Link Layer Services (more) Link Layer. LAN technologies. LAN Addresses and ARP. MAC Addresses and ARP. Last Course Review: Link Layer: Introduction

Similar documents
Based on Computer Networking, 4 th Edition by Kurose and Ross

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Random Access Protocols

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Level 2 Routing: LAN Bridges and Switches

Ethernet, VLAN, Ethernet Carrier Grade

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

- Hubs vs. Switches vs. Routers -

Transport Layer Protocols

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

RTT 60.5 msec receiver window size: 32 KB

Data Link Protocols. TCP/IP Suite and OSI Reference Model

CSMA/CA. Information Networks p. 1

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CS335 Sample Questions for Exam #2

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Final for ECE374 05/06/13 Solution!!

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Internet Control Protocols Reading: Chapter 3

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

Communication Systems Internetworking (Bridges & Co)

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Ethernet. Ethernet. Network Devices

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Written examination in Computer Networks

Internet Protocols Fall Outline

Architecture and Performance of the Internet

Transport and Network Layer

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

RARP: Reverse Address Resolution Protocol

UPPER LAYER SWITCHING

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Mathatma Gandhi University

Data Communication and Computer Network

Internet Packets. Forwarding Datagrams

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

The OSI and TCP/IP Models. Lesson 2

Technical Support Information Belkin internal use only

Introduction to LAN/WAN. Network Layer

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

IT Data Communication and Networks (Optional)

Overview of Computer Networks

CS197U: A Hands on Introduction to Unix

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

WAN Data Link Protocols

LAN Switching and VLANs

The Wireless Network Road Trip

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Protocols and Architecture. Protocol Architecture.

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Networking Test 4 Study Guide

DATA COMMUNICATION AND NETWORKS

How do I get to

Question: 3 When using Application Intelligence, Server Time may be defined as.

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Network Layer: Network Layer and IP Protocol

Computer Networks Vs. Distributed Systems

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Internet Protocols Fall Lectures 7-8 Andreas Terzis

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Performance Analysis of Switches in High Speed LAN

Vorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Module 15: Network Structures

Introduction to Ethernet

11/22/

Subnetting,Supernetting, VLSM & CIDR

The Network Layer Functions: Congestion Control

Access Control: Firewalls (1)

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Candidates should attempt FOUR questions. All questions carry 25 marks.

28 Networks and Communication Protocols

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Chapter 14: Distributed Operating Systems

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Objectives of Lecture. Network Architecture. Protocols. Contents

Dynamic Source Routing in Ad Hoc Wireless Networks

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Protocol Data Units and Encapsulation

Network Models OSI vs. TCP/IP

IT4405 Computer Networks (Compulsory)

Transcription:

Last Course Review: Link Layer: Introduction Some terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links LNs layer-2 packet is a frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to adjacent node over a link link 5: DataLink Layer 5- Link Layer Services (more) Flow Control: pacing between adjacent sending and receiving nodes Error Detection: errors caused by signal attenuation, noise. receiver detects presence of errors: signals sender for retransmission or drops frame Error Correction: receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex with half duplex, nodes at both ends of link can transmit, but not at same time 5: DataLink Layer 5-2 LN technologies Link Layer Data link layer so far: services, error detection/correction, multiple access Next: LN technologies addressing Ethernet s, es PPP 5. Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer ddressing 5.5 Ethernet 5.6 Hubs and es 5.7 PPP 5.8 Link Virtualization: TM 5: DataLink Layer 5-3 5: DataLink Layer 5-4 MC ddresses and RP 32-bit IP address: network-layer address used to get datagram to destination IP subnet MC (or LN or physical or Ethernet) address: used to get datagram from one interface to another physically-connected interface (same network) 48 bit MC address (for most LNs) burned in the adapter ROM LN ddresses and RP Each adapter on LN has unique LN address 7-65-F7-2-08-53 LN (wired or wireless) -2F--76-09-D 58-23-D7-F-20-0 0C-C4--6F-E3-98 roadcast address = FF-FF-FF-FF-FF-FF = adapter 5: DataLink Layer 5-5 5: DataLink Layer 5-6

