Data link layer (layer 2)

Size: px
Start display at page:

Download "Data link layer (layer 2)"

Transcription

1 Data link layer (layer 2) Gruppo Reti TLC COMPUTER NETWORK DESIGN Review of layer 2 protocols - 1 Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare oppure inviare una lettera a: Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. This work is licensed under the Creative Commons NoDerivs-NonCommercial License. To view a copy of this license, visit: or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. COMPUTER NETWORK DESIGN Review of layer 2 protocols - 2 Pag. 1

2 Data link layer Identifies and manages frames/datagrams over a link Wired or wireless Point-to-point Broadcast (need also medium access control to regulate access) Datagrams are transferred by different link protocols over different links Unless a virtual circuit based layer 2 is adopted When adopting the virtual circuit service, a layer 2 network can be defined Data can be forwarded through several devices at layer 2 only! Tons of layer 2 protocols were defined Link layer protocols implemented in the network adaptor (NIC) as hardware, software and firmware COMPUTER NETWORK DESIGN Review of layer 2 protocols - 3 Data link layer functions Frame delineation Explicit delimiters (flag) before and after packet transmission Lenght indicator Fixed length Silence between packets Multiplexing (of higher layer protocols) Addressing Error detection (at least in the headers, typically on header plus data) Window protocol Flow control Sequence and error control through retransmission Multiple access protocols for shared media (broadcast channel) COMPUTER NETWORK DESIGN Review of layer 2 protocols - 4 Pag. 2

3 Data link layer protocols Several protocols belong to the variable packet size HDLC family LAP-B (Link Access Procedure Balanced) and LAP-D (Link Access Procedure D-Channel) ISDN LAP-F (Link Access Procedure to Frame Mode Bearer Service) Frame Relay LLC (Logical Link Control) Standard LANs (on top of MAC) PPP (Point-to-Point Protocol) Internet ATM (AAL+ATM) Fixed packet size MAC COMPUTER NETWORK DESIGN Review of layer 2 protocols - 5 Layer two architectures LAP-B standardized In the ISDN framework as an extension to the telephone network infrastructure to integrate packet services first attempt of network integration LLC standardized (today often unused) for Local Area Networks over the MAC layer Frame Relay standardized to create packet networks based on virtual circuits (normally permanent VCs) originally proposed within the ISDN framework today used to create VPNs (Virtual Private Networks) for companies to interconnect LANs to build logical topologies to interconnect Internet routers for ISP COMPUTER NETWORK DESIGN Review of layer 2 protocols - 6 Pag. 3

4 PPP Layer two architectures RFC 1661 defined in the Internet framework to provide access to the Internet from user premises ATM For B-ISDN (Broadband ISDN) first attempt to build a really integrated network support all type of services, with different transmission speeds and quality of service requirements over the same network infrastructure should have reached the user terminal today used as an alternative to Frame Relay Ethernet Commercial standard for Local Area Networks Access protocol to solve the distributed access problem COMPUTER NETWORK DESIGN Review of layer 2 protocols - 7 Reliability Frames can be lost on a link? Yes, for transmission errors Yes, in layer two protocols with virtual circuit service due to buffer overflow within switching nodes For error control Need either error detection or error correction capability Error correction Requires more overhead It is convenient only either for significant bit error rates or for very large delays When error detected on data, retransmission is employed COMPUTER NETWORK DESIGN Review of layer 2 protocols - 8 Pag. 4

5 Reliability: window protocols Send a packet, wait for an ACK When the ACK is received, send the next packet Packet (and ACK) can be lost Wait for ACK and then retransmit How long to wait? One timeout Timeout should be larger than the RTT (Round Trip Time) RTT includes Two way propagation delay Processing time at the receiver (boundable and negligible) Packet and ACK transmission time Can manage one packet at the time? Yes, but since the packets (and the ACK) can be lost we need to number it anyway Named stop&wait protocol COMPUTER NETWORK DESIGN Review of layer 2 protocols - 9 Reliability: window protocols Max bit rate of the stop&wait? One packet per RTT For large RTTs, it may be small Can increase the packet size? Yes but.. Increase the number of packets that can be sent without receiving an ACK Number of packets is named window Need to store many packets (for retransmission and reordering) Selective repeat TX and RX windows larger than one Typically set to the same value nstraint on the window size to ensure correct behaviour WT+WR 2 k where k is the number of bit used to number packets and ACKs COMPUTER NETWORK DESIGN Review of layer 2 protocols - 10 Pag. 5

