CompSci 356: Computer Network Architectures Lecture 5: Reliable Transmission and Multi-access links Chapter 2.4, 2.5, 2.6

Size: px
Start display at page:

Download "CompSci 356: Computer Network Architectures Lecture 5: Reliable Transmission and Multi-access links Chapter 2.4, 2.5, 2.6"

Transcription

1 CompSci 356: Computer Network Architectures Lecture 5: Reliable Transmission and Multi-access links Chapter 2.4, 2.5, 2.6 Xiaowei Yang

2 Link layer functions Encoding Overview NRZ, NRZI, Manchester, 4B/5B Framing Byte-oriented, bit-oriented, time-based Bit stuffing Error detection Parity, checkshum, CRC Reliability FEC, sliding window Multi-access links

3 Error detection Error detection code adds redundancy Analogy: sending two copies Parity Checksum CRC Error correcting code

4 Two-dimensional parity A sample frame of six bytes Even parity bit Make an even number of 1s in each row and column Detect all 1,2,3-bit errors, and most 4-bit errors

5 Internet checksum algorithm Basic idea (for efficiency) Add all the words transmitted and then send the sum. Receiver does the same computation and compares the sums IP checksum Adding 16-bit short integers using 1 s complement arithmetic Take 1 s complement of the result Used by lab 2 to detect errors

6 1 s complement arithmetic -x is each bit of x inverted If there is a carry bit, add 1 to the sum [-2^(n-1)-1, 2^(n-1)-1] Example: 4-bit integer : 0101; -5: 1010; +2: 0010; -2: 1101; = = one carrier bit; à1000 = -7

7 Calculating the Internet checksum u_short cksum (u_short *buf, int count) { register u_long sum = 0; } while (count--) { sum += *buf++; if (sum & 0xFFFF0000) { /* carry occurred. So wrap around */ sum &= 0xFFFF; sum++; } } // one s complement sum return ~(sum & 0xFFFF); // one s complement of the sum

8 Verifying the checksum Adds all 16-bit words together, including the checksum 0: correct 1: errors

9 Remarks Can detect 1 bit error Not all two-bits Efficient for software implementation

10 Cyclic Redundancy Check Cyclic error-correcting codes High-level idea: Represent an n+1-bit message with an n degree polynomial M(x) Divide the polynomial by a degree-k divisor polynomial C(x) k-bit CRC: remainder Send Message + CRC that is dividable by C(x)

11 Polynomial arithmetic modulo 2 B(x) can be divided by C(x) if B(x) has higher degree B(x) can be divided once by C(x) if of same degree x^3 + 1 can be divided by x^3 + x^2 + 1 The remainder would be 0*x^3 + 1*x^2 + 0*x^1 + 0*x^0 (obtained by XORing the coefficients of each term) Remainder of B(x)/C(x) = B(x) C(x) Substraction is done by XOR each pair of matching coefficients

12 CRC algorithm 1. Multiply M(x) by x^k. Add k zeros to Message. Call it T(x) 2. Divide T(x) by C(x) and find the remainder 3. Send P(x) = T(x) remainder Append remainder to T(x) P(x) dividable by C(x)

13 An example 8-bit msg Divisor (3bit CRC) 1101 Msg sent:

14 How to choose a divisor Arithmetic of a finite field Intuition: unlikely to be divided evenly by an error Corrupted msg is P(x) + E(x) If E(x) is single bit, then E(x) = x i If C(x) has the first and last term nonzero, then detects all single bit errors Find C(x) by looking it up in a book

15 Hardware implementation Very efficient: XOR operations Number of bits = k 0 to k-1 registers (k-bit shift registers) If n th (n < k) term is not zero, places an XOR gate x 3 + x 2 + 1

16 Link layer functions Encoding Overview NRZ, NRZI, Manchester, 4B/5B Framing Byte-oriented, bit-oriented, time-based Bit stuffing Error detection Parity, checkshum, CRC Reliability FEC, sliding window Multi-access links

17 Reliable transmission What to do if a receiver detects bit errors? Two high-level approaches Forward error correction (FEC) Retransmission Acknowledgements Can be piggybacked on data packets Timeouts Also called Automatic repeat request (ARQ)

18 Stop-and-wait Send one frame, wait for an ack, and send the next Retransmit if times out Note in the last figure (d), there might be confusion: a new frame, or a duplicate?

