Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

Similar documents
Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

SLIP and PPP. Gursharan Singh Tatla

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

11/22/

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

High-Level Data Link Control

WAN Data Link Protocols

Based on Computer Networking, 4 th Edition by Kurose and Ross

The OSI and TCP/IP Models. Lesson 2

Chapter 2 - The TCP/IP and OSI Networking Models

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Data Communication Networks and Converged Networks

IT Data Communication and Networks (Optional)

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

DATA COMMUNICATION AND NETWORKS

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

IT4405 Computer Networks (Compulsory)

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

PPP (Point-to-Point Protocol)

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Protocols and Architecture. Protocol Architecture.

How do I get to

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Communication Systems Internetworking (Bridges & Co)

Networking Test 4 Study Guide

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Communication Networks. MAP-TELE 2011/12 José Ruela

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Ethernet. Ethernet. Network Devices

CSCI 362 Computer and Network Security

Data Link Layer Overview

PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. PPP encapsulates data frames for

Subnetting,Supernetting, VLSM & CIDR

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Post-Class Quiz: Telecommunication & Network Security Domain

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Mathatma Gandhi University

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Cabling LANs and WANs

Network Layer: Network Layer and IP Protocol

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Data Communication and Computer Network

RTT 60.5 msec receiver window size: 32 KB

SSVP SIP School VoIP Professional Certification

Network Models OSI vs. TCP/IP

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Introduction To Computer Networking

Written examination in Computer Networks

The OSI Model and the TCP/IP Protocol Suite

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Master Course Computer Networks IN2097

Lesson 2-3: Ethernet Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

The TCP/IP Protocol Suite

This course has been retired. View the schedule of current <a href=

Data Link Protocols. 5.4 Framing

MANAGEMENT INFORMATION SYSTEMS 8/E

Introduction to Ethernet

Cisco 12 CCNA Certification

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

Asynchronous Transfer Mode

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Introduction to WAN Technologies

Transport Layer Protocols

Data Communication Networks

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Introduction to computer networks and Cloud Computing

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Overview of Routing between Virtual LANs

Communications and Computer Networks

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Overview of Asynchronous Transfer Mode (ATM) and MPC860SAR. For More Information On This Product, Go to:

Overview of Computer Networks

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

UPPER LAYER SWITCHING

ETSI ETR 156 TECHNICAL October 1995 REPORT

AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP

Industrial Networks & Databases. Protocols and Networks - Device Bus - - Field Bus -

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

DATA COMMUNICATION (Basics of data communication, OSI layers.)

Technical Support Information Belkin internal use only

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Chapter 10 Security Protocols of the Data Link Layer

Introduction to Networking and the OSI Model

Transcription:

Data Link Protocols TCP/IP Suite and OSI Reference Model The TCP/IP protocol stack does not define the lower layers of a complete protocol stack In this lecture, we will address how the TCP/IP protocol stacks interfaces with the data link layer

Data Link Layer The main tasks of the data link layer are: Transfer data from the network layer of one machine to the network layer of another machine Convert the raw bit stream of the physical layer into groups of bits ( frames ) Network Layer Data Link Layer Physical Layer Network Layer Data Link Layer Physical Layer Two types of networks at the data link layer Broadcast Networks: All stations share a single communication channel Point-to-Point Networks: Pairs of hosts (or routers) are directly connected Broadcast Network Point-to-Point Network Typically, local area networks (LANs) are broadcast and wide area networks (WANs) are point-to-point

Local Area Networks Local area networks (LANs) connect computers within a building or a enterprise network Almost all LANs are broadcast networks Typical topologies of LANs are bus or ring or star We will work with Ethernet LANs. Ethernet has a bus or star topology. Bus LAN Ring LAN MAC and LLC In any broadcast network, the stations must ensure that only one station transmits at a time on the shared communication channel The protocol that determines who can transmit on a broadcast channel are called Medium Access Control (MAC) protocol The MAC protocol are implemented in the MAC sublayer which is the lower sublayer of the data link layer The higher portion of the data link layer is often called Logical Link Control (LLC) Data Link Layer Logical Link Control Medium Access Control to Network Layer to Physical Layer

IEEE 80 Standards IEEE 80 is a family of standards for LANs, which defines an LLC and several MAC sublayers Ethernet Speed: Standard: 10Mbps -10 Gbps 80.3, Ethernet II (DIX) Most popular physical layers for Ethernet: 10Base5 Thick Ethernet: 10 Mbps coax cable 10Base Thin Ethernet: 10 Mbps coax cable 10Base-T 10 Mbps Twisted Pair 100Base-TX 100 Mbps over Category 5 twisted pair 100Base-FX 100 Mbps over Fiber Optics 1000Base-FX 1Gbps over Fiber Optics 10000Base-FX 1Gbps over Fiber Optics (for wide area links)

Bus Topology 10Base5 and 10Base Ethernets has a bus topology Ethernet Star Topology Starting with 10Base-T, stations are connected to a hub in a star configuration Hub

Ethernet Hubs vs. Ethernet Switches An Ethernet switch is a packet switch for Ethernet frames Buffering of frames prevents collisions. Each port is isolated and builds its own collision domain An Ethernet Hub does not perform buffering: Collisions occur if two frames arrive at the same time. Hub Switch HighSpeed Backplane Input Buffers Output Buffers Ethernet and IEEE 80.3: Any Difference? There are two types of Ethernet frames in use, with subtle differences: Ethernet (Ethernet II, DIX) 80.3: An industry standards from 198 that is based on the first implementation of by Xerox. Predominant version of in the US. IEEE s version of from 1985. Interoperates with 80. (LLC) as higher layer. Difference for our purposes: Ethernet and 80.3 use different methods to encapsulate an IP datagram.

