slots (time to transmit 1 frame) nodes start to transmit only slot beginning nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation: when node obtains fresh frame, transmits in next slot if no collision: node can send new frame in next slot if collision: node retransmits frame in each subsequent slot with prob. p until success Data Link Layer 5-15 Data Link Layer 5-16 Slotted ALOHA Pure (unslotted) ALOHA Pros single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization Data Link Layer 5-17 unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t 0 collides with other frames sent in [t 0-1,t 0 +1] Data Link Layer 5-18 3

CSMA (Carrier Sense Multiple Access) CSMA collisions CSMA: listen before transmit: If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission human analogy: don t interrupt others! collisions can still occur: propagation delay means two nodes may not hear each other s transmission collision: entire packet transmission time wasted note: role of distance & propagation delay in determining collision probability Data Link Layer 5-19 Data Link Layer 5-20 CSMA/CD (Collision Detection) CSMA/CD collision detection CSMA/CD: carrier sensing collisions detected within short time colliding transmissions aborted, reducing channel wastage collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed by local transmission strength Data Link Layer 5-21 Data Link Layer 5-22 Taking Turns MAC Taking Turns MAC channel partitioning MAC : share channel efficiently and fairly at high load inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! random access MAC efficient at low load: single node can fully utilize channel high load: collision overhead taking turns look for best of both worlds! Polling: master node invites slave nodes to transmit in turn typically used with dumb slave devices concerns: polling overhead latency single point of failure (master) slaves data data poll master Data Link Layer 5-23 Data Link Layer 5-24 4

Taking Turns MAC Link Layer Token passing: control token passed from one node to next sequentially. token message concerns: token overhead latency single point of failure (token) (nothing to send) T T 5.4 Link-Layer data Data Link Layer 5-25 Data Link Layer 5-26 MAC Addresses and ARP LAN Addresses and ARP 32-bit IP address: network-layer address used to get datagram to destination IP subnet MAC (or LAN or or Ethernet) address: function: get frame from one interface to another ly-connected interface (same network) 48 bit MAC address (for most LANs) burned in NIC ROM, also sometimes software settable 71-65-F7-2B-08-53 LAN (wired or wireless) 1A-2F-BB-76-09-AD 58-23-D7-FA-20-B0 0C-C4-11-6F-E3-98 Broadcast address = FF-FF-FF-FF-FF-FF Data Link Layer 5-27 Data Link Layer 5-28 LAN Address (more) ARP: Address Resolution Protocol MAC address allocation administered by IEEE manufacturer buys portion of MAC address space (to assure uniqueness) analogy: (a) MAC address: like Social Security Number (b) IP address: like postal address MAC address portability can move LAN card from one LAN to another IP hierarchical address NOT portable address depends on IP subnet to which node is attached Question: how to determine MAC address of B knowing B s IP address? 137.196.7.23 71-65-F7-2B-08-53 137.196.7.88 LAN 137.196.7.78 1A-2F-BB-76-09-AD 137.196.7.14 58-23-D7-FA-20-B0 0C-C4-11-6F-E3-98 Each IP node (host, router) on LAN has ARP table ARP table: IP/MAC address mappings for some LAN nodes Mapping will typically be forgotten after 20 min Data Link Layer 5-29 Data Link Layer 5-30 5

Link Layer 5.4 Link-Layer Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology simpler, cheaper than token LANs and ATM kept up with speed race: 10 Mbps 10 Gbps Metcalfe s Ethernet sketch Data Link Layer 5-31 Data Link Layer 5-32 Star topology bus topology popular through mid 90s all nodes in same collision domain (can collide with each other) today: star topology prevails active switch in center each spoke runs a (separate) Ethernet protocol (nodes do not collide with each other) Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern 10101010 followed by one byte with pattern 10101011 used to synchronize receiver, sender clock rates switch bus: coaxial cable star Data Link Layer 5-33 Data Link Layer 5-34 Ethernet Frame Structure (more) Addresses: 6 bytes if adapter receives frame with matching destination address, or with broadcast address (e.g. ARP packet), it passes data in frame to network layer protocol otherwise, adapter discards frame Type: indicates higher layer protocol (mostly IP but others possible, e.g., Novell IPX, AppleTalk) CRC: checked at receiver, if error is detected, frame is dropped Ethernet: Unreliable, connectionless connectionless: No handshaking between sending and receiving NICs unreliable: receiving NIC doesn t send acks or nacks to sending NIC stream of datagrams passed to network layer can have gaps (missing datagrams) gaps will be filled if app is using TCP otherwise, app will see gaps Ethernet s MAC protocol: unslotted CSMA/CD Data Link Layer 5-35 Data Link Layer 5-36 6