19 Add a sequence number to each frame to avoid the ambiguity Sequence number

20 Stop-and-wait drawback Revisiting bandwidth-delay product Total delay/latency = transmission delay + propagation delay + queuing Queuing is the time packet sent waiting at a router s buffer Will revisit later (no sweat if you don t get it now)

21 Delay * bandwidth product For a 1Mbps pipe, it takes 8 seconds to transmit 1MB. If the link latency is less than 8 seconds, the pipe is full before all data are pumped into the pipe For a 1Gbps pipe, it takes 8 ms to transmit 1MB.

22 Stop-and-wait drawback A 1Mbps link with a 100ms two-way delay (round trip time, RTT) 1KB frame size Throughput = 1KB/ (1KB/1Mbps + 100ms) = 74Kbps << 1Mbps Delay * bandwidth = 100Kb So we could send ~12 frames before the pipe is full! Throughput = 100Kb/(1KB/1Mbps + 100ms) = 926Kbps

23 Key idea: allowing multiple outstanding (unacked) frames to keep the pipe full Sliding window

24 Sliding window on sender Assign a sequence number (SeqNum) to each frame Maintains three variables Send Window Size (SWS) Last Ack Received (LAR) Last Frame Sent (LFS) Invariant: LFS LAR SWS

25 Slide window this way when an ACK arrives Sender actions When an ACK arrives, moves LAR to the right, opening the window to allow the sender to send more frames If a frame times out before an ACK arrives, retransmit

26 Sliding window on receiver Maintains three window variables Receive Window Size (RWS) Largest Acceptable Frame (LAF) Last frame received (LFR) Invariant LAF LFR RWS

27 When a frame with SeqNum arrives Discards it if out of window Seq LFR or Seq > LAF If in window, decides what to ACK Cumulative ack Acks SeqNumToAck even if higher-numbered packets have been received Sets LFR = SeqNumToAck-1, LAF = LFR + RWS Updates SeqNumToAck

28 Finite sequence numbers Things may go wrong when SWS=RWS, SWS too large Example 3-bit sequence number, SWS=RWS=7 Sender sends 0,, 6; receiver acks, expects (7,0,, 5), but all acks lost Sender retransmits 0,,6; receiver thinks they are new SWS < (MaxSeqNum+1)/2 Alternates between first half and second half of sequence number space as stop-and-wait alternates between 0 and 1

29 Sliding window protocol (SWP) implementation typedef u_char SwpSeqno; typedef struct { SwpSeqno SeqNum; /* sequence number of this frame */ SwpSeqno AckNum; /* ack of received frame */ u_char Flags; /* up to 8 bits' worth of flags. An ack or data */ } SwpHdr; Your code will look very different!

30 typedef struct { /* sender side state: */ SwpSeqno LAR; /* seqno of last ACK received */ SwpSeqno LFS; /* last frame sent */ Semaphore sendwindownotfull; SwpHdr hdr; /* preinitialized header */ struct sendq_slot { Event timeout; /* event associated with send-timeout */ Msg msg; } sendq[sws]; /* receiver side state: */ SwpSeqno NFE; /* seqno of next frame expected */ struct recvq_slot { int received; /* is msg valid? */ Msg msg; } recvq[rws]; } SwpState;

31 static int sendswp(swpstate *state, Msg *frame) { struct sendq_slot *slot; hbuf[hlen]; } /* wait for send window to open */ semwait(&state->sendwindownotfull); state->hdr.seqnum = ++state->lfs; slot = &state->sendq[state->hdr.seqnum % SWS]; store_swp_hdr(state->hdr, hbuf); msgaddhdr(frame, hbuf, HLEN); msgsavecopy(&slot->msg, frame); slot->timeout = evschedule(swptimeout, slot, SWP_SEND_TIMEOUT); return sendlink(frame);

32 static int deliverswp(swpstate state, Msg *frame) { SwpHdr hdr; char *hbuf; hbuf = msgstriphdr(frame, HLEN); load_swp_hdr(&hdr, hbuf) if (hdr->flags & FLAG_ACK_VALID) { /* received an acknowledgment---do SENDER side */ if (swpinwindow(hdr.acknum, state->lar + 1, state->lfs)) { do { struct sendq_slot *slot; slot = &state->sendq[++state->lar % SWS]; evcancel(slot->timeout); msgdestroy(&slot->msg); semsignal(&state->sendwindownotfull); } while (state->lar!= hdr.acknum); } }