LN ddress (more) MC address allocation administered by IEEE manufacturer buys portion of MC address space (to assure uniqueness) nalogy: (a) MC address: like Social Security Number (b) IP address: like postal address MC flat address portability can move LN card from one LN to another IP hierarchical address NOT portable depends on IP subnet to which node is attached RP: ddress Resolution Protocol Question: how to determine MC address of knowing s IP address? 237.96.7.23 7-65-F7-2-08-53 237.96.7.88 LN 237.96.7.78-2F--76-09-D 237.96.7.4 58-23-D7-F-20-0 0C-C4--6F-E3-98 Each IP node (Host, Router) on LN has RP table RP Table: IP/MC address mappings for some LN nodes < IP address; MC address; TTL> TTL (Time To Live): time after which address mapping will be forgotten (typically 20 min) 5: DataLink Layer 5-7 5: DataLink Layer 5-8 RP protocol: Same LN (network) Routing to another LN wants to send datagram to, and s MC address not in s RP table. broadcasts RP query packet, containing 's IP address Dest MC address = FF-FF-FF-FF-FF-FF all machines on LN receive RP query receives RP packet, replies to with its ('s) MC address frame sent to s MC address (unicast) caches (saves) IP-to- MC address pair in its RP table until information becomes old (times out) soft state: information that times out (goes away) unless refreshed RP is plug-and-play : nodes create their RP tables without intervention from net administrator 5: DataLink Layer 5-9 walkthrough: send datagram from to via R assume know s IP address Two RP tables in router R, one for each IP network (LN) R 5: DataLink Layer 5-0 creates datagram with source, destination uses RP to get R s MC address for...0 creates link-layer frame with R's MC address as dest, frame contains -to- IP datagram s adapter sends frame R s adapter receives frame R removes IP datagram from Ethernet frame, sees its destined to R uses RP to get s MC address R creates frame containing -to- IP datagram sends to R Link Layer 5. Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer ddressing 5.5 Ethernet 5.6 Hubs and es 5.7 PPP 5.8 Link Virtualization: TM 5: DataLink Layer 5-5: DataLink Layer 5-2 2

Ethernet dominant wired LN technology: cheap $20 for 00Mbs! first widely used LN technology Simpler, cheaper than token LNs and TM Kept up with speed race: 0 Mbps 0 Gbps Star topology us topology popular through mid 90s Now star topology prevails Connection choices: or (more later) Metcalfe s Ethernet sketch or 5: DataLink Layer 5-3 5: DataLink Layer 5-4 Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern 0000 followed by one byte with pattern 000 used to synchronize receiver, sender clock rates Ethernet Frame Structure (more) ddresses: 6 bytes if adapter receives frame with matching destination address, or with broadcast address (eg RP packet), it passes data in frame to net-layer protocol otherwise, adapter discards frame Type: indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and ppletalk) CRC: checked at receiver, if error is detected, the frame is simply dropped 5: DataLink Layer 5-5 5: DataLink Layer 5-6 Unreliable, connectionless service Ethernet uses CSM/CD Connectionless: No handshaking between sending and receiving adapter. Unreliable: receiving adapter doesn t send acks or nacks to sending adapter stream of datagrams passed to network layer can have gaps gaps will be filled if app is using TCP otherwise, app will see the gaps No slots adapter doesn t transmit if it senses that some other adapter is transmitting, that is, carrier sense transmitting adapter aborts when it senses that another adapter is transmitting, that is, collision detection efore attempting a retransmission, adapter waits a random time, that is, random access 5: DataLink Layer 5-7 5: DataLink Layer 5-8 3