6 Transmission windows Correctly Acked PDUs PDUs waiting for an ACK PDUs that can be transmitted PDUs that cannot be trasmitted W TX n PDUs to be passed to higher layer protocols PDU that were correctly ACKed and moved to higher layer protocols for further processing W RX PDUs that can be accepted n Out of sequence PDU s that cannot be accepted COMPUTER NETWORK DESIGN Review of layer 2 protocols - 11 Window protocols bit rate The maximum bit rate (in absence of errors) of a window protocol is ruled by transmission _ window min, link _ speed RTT For a given RTT, there is an optimal window size that maximizes the bit rate (equal to the link speed) Larger windows translate in an equivalent RTT increase with no bit rate increase Short connections get higher throughput for a given window size To control TX throughput, it is possible to act on RTT (e.g. delaying ACK transmission but it may induce retransmissions Window size COMPUTER NETWORK DESIGN Review of layer 2 protocols - 12 Pag. 6

7 Window protocol: flow control Flow control is needed to avoid to overwhelm a slow receiver (Rx) with a too fast transmitter (Tx) When a Rx becomes slow its buffer initially fills up Then bits must be dropped To avoid it, we can exploit the window size at the Tx to regulate its sending rate The Rx monitors its buffer size sends control messages to the Tx to reduce the transmitter window E.g. On/Off flow control (full/zero) window COMPUTER NETWORK DESIGN Review of layer 2 protocols - 13 Layered architecture: ISDN B channel L3 Packet layer Packet layer Packet layer L2 LAP-B LAP-B LAP-B LAP-B L1 User terminal Switching node User terminal Error control COMPUTER NETWORK DESIGN Review of layer 2 protocols - 14 Pag. 7

8 Frame relay core and edge approach L>= 3 Higher layer protocols DL-CONTROL Error control Higher layer protocols DL-CONTROL L2 DL-CORE DL-CORE DL-CORE DL-CORE L1 User terminal Frame Relay switching node User terminal COMPUTER NETWORK DESIGN Review of layer 2 protocols - 15 B-ISDN Core and edge approach L>=3 L2 Higher layers protocols AAL Error detection only on-demand for some AAL Higher layers protocols AAL L1 ATM ATM ATM ATM User terminal ATM switching node User terminal COMPUTER NETWORK DESIGN Review of layer 2 protocols - 16 Pag. 8

9 B-ISDN: reference model Control plane Higher layers Management plane User plane Higher layer AAL (ATM Adaptation Layer) ATM layer Layer management Plane management layer COMPUTER NETWORK DESIGN Review of layer 2 protocols - 17 Data format (many layer 2 protocols) address control data CRC /16 8/16 >= Flag field ( ) to delimit the packets Not in LLC Address field has different flavors Address in LAP-B multi-point configuration Virtual circuit identifier (DLCI) and some bits for congestion control and traffic control in Frame Relay Two fields in LLC for protocol multiplexing Not used in PPP COMPUTER NETWORK DESIGN Review of layer 2 protocols - 18 Pag. 9

10 Control field differentiates the PDUs LAP-B Data format (many layer 2 protocols) Packet and ACK number Error and on/off flow control Connection management LLC (Optional) packet and ACK number PPP Not used Frame relay (but only user to user) Packet and ACK number Error and flow control COMPUTER NETWORK DESIGN Review of layer 2 protocols - 19 Data format (many layer 2 protocols) CRC for error detection Not available in LLC (done by the MAC) Additional fields? Protocol multiplexing in PPP COMPUTER NETWORK DESIGN Review of layer 2 protocols - 20 Pag. 10