33 if (hdr.flags & FLAG_HAS_DATA) { struct recvq_slot *slot; /* received data packet---do RECEIVER side */ slot = &state->recvq[hdr.seqnum % RWS]; if (!swpinwindow(hdr.seqnum, state->nfe, state->nfe + RWS - 1)) { /* drop the message */ return SUCCESS; } msgsavecopy(&slot->msg, frame); slot->received = TRUE; if (hdr.seqnum == state->nfe) { Msg m; while (slot->received) { deliverhlp(&slot->msg); msgdestroy(&slot->msg); slot->received = FALSE; slot = &state->recvq[++state->nfe % RWS]; } /* send ACK: */ prepare_ack(&m, state->nfe - 1); sendlink(&m); msgdestroy(&m); }} return SUCCESS; }

34 static bool swpinwindow(swpseqno seqno, SwpSeqno min, SwpSeqno max) { SwpSeqno pos, maxpos; pos = seqno - min; /* pos *should* be in range [0..MAX)*/ maxpos = max - min + 1; /* maxpos is in range [0..MAX]*/ return pos < maxpos; }

35 Multiple functions of the sliding window algorithm Remark: perhaps one of the best-known algorithms in computer networking Multiple functions Reliable deliver frames over a link In-order delivery to upper layer protocol Flow control Not to over un a slow slower Congestion control (later) Not to congest the network

36 Other ACK mechanisms NACK: negative acks for packets not received unnecessary, as sender timeouts would catch this information SACK: selective ACK the received frames + No need to send duplicate packets - more complicated to implement Newer version of TCP has SACK

37 Exercise Delay: 100ms; Bandwidth: 1Mbps; Packet Size: 1000 Bytes; Ack: 40 Bytes Q: the smallest window size to keep the pipe full?

38 100ms 1Mbps Window size = largest amount of unacked data How long does it take to ack a packet? RTT = 100 ms * 2 + transmission delay of a packet (1000B) + transmission delay of an ack (40B) ~=208ms How many packets can the sender send in an RTT? 1Mbps * 208ms / 8000 bits = 26 Roughly 13 packets in the pipe from sender to receiver, and 13 acks from receiver to sender

39 Concurrent logical channels A link has multiple logical channels Each channel runs an independent stop-andwait protocol + keeps the pipe full - no relationship among the frames sent in different channels: out-of-order

40 Multi-access links Multiple access links Ethernet (WiFi) Bluetooth Cell phone Note: understand the concepts

41 Original design standard defines both MAC and physical layer details Motivation: switches are expensive Metcalfe s original Ethernet Sketch

42 Multiple-access links Bus LAN Ring LAN Many nodes attached to the same link Ethernet Token rings Wireless network (WiFi) Problem: who gets to send a frame? Multiple senders lead to collision Solution: a general technique Multiple access with collision detect (CSMA/CD)

43 Ethernet Developed in mid-1970s at Xerox PARC Speed: 10Mbps Gbps Standard: 802.3, Ethernet II (DIX, stands for Digital-Intel- Xerox) Most popular physical layers for Ethernet Last digital shows segment length 10Base5 Thick Ethernet: 10 Mbps coax cable. A segment < 500m 10Base2 Thin Ethernet: 10 Mbps coax cable. < 200 m 10Base-T 10 Mbps T: Twisted Pair < 100m 100Base-TX 100 Mbps over Category 5 twisted pair, duplex 100Base-FX 100 Mbps over Fiber Optics, duplex 1000Base-FX 1Gbps over Fiber Optics, duplex 10000Base-FX 10Gbps over Fiber Optics (for wide area links), duplex

44 Bus Topology 10Base5 (thick) and 10Base2 (thin) Ethernets have a bus topology 10Base5 as our case study Ethernet 10BASE2 cable T-connector Terminator

45 Physical properties Sensing the line; if idle, sends signals 10Base5 Transceiver q A small device directly attached to the tap q It detects when the line is idle and drives the signal when the host is transmitting q It also receives incoming signals.