Ethernet II, DIX Encapsulation (RFC 894) 80.3 MAC destination address source address type data CRC 6 6 46-1500 4 0800 IP datagram 38-149 0806 ARP request/reply PAD 8 10 0835 RARP request/reply PAD 8 10 IEEE 80./80.3 Encapsulation (RFC 104) 80.3 MAC 80. LLC 80. SNAP destination address source address length DSAP AA SSAP AA cntl 03 org code 0 type data CRC 6 6 1 1 1 3 38-149 4 - destination address, source address: MAC addresses are 48 bit - length:frame length in number of bytes - DSAP, SSAP: always set to 0xaa - Ctrl: set to 3 - org code: set to 0 - type field identifies the content of the data field - CRC: cylic redundancy check 0800 0806 0835 IP datagram 38-149 ARP request/reply 8 RARP request/reply 8 PAD 10 PAD 10

Point-to-Point (serial) links Many data link connections are pointto-point serial links: Dial-in or DSL access connects hosts to access routers Routers are connected by high-speed point-to-point links Here, IP hosts and routers are connected by a serial cable Access Router Modems Dial-Up Access Data link layer protocols for point-topoint links are simple: Main role is encapsulation of IP datagrams No media access control needed Data Link Protocols for Point-to-Point links SLIP (Serial Line IP) First protocol for sending IP datagrams over dial-up links (from 1988) Encapsulation, not much else PPP (Point-to-Point Protocol): Successor to SLIP (199), with added functionality Used for dial-in and for high-speed routers HDLC (High-Level Data Link) : Widely used and influential standard (1979) Default protocol for serial links on Cisco routers Actually, PPP is based on a variant of HDLC

PPP - IP encapsulation The frame format of PPP is similar to HDLC and the 80. LLC frame format: PPP assumes a duplex circuit Note: PPP does not use addresses Usual maximum frame size is 1500 Additional PPP functionality In addition to encapsulation, PPP supports: multiple network layer protocols (protocol multiplexing) Link configuration Link quality testing Error detection Option negotiation Address notification Authentication The above functions are supported by helper protocols: LCP PAP, CHAP NCP

PPP Support protocols Link management: The link control protocol (LCP) is responsible for establishing, configuring, and negotiating a data-link connection. LCP also monitors the link quality and is used to terminate the link. Authentication: Authentication is optional. PPP supports two authentication protocols: Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). Network protocol configuration: PPP has network control protocols (NCPs) for numerous network layer protocols. The IP control protocol (IPCP) negotiates IP address assignments and other parameters when IP is used as network layer. Switched networks Some data link technologies can be used to build complete networks, with their own addressing, routing, and forwarding mechanisms. These networks are often called switched networks. At the IP layer, a switched network may like a pointto-point link or like a broadcast link

Switched networks Data link layer technologies: Switched Ethernet ATM (Asynchronous Transfer Mode) Frame Relay Multiprotocol Label Switching (MPLS) Some switched networks are intended for enterprise networks (Switched Ethernet), wide area networks (MPLS, Frame Relay), or both (ATM) Some switched networks have a complete protocol suite. Link Layer Services

Link Layer Services Framing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to identify source, dest different from IP address! Reliable delivery between adjacent nodes we learned how to do this already (chapter 3)! seldom used on low bit error link (fiber, some twisted pair) wireless links: high error rates Q: why both link-level and end-end reliability? Link Layer Services (more) Flow Control: pacing between adjacent sending and receiving nodes Error Detection: errors caused by signal attenuation, noise. receiver detects presence of errors: signals sender for retransmission or drops frame Error Correction: receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex with half duplex, nodes at both ends of link can transmit, but not at same time

Parity Checking Single Bit Parity: Detect single bit errors Two Dimensional Bit Parity: Detect and correct single bit errors 0 0 Internet checksum Goal: detect errors (e.g., flipped bits) in transmitted segment (note: used at transport layer only) Sender: treat segment contents as sequence of 16-bit integers checksum: addition (1 s complement sum) of segment contents sender puts checksum value into UDP checksum field Receiver: compute checksum of received segment check if computed checksum equals checksum field value: NO - error detected YES - no error detected. But maybe errors nonetheless? More later.

Checksumming: Cyclic Redundancy Check view data bits, D, as a binary number choose r+1 bit pattern (generator), G goal: choose r CRC bits, R, such that <D,R> exactly divisible by G (modulo ) receiver knows G, divides <D,R> by G. If non-zero remainder: error detected! can detect all burst errors less than r+1 bits widely used in practice (ATM, HDCL) CRC Example Want: D. r XOR R = ng equivalently: D. r = ng XOR R equivalently: if we divide D. r by G, want remainder R D. r G R = remainder[ ]