Ethernet CSMA/CD algorithm Ethernet s CSMA/CD (more) 1. NIC receives datagram 4. If NIC detects another from network layer, transmission while creates frame transmitting, aborts and 2. If NIC senses channel idle, sends jam signal starts frame transmission 5. After aborting, NIC If NIC senses channel enters exponential busy, waits until channel backoff: after mth idle, then transmits collision, NIC chooses K at 3. If NIC transmits entire random from frame without detecting {0,1,2,,2 m -1}. NIC waits another transmission, NIC K 512 bit times, returns to is done with frame! Step 2 Jam Signal: make sure all other transmitters are aware of collision; 48 bits Bit time:.1 microsec for 10 Mbps Ethernet ; for K=1023, wait time is about 50 msec Exponential Backoff: Goal: adapt retransmission attempts to estimated current load heavy load: random wait will be longer first collision: choose K from {0,1}; delay is K 512 bit transmission times after second collision: choose K from {0,1,2,3} after ten collisions, choose K from {0,1,2,3,4,,1023} Data Link Layer 5-37 Data Link Layer 5-38 802.3 Ethernet Standards: Link & Physical Layers many different Ethernet standards common MAC protocol and frame format different speeds: 2 Mbps, 10 Mbps, 100 Mbps, 1Gbps, 10G bps different layer media: fiber, cable application transport network link 100BASE-TX 100BASE-T4 MAC protocol and frame format 100BASE-T2 100BASE-SX 100BASE-FX 100BASE-BX Link Layer 5.3 Multiple access 5.4 Link-layer, LANs, VLANs copper (twister pair) layer fiber layer Data Link Layer 5-39 Data Link Layer 5-40 Hubs -layer ( dumb ) repeaters: bits coming in one link go out all other links at same rate all nodes connected to hub can collide with one another no frame buffering no CSMA/CD at hub: host NICs detect collisions hub twisted pair Switch link-layer device: smarter than hubs, take active role store, forward Ethernet frames examine incoming frame s MAC address, selectively forward frame to one-or-more outgoing links when frame is to be forwarded on segment, uses CSMA/CD to access segment transparent hosts are unaware of presence of switches plug-and-play, self-learning switches do not need to be configured Data Link Layer 5-41 Data Link Layer 5-42 7

Switch: allows multiple simultaneous transmissions hosts have dedicated, direct connection to switch switches buffer packets Ethernet protocol used on each incoming link, but no collisions; full duplex switching: A-to-A and B- to-b simultaneously, without collisions not possible with dumb hub C B 6 5 A 1 2 3 4 A B switch with six interfaces (1,2,3,4,5,6) C Switch Table Q: how does switch know that A reachable via interface 4, B reachable via interface 5? A: each switch has a switch table, each entry: (MAC address of host, interface to reach host, time stamp) looks like a routing table! C B 6 5 A 1 2 3 4 A B switch with six interfaces (1,2,3,4,5,6) C Data Link Layer 5-43 Data Link Layer 5-44 Switch: self-learning switch learns which hosts can be reached through which interfaces when frame received, switch learns location of sender: incoming LAN segment records sender/location pair in switch table C B MAC addr interface TTL 6 A 1 60 5 A 1 2 3 4 A A A Source: A Dest: A B C Switch table (initially empty) Data Link Layer 5-45 Switch: frame filtering/forwarding When frame received: 1. record link associated with sending host 2. index switch table using MAC dest address 3. if entry found for destination then { if dest on segment from which frame arrived then drop the frame else forward the frame on interface indicated } else flood forward on all but the interface on which the frame arrived Data Link Layer 5-46 Interconnecting switches switches can be connected together S 4 S 1 S 3 A S 2 F B C D H E G I Institutional network to external network router mail server web server IP subnet Q: sending from A to G - how does S 1 know to forward frame destined to F via S 4 and S 3? A: self learning! (works exactly the same as in single-switch case!) Data Link Layer 5-47 Data Link Layer 5-48 8

Switches vs. Routers both store-andforward devices routers: network-layer devices (examine network-layer headers) switches are link-layer devices (examine linklayer headers) routers maintain routing tables, implement routing algorithms switches maintain switch tables, implement filtering, learning algorithms application transport datagram network frame link switch application transport network link link frame network datagram link frame Data Link Layer 5-49 9