46 How to expand an Ethernet segment A repeater is a device that forwards digital signals Multiple segments can be joined together by repeaters No more than four repeaters between any host <2500 meters < 1024 hosts Terminators are attached to each end of the segment Manchester encoding

47 How to expand an Ethernet segment (II) Starting with 10Base-T, stations are connected to a hub (or a switch) in a star configuration 100Mbps, 1000Mbps Hub 10 Base-T cable and jack A hub is a multiway repeater

48 Collision Domain Any host hears any other host A single segment Multiple segments connected by repeaters Multiple segments connected by a hub q All these hosts are competing for access to the same link, and as a consequence, they are said to be in the same collision domain.

49 Access control Bit-oriented framing In a host s memory, Ethernet header is 14 bytes The adaptor adds the preamble and CRC The type field is the de-multiplexor bytes of data Pad to minimum length Minimum length is for collision detection has the same header format, but substitutes type with length field How to tell whether the field indicates type or length? All types > 1500B

50 A prettier picture You ll need to know this for Lab 2

51 Ethernet addresses A flat unique 6-byte address per adaptor E8-6D-8C-3D Each manufacture is given a unique prefix e.g: 8:0:20:??:??:?? - Advanced Micro Devices (AMD) An all 1s address is a broadcast address (FF:FF:FF:FF:FF:FF) An address with first bit 1 but not broadcast is multicast An adaptor receives Frames with its address as a destination address In promiscuous mode, delivers all frames Broadcast frames Multicast frames if configured to

52 Transmitter Algorithm (1) 1. The adaptor receives datagram from network layer, creates frame 2. If the adaptor senses channel idle, starts frame transmission. If NIC senses channel busy, waits until channel idle, then transmits. 3. If NIC transmits an entire frame without detecting another transmission, NIC is done with frame! 4. If NIC detects another transmission while transmitting, aborts and sends jam signal (collision!!)

53 Transmitter Algorithm (2) If collision jam for 32 bits, then stop transmitting frame Wait and try again exponential backoff (doubling the delay interval of each collision) After the nth collision:: the adaptor waits for k x 51.2us, for randomly selected k=0,, 2 n 1 1st time: 0 or 51.2us 2nd time: 0, 51.2, 102.4, or 153.6us give up after several tries (usually 16)

54 Collision detection An adaptor senses the signals on the line and compares it with its own If same, no collision; otherwise, collision Sends 32-bit jamming sequence after collision In the worst case, a sender needs to send 512 bits ( = 64B) to detect collision Why?

55 (a) A sends a frame at time t ; (b) A s frame arrives at B at time t + d; (c) B begins transmitting at time t + d and immediately collides with A s frame; (d) B s runt (32-bit) frame arrives at A at time t + 2d. q A and B are at opposite ends of the network q One way delay is d q A needs to send for 2d (round-trip delay) to detect collision q 2d = 51.2 µs. On a 10Mps Ethernet, corresponds to 512 bits q Related to maximum Ethernet length ~ 2500 m

56 The IEEE Baseband Five physical segments between any two nodes Four repeaters between the nodes. Three of these physical segments can have connected node Each segment < 500m à Total < 2500m

57 Propagation delay for this maximum-extent Ethernet network is 25.6us 2*d = 51.2us Minimum Ethernet packet frame is 512 bits (64B) Header 14B, payload 46B, CRC 4B

58 Ethernet experience 30% utilization is heavy Most Ethernets are not light loaded Very successful Easy to maintain Price: does not require a switch which used to be expensive

59 Wireless links Most common Asymmetric Point-to-multipoint

60 Wireless access control Can t use Ethernet protocol Hidden terminal A and C can t hear each other s collision at B Exposed terminal B can send to A; C can send to D

61 (WiFi) Multiple access with collision avoidance Sender and receiver exchange control Sender à receiver: Request to send (RTS) Specifies the length of frame Receiver à sender: Clear to send (CTS) Echoes length of frame Sender à receiver: frame Receiver à sender: ack Other nodes can send after hearing ACK Node sees CTS Too close to receiver, can t transmit Addressing hidden terminals Node only sees RTS Okay to transmit Addressing exposed terminals