11 ATM cell format GFC VPI VCI VCI HEC VPI VCI PT CLP VPI VCI VPI VCI HEC PT VCI CLP 5 BYTE DATA DATA 48 BYTE UNI CELL NNI CELL COMPUTER NETWORK DESIGN Review of layer 2 protocols - 21 ATM cell header GFC (4 bit): Generic Flow Control GFC for flow control at the user to networkk interface VPI (8-12 bit): Virtual Path Identifier and VCI (16 bit): Virtual Circuit Identifier virtual circuit identifiers (labels) PT (3 bit): Payload Type classifyiescell type as user data, managment, traffic control CLP (1 bit) Provides two priority levels in tghe cell flow HEC (8 bit): Header Error Code permits to detect header errors and correct single errors COMPUTER NETWORK DESIGN Review of layer 2 protocols - 22 Pag. 11

12 AAL: ATM Adaptation Layer Integrates ATM transport to offer service to users Servide dependent layer It defines four classes of service Examples of AAL functions: Transmission errors detection Segmentation and reassembly Cell loss management Flow control Synchronization Timestamping COMPUTER NETWORK DESIGN Review of layer 2 protocols - 23 AAL service classes Synchronism required between source and dest Speed Connection type AAL type Class A Class B Class C Class D costant (CBR) required Connection oriented not required variable (VBR) AAL 1 AAL 2 AAL 3/4-5 connectionl ess Possible applications voice 64kbit/s video CBR video/audio VBR data data COMPUTER NETWORK DESIGN Review of layer 2 protocols - 24 Pag. 12

13 Lenght CRC - 32 COMPUTER NETWORKS Data link layer protocols AAL 3/4 CPCS PDU 1B 1B 2B 0-3B 1B 2B 2B CPI B Tag BA size AAL payload pad AL E Lenght Tag 2 byte 44 byte 2 byte SAR - PDU SAR SAR header trailer ST=BOM SAR header ST=COM SAR trailer SAR header ST=EOM SAR trailer SAR PDU ST SN MID LI CRC bit 6 bit 10 bit COMPUTER NETWORK DESIGN Review of layer 2 protocols - 25 AAL B 0-47B 2B 2B 4B CS Layer PDU CS Layer Payload SAR Layer PDU 48 bytes SAR payload 48 bytes SAR payload 48 bytes SAR payload End of segment = 1 COMPUTER NETWORK DESIGN Review of layer 2 protocols - 26 Pag. 13

14 LANs Small geographical extension Shared transmission medium (originally) only one node can transmit at a time Multiple access problem Motivation: bursty traffic Dedicated channel would be wasted When sending, each node would like a high tx speed Useful for broadcast-multicast transmission Need to use address to identify node for unicast traffic Many topologies bus,ring, star COMPUTER NETWORK DESIGN Review of layer 2 protocols - 27 Possible solutions for medium access Static channel division Fixed assignement of portion of channels Time Division Frequency Division Code Division Not suited to bursty traffic (N queues and servers at speed C are worse that 1 queue and server at speed NC) Could extend to a dynamic assignment scenario Suppose a centralized controller Need to collect node tx needs (according to which access scheme?) Need to send allocation decision to nodes (according to which access scheme?) Complexity and increase in delay Solution: rely on distributed, access protocols Goal: to emulate statistical multiplexing COMPUTER NETWORK DESIGN Review of layer 2 protocols - 28 Pag. 14

15 Access protocols for LANs: taxonomy Three main families: Random access (ALOHA, CSMA/CD, Ethernet) Ordered access (Token Ring, Token Bus, FDDI) Slotted, with reservation (DQDB) How to evaluate LAN access protocols performance Throughput Fairness Access delay Number of nodes, network size, reliability, ease of deployment COMPUTER NETWORK DESIGN Review of layer 2 protocols - 29 Random access protocols Optimistic approach Free access Each node send at the channel speed R No coordination among nodes If two concurrent transmissions collision MAC (Medium Access Control) random access protocols specify: How to detect a collision How to recover after a collision has been detected Randomly delayed retransmission COMPUTER NETWORK DESIGN Review of layer 2 protocols - 30 Pag. 15