Ethernet CSM/CD algorithm. daptor receives datagram from net layer & creates frame 2. If adapter senses channel idle, it starts to transmit frame. If it senses channel busy, waits until channel idle and then transmits 3. If adapter transmits entire frame without detecting another transmission, the adapter is done with frame! 4. If adapter detects another transmission while transmitting, aborts and sends jam signal 5. fter aborting, adapter enters exponential backoff: after the mth collision, adapter chooses a K at random from {0,,2,,2 m -}. dapter waits K 52 bit times and returns to Step 2 5: DataLink Layer 5-9 Ethernet s CSM/CD (more) Jam Signal: make sure all other transmitters are aware of collision; 48 bits it time:. microsec for 0 Mbps Ethernet ; for K=023, wait time is about 50 msec See/interact with Java applet on WL Web site: highly recommended! Exponential ackoff: Goal: adapt retransmission attempts to estimated current load heavy load: random wait will be longer first collision: i choose K from {0,}; delay is K 52 bit transmission times after second collision: choose K from {0,,2,3} after ten collisions, choose K from {0,,2,3,4,,023} 5: DataLink Layer 5-20 CSM/CD efficiency T prop = max prop between 2 nodes in LN t trans = time to transmit max-size frame efficiency = + 5t / prop t trans Efficiency goes to as t prop goes to 0 Goes to as t trans goes to infinity Much better than LOH, but still decentralized, simple, and cheap 0aseT and 00aseT 0/00 Mbps rate; latter called fast ethernet T stands for Twisted Pair Nodes connect to a : star topology ; 00 m max distance between nodes and twisted pair 5: DataLink Layer 5-2 5: DataLink Layer 5-22 Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSM/CD at : adapters detect collisions provides net management functionality twisted pair Gbit Ethernet uses standard Ethernet frame format allows for point-to-point links and shared broadcast channels in shared mode, CSM/CD is used; short distances between nodes required for efficiency uses s, called here uffered Distributors Full-Duplex at Gbps for point-to-point links 0 Gbps now! 5: DataLink Layer 5-23 5: DataLink Layer 5-24 4

Link Layer 5. Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer ddressing 5.5 Ethernet 5.6 Interconnections: Hubs and es 5.7 PPP 5.8 Link Virtualization: TM Interconnecting with s ackbone interconnects LN segments Extends max distance between nodes ut individual segment collision domains become one large collision domain Can t interconnect 0aseT & 00aseT 5: DataLink Layer 5-25 5: DataLink Layer 5-26 Switch Forwarding Link layer device stores and forwards Ethernet frames examines frame header and selectively forwards frame based on MC dest address when frame is to be forwarded on segment, uses CSM/CD to access segment transparent hosts are unaware of presence of es plug-and-play, self-learning es do not need to be configured 5: DataLink Layer 5-27 2 3 How do determine onto which LN segment to forward frame? Looks like a routing problem... 5: DataLink Layer 5-28 Self learning has a table entry in table: (MC ddress, Interface, Time Stamp) stale entries in table dropped (TTL can be 60 min) learns which h hosts can be reached through h which interfaces when frame received, learns location of sender: incoming LN segment records sender/location pair in table Filtering/Forwarding When receives a frame: index table using MC dest address if entry found for destination then{ if dest on segment from which frame arrived then drop the frame else forward the frame on interface indicated } else flood forward on all but the interface on which the frame arrived 5: DataLink Layer 5-29 5: DataLink Layer 5-30 5

Switch example Suppose C sends frame to D C 2 3 Switch receives frame from C D E address interface E 2 G 3 notes in bridge table that C is on interface because D is not in table, forwards frame into interfaces 2 and 3 frame received by D F G H I 5: DataLink Layer 5-3 Switch example Suppose D replies back with frame to C. C D E address interface E G 2 3 I C Switch receives frame from from D notes in bridge table that D is on interface 2 because C is in table, forwards frame only to interface frame received by C F G H 5: DataLink Layer 5-32 Switch: traffic isolation installation breaks subnet into LN segments filters packets: same-ln-segment frames not usually forwarded onto other LN segments segments become separate collision domains Switches: dedicated access Switch with many interfaces Hosts have direct connection to No collisions; full duplex C collision domain Switching: -to- and -to- simultaneously, no collisions C collision domain collision domain 5: DataLink Layer 5-33 5: DataLink Layer 5-34 More on Switches Institutional network cut-through ing: frame forwarded from input to output port without first collecting entire frame slight g reduction in latency combinations of shared/dedicated, 0/00/000 Mbps interfaces to external network router mail server web server IP subnet 5: DataLink Layer 5-35 5: DataLink Layer 5-36 6

Switches vs. Routers both store-and-forward devices routers: network layer devices (examine network layer headers) es are link layer devices routers maintain routing tables, implement routing algorithms es maintain tables, implement filtering, learning algorithms 5: DataLink Layer 5-37 Summary comparison s routers es traffic no yes yes isolation on plug & play yes no yes optimal routing cut through no yes no yes no yes 5: DataLink Layer 5-38 7