62 How to resolve collision Sender can t do collision detection Single antenna can t send and receive at the same time If no CTS, then RTS collide Exponential backoff to retransmit

63 Distribution system Hosts associate with APs APs connect via the distribution system A layer-2 system Ethernet, token ring, etc. Host IP addresses do not need to change

64 AP association Active scanning Node: Probe APs: Probe response Node selects one of APs, send Association request AP replies Association Response Passive scanning AP sends Beacon to announce itself Node sends Association Request

65 Frame format Same AP Addr1: dst Addr2: src Different Aps ToDS and FromDS in control field set Add1: dst, Addr2: AP_dst Addr3: AP_src, Add4: src

66 Bluetooth Connecting devices: mobile phones, headsets, keyboards Very short range communication Low power License exempt band 2.45 Ghz 1~3Mpbs Specified by Bluetooth Special Interest Group

67 A bluetooth piconet A master device and up to seven slave devices Communication is between the master and a slave

68 Bluetooth uses a spread spectrum technique Frequency-hopping with 79 channels Each for 625 us A frame takes up 1, 3, or 5 slots The master can start in odd-numbered slots A salve can start in an even-numbered slot, in response to a request from the master A slave device can be parked In active, low power, only be reactivated by the master

69 Cell phone technologies Using licensed spectrum Europe: 900 Mhz and 1800 Mhz North America: 850 Mhz and 1900 Mhz Base stations form a wired network Geographic area served by a base station s antenna is called a cell Similar to wifi Phone is associated with one base station Leaving a cell entering a cell causes a handoff

70 Cellular technologies 1G: analog 2G: digital and data 3G: higher bandwidth and simultaneous voice and data Variants of Code Division Multiple Access (CDMA) A spread spectrum technology Each transmitter uses a pseudorandom chipping code using a wide spectrum Good for bursty traffic: no hard limit on how many users can send simultaneously 4G: even higher

71 Summary A new reliable transmission mechanism Current logical channels Multiple access links Ethernet (WiFi) Bluetooth Cell phone Note: understand the concepts Lab 1 out: much harder than Lab 0. Pls start early!

72 Backup

73 Token rings A token circulates the ring If a node has something to send, take the token off the ring, and send the frame Node 1 Each node along the way simply forwards the frame Receiver copies the frame Node 4 Frame comes back to sender Sender removes the packet and puts the token back

74 Token ring standard IBM Token Ring A nearly identical IEEE standard 802.5: not widely used Fiber Distributed Data Interface (FDDI) Derived from the IEEE Resilient Packet Ring (RPR)

75 Challenges must be addressed Fault tolerance Media access control How long each node can hold the token? Reliability How does the sender know the frame is received Resource utilization

76 Adding fault tolerance an electromechanical relay Problem: single node powers off disconnects the ring Solution: relay that closes when host s powered off

77 Token ring media access control An adaptor has a receiver and a transmitter Problem: how long can a node holds a token? Token holding time (THT), default 10ms in Short: waste bandwidth Long: starve others What if you have an important short message?

78 802.5 Token Access Protocol A token has a 3-bit priority field A frame has three reservation bits A device seizes the token if its packet is at least as the token Reservation A sender X sets priority n in the three reservation bits in a frame if The bits are not set to a higher value The station that holds the token set priority to n Sender X lowers the token priority after releasing it so other senders can send Drawback: may starve lower priority traffic

79 Token ring reliability No sliding window! Two trailing bits (A, C) after each frame A recipient sets A bit when it sees the frame Sets C bit after it copies the frame back to its adaptor If a sender does not see both bits set, retransmits q A=0, C=0: the intended recipient is not functioning or absent q A=1, C=0: for some reason (e.g., lack of buffer space), the destination could not accept the frame q A=1, C=1: frame received

80 When to release a token Better bandwidth utilization Early release: Sender inserts the token back onto the ring immediately following its frame Late release: Sender inserts the token after the frame it transmits has gone all the way around the ring and been removed Which one is better? originally used (b), and adds (a) later

81 802.5 Token ring maintenance A monitor makes sure the token is not lost Periodically announces itself If the monitor fails A station elects itself by sending a claim token If the token comes back, it s the monitor If competition, highest address wins