16 Random access protocols SLOTTED ALOHA All packets same size Synchronization among nodes Time divided in to equal size slots Node tx begin only at slot boundaries If collision is detected, retransmit after a random delay (in slot) or retransmit in each subsequent slot with probability p COMPUTER NETWORK DESIGN Review of layer 2 protocols - 31 Random access protocols SLOTTED ALOHA All packets same size Synchronization among nodes Time divided in equal size slots Node tx begins only at slot boundaries If collision is detected, retransmit after a random delay (in slot) or retransmit in each subsequent slot with probability p Good Single node get the whole network capacity Bad Idle slots when retransmitting Need for synchronization Low efficiency (36% for infinite users) Collisions Vulnerability period 1 packet tx time Collisions last one packet tx time COMPUTER NETWORK DESIGN Review of layer 2 protocols - 32 Pag. 16

17 ALOHA Random access protocols All packets same size (only for comparison) No synchronization among nodes Node tx begin when the frame becomes availalble If collision is detected, retransmit after a random delay Good Single node get the whole network capacity Simpler than ALOHA Bad Even worse performance than SLOTTED ALOHA (18%) Higher collision probability (vulnerability period 2 packet tx time) Average collision duration 1.5 packet tx time COMPUTER NETWORK DESIGN Review of layer 2 protocols - 33 CSMA: Carrier Sense Multiple Access Listen before transmit! Sense the channel before transmission If the channel is sensed free, transmit a packet If the channel is busy, defer transmission to avoid collision 1-persistent CSMA: retry transmission as soon as channel sensed free 0-persistent CSMA : retry transmission after a random time p-persistent CSMA: with p behave as 1-persistent, with probability (1-p) behave as 0-persistent COMPUTER NETWORK DESIGN Review of layer 2 protocols - 34 Pag. 17

18 Collisions still occur due to propagation delay If a collision occurs, a full packet transmission time is wasted The propagation delay (distance) plays a fundamental role in collision probability Vulnerability period depends on propagation delay CSMA: collisions? COMPUTER NETWORK DESIGN Review of layer 2 protocols - 35 CSMA/CD (Collision Detection) Stop if speaking at the sam time! CSMA/CD adds to CSMA If a collision is (quickly) detected, packet transmission is suspended Reduce the waste due to useless transmission Collision detection: Compare the tx signal with the rx signal Easy in wired LANs: Almost impossible in wireless LANs: half duplex (when tx the rx is disbled) COMPUTER NETWORK DESIGN Review of layer 2 protocols - 36 Pag. 18

19 CSMA/CD: performance Throughput performance strongly depend on the end to end propagation delay More precisely, on the ratio between packet transmission time and the propagation delay Very good throughput performance on small size networks (with respect to packet size) and with relatively small transmission speed Large packets, much larger than network size! Constraint on the minimum packet size to detect collisions (a node must transmit when detecting a collision) COMPUTER NETWORK DESIGN Review of layer 2 protocols - 37 Random access protocols performance COMPUTER NETWORK DESIGN Review of layer 2 protocols - 38 Pag. 19

20 TDMA/FDMA Ordered access protocols Efficient and fair at high load At low loads Delay in access channel 1/N bit rate available to a single node Random access Efficient at low load Single node access the whole bit rate Low delays At high load Collisions reduce performance Can we get the best (and the worst :-) of the two? COMPUTER NETWORK DESIGN Review of layer 2 protocols - 39 Polling Ordered access protocols A Master node invites slaves to transmit in turn Issues Polling overhead Latency Single point of failure Token passing Control token (gives permission to transmit) passed among nodes Either physical or logical sequence Issue Token overhead Latency Single point of failure COMPUTER NETWORK DESIGN Review of layer 2 protocols - 40 Pag. 20

21 Slotted access protocols Slots propagate on the active bus (or ring) Need two bus in opposite directions to work Empty slot Check slot availability If empty transmit Otherwise wait for next available slot No throughput loss Unfair Need to reserve slots from upstream nodes to ensure fairness Empty slot with reservations Still some unfairness left Good access delay COMPUTER NETWORK DESIGN Review of layer 2 protocols - 41 Performance comparison Random access features Excellent access delays at low loads delay is significant at low loads Simple to implement If well designed to control collisions may be efficient for small networks Difficult to create class of traffic (priority) Ordered access features Highly efficient and fair at high load Loose one «network traversal per cycle» to transmit the token Token (or master) lost block the network Need to monitor token (master) generation process and to ensure uniqueness Slotted access (with reservation) features Maximum efficiency Some residual unfairness (delays) Need synchronization to identify slot boundaries COMPUTER NETWORK DESIGN Review of layer 2 protocols - 42 Pag. 21