82 Monitor s job If it does not see a token for a long time, it creates a new one # of stations * token holding time + ringlatency Detect and remove orphaned frames (whose parent died) Monitor sets a head bit to 1 after seeing a frame If it sees the bit already set, remove the packet

83 802.5 Frame format q Similar to the Ethernet, addresses are 48 bits long. q The frame also includes a 32-bit CRC. q Frame status byte includes the A and C bits for reliable delivery

84 Transmitter Algorithm Begin: Wait until the line is idle and has data to send, the adaptor sends it, and listens to collision If no, go back to Begin else exponentially backoff randomly selects a k between [0,2 n -1], waits for k x 51.2 µs to try Begin again Gives up after n reaches 16

85 One way delay is d A needs to send for 2d duration to detect collision 2d = 512 µs. On a 10Mps Ethernet, corresponds to 512 bits

86 Token rings A token circulates the ring If a node has something to send, take the token off the ring, and send the frame Receiver copies the frame Frame comes back to sender Sender removes the packet and puts the token back

87 When to release a token A) early; b) late Which one is better? has a,b

Point-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1

Point-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1 Point-to-Point Links Outline Encoding Framing Error Detection Sliding Window Algorithm Fall 2004 CS 691 1 Encoding Signals propagate over a physical medium modulate electromagnetic waves e.g., vary voltage

More information

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4 CompSci 356: Computer Network Architectures Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4 Xiaowei Yang xwy@cs.duke.edu Overview Review: link/network performance metrics

More information

Direct Link Networks (II)

Direct Link Networks (II) Direct Link Networks (II) Computer Networking Lecture 03 HKU SPACE Community College January 30, 2012 HKU SPACE CC CN Lecture 03 1/25 Outline Reliable Link Service Stop-and-Wait Sliding Window Media Access

More information

Reliable Transmission

Reliable Transmission Reliable Transmission How to fix corrupted frames. Error correcting codes too expensive Should discard frames (retransmission) Recover from Corrupt s should be done in the Link Level Data Link Networks

More information

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2. Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 2 Getting Connected Eng. Haneen El-Masry March, 2014 2.2 ENCODING Encoding the

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16 Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error

More information

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check. Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced

More information

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002 EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution

More information

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not

2.4 Error Detection Bit errors in a frame will occur. How do we detect (and then. (or both) frames contains an error. This is inefficient (and not CS475 Networks Lecture 5 Chapter 2: Direct Link Networks Assignments Reading for Lecture 6: Sections 2.6 2.8 Homework 2: 2.1, 2.4, 2.6, 2.14, 2.18, 2.31, 2.35. Due Thursday, Sept. 15 2.4 Error Detection

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

CSCI-1680 Link Layer Reliability John Jannotti

CSCI-1680 Link Layer Reliability John Jannotti CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1 Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter

More information

Housekeeping. Fall /5 CptS/EE 555 1

Housekeeping. Fall /5 CptS/EE 555 1 Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section

More information

Networking Link Layer

Networking Link Layer Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding

More information

Copyright 2010, Elsevier Inc. All rights Reserved

Copyright 2010, Elsevier Inc. All rights Reserved Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie C 2 Getting Connected Copyright 2010, Elsevier Inc. All rights Reserved Perspectives on Connecting An end-user s view of the

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Link Layer (L2) Review

Link Layer (L2) Review Link Layer (L2) Review 188lecture2.ppt Pasi Lassila 1 Problem How to connect 2 (or more) computers directly to each other? physical cable? bit encoding, framing, error detection? reliable transfer mechanisms?

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Problem Statement. Physical and Data Link Layer Overview. Five Tasks Encoding. Make two computers talk to each other

Problem Statement. Physical and Data Link Layer Overview. Five Tasks Encoding. Make two computers talk to each other Physical and Data Link Layer Overview Problem Statement Make two talk to each other Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Physical media transmit Analog signals Modulate/demodulate

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

CS 457 Networking and the Internet. Link Layer Protocols. Problems 8/31/16. Fall 2016 Indrajit Ray

CS 457 Networking and the Internet. Link Layer Protocols. Problems 8/31/16. Fall 2016 Indrajit Ray CS 457 Networking and the Internet Fall 2016 Indrajit Ray Link Layer Protocols Problems In earlier lectures we saw networks consisting of links interconnecting nodes. How to connect two nodes together?

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1 Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation

More information

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

CS 640 Lecture 4: 09/11/2014

CS 640 Lecture 4: 09/11/2014 CS 640 Lecture 4: 09/11/2014 A) Bandwidth-delay product B) Link layer intro C) Encoding, Framing, Error Detection D) Multiple access Ethernet A. Bandwidth-delay product This in the above example is C *

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer

More information

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send Token Ring Developed by IBM, adopted by IEEE as 802.5 standard Token rings latter extended to FDDI (Fiber Distributed Data Interface) and 802.17 (Resilient Packet Ring) standards Nodes connected in a ring

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Data Communication & Computer Networks INFO

Data Communication & Computer Networks INFO Data Communication & Computer Networks INFO Instructor: Dr. A. SARI Department: Management Information Systems Course Code: MIS 305 Academic Term: 2013/2014 Fall Title: Data Communication & Computer Networks

More information

Data Link Layer. Srinidhi Varadarajan

Data Link Layer. Srinidhi Varadarajan Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request

More information

CSE/EE 461 Section 2

CSE/EE 461 Section 2 CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

Introduction to Computer Networks. IEEE Ethernet

Introduction to Computer Networks. IEEE Ethernet Introduction to Computer Networks IEEE 802.3 Ethernet All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Unit II. Part A (2 Marks)

Unit II. Part A (2 Marks) Unit II Part A (2 Marks) 1. Differentiate fast Ethernet and Gigabit Ethernet. Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s). Gigabit Ethernet was the next iteration, increasing

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today: Link Layer (cont.) Framing Reliability Error correction Sliding window Medium

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Multiple Access Channels

Multiple Access Channels Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

L5: Building Direct Link Networks III. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L5: Building Direct Link Networks III. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L5: Building Direct Link Networks III Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were

More information

Chapter 2: Getting Connected

Chapter 2: Getting Connected Islamic University of Gaza Faculty of Engineering Eng. Jehad Aldahdooh Computer Networks Computer Engineering Dept. Chapter 2 Chapter 2: Getting Connected 1. Explain Manchester Encoding. Manchester Encoding

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont... Media Access Protocols Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Shared Access Networks More than two nodes are attached to the same physical medium Normally span a small geographical

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

COMPUTER NETWORKS CS CS 55201

COMPUTER NETWORKS CS CS 55201 COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 2 Data Link Networks P. Farrell / H. Peyravi Department of Computer Science Kent State University Kent, Ohio 44242 farrell@cs.kent.edu http://www.cs.kent.edu/

More information

COMPUTER NETWORKS CS CS 55201

COMPUTER NETWORKS CS CS 55201 Contents COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 2 Data Link Networks Hardware Building Blocks Encoding Coding Design Framing Error Detection Reliable Transmission Ethernet FDDI Network Adaptors P.

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

ECSE 414 Fall 2014 Final Exam Solutions

ECSE 414 Fall 2014 Final Exam Solutions ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:

More information

EECS 122, Lecture 7. Kevin Fall Jean Walrand

EECS 122, Lecture 7. Kevin Fall Jean Walrand EECS 122, Lecture 7 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu : Outline Typical Setup Names Physical Layer Frame Fast Ethernet; Gigabit Ethernet 10Base5 Efficiency of CSMA/CD

More information

Medium Access Control

Medium Access Control Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Communication (III) Kai Huang

Communication (III) Kai Huang Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Module 10 Data Link Layer CS655! 10-1!

Module 10 Data Link Layer CS655! 10-1! Module 10 Data Link Layer CS655! 10-1! Please note: Most of these slides come from this book. Note their copyright notice below! A note on the use of these ppt slides: We re making these slides freely

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448 Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted

More information

CMPE 344 Computer Networks Spring Getting Connected. Reading: Peterson and Davie, 2.1,

CMPE 344 Computer Networks Spring Getting Connected. Reading: Peterson and Davie, 2.1, CMPE 344 Computer Networks Spring 2017 Getting Connected Reading: Peterson and Davie, 2.1, 2.5-2.7 Sources of slides: Computer networks: A systems Approach by Peterson and Davie, Morgan Kaufmann, 2010

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

More on LANS. LAN Wiring, Interface

More on LANS. LAN Wiring, Interface More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network

More information