22 LAN Interconnection Needed to Extend LAN physical size Increase the number of access nodes No need to modify protocol architecture May increase LAN throughput performance More space diversity Exploits traffic locality COMPUTER NETWORK DESIGN Review of layer 2 protocols - 43 Hub Application Application Presentation Presentation Session Session Transport Transport Network Network Data Link Hub Data Link COMPUTER NETWORK DESIGN Review of layer 2 protocols - 44 Pag. 22

23 Hub Multi-port device Operates at the bit level (layer one) Extend the cable lenght No increase in network capacity Regenerates strings of bit and forwards them on all the ports Shared bandwidth on all ports 3R: re-generation, re-shaping, re-timing May introduce delays Hubs Structured cabling (ease cabling and maintenance) On twisted-pair or fiber Star based topology COMPUTER NETWORK DESIGN Review of layer 2 protocols - 45 Switch Application Presentation Session Transport Network Data Link Switch Data Link Data Link Application Presentation Session Transport Network Data Link COMPUTER NETWORK DESIGN Review of layer 2 protocols - 46 Pag. 23

24 Layer 2 devices Switch Operate on layer 2 addresses From one segment LAN to extended LANs Interconnect segments of LANs Enable to increase the network size Store and forward devices Dedicated bandwidth per port Transparent to users (same behaviour with or withouth bridge/switch) Do not modify packet content Limited routing capability Backward learning algorithm COMPUTER NETWORK DESIGN Review of layer 2 protocols - 47 Modern LANs COMPUTER NETWORK DESIGN Review of layer 2 protocols - 48 Pag. 24

25 Switch operations Forwarding tables are initially empty! Three fundamentals functions: address learning: to dynamically create a routing (forwarding) table at the MAC layer (MAC Address, port_id) frame forwarding: forward packets depending on the outcome of the routing table look-up spanning tree algorithm execution to operate on a loopfree (tree) topology Build a logical tree topology among bridges/switches by activating/de-activating ports COMPUTER NETWORK DESIGN Review of layer 2 protocols - 49 Address learning Exploits the Backward learning algorithm For each received packet Read the source MAC address MAC_S to associate the address with the port PORT_X from which the packet has been received Update timer associated to the entry (MAC_S, PORT_X) Will later use PORT_X to forward packets to MAC_S Timer needed to automatically adapt to topology variations and to keep the table size small COMPUTER NETWORK DESIGN Review of layer 2 protocols - 50 Pag. 25

26 Frame forwarding When a correct packet (wrong packets are dropped) with a unicast MAC_D destination address is received on PORT_X Look for MAC-D in the table If found and associated to PORT_X, drop the packet If found and associated to port_y, forward to PORT_Y If not found, forward to any other output port except PORT_X If the packet has a multicast/broadcast address Forward to any port except PORT_X COMPUTER NETWORK DESIGN Review of layer 2 protocols - 51 Switch properties From a multiple-access network to a multiplexed network Reduce collision probability by partitioning the network in independent segments For a full duplex fully switched network Ethernet becomes a framing and transmission technique alternative to LAP-B, LAP-F, ATM The MAC layer becomes useless distance limitations induced only by the media transmission properties, not by the MAC Ease security and management Traffic separation COMPUTER NETWORK DESIGN Review of layer 2 protocols - 52 Pag. 26

27 Switch properties Throughput performance may increase More space diversity (higher capacity) Ned to exploit traffic locality Introduce store and forward (and queueing) delays Worse delays than hubs Stor and forward delay significant with respect to propagation delay Transmission time of a minimum packet size at least twice of the propagation delay Potential packet losses when queues are filled-up Unfairness in resource access COMPUTER NETWORK DESIGN Review of layer 2 protocols - 53 Data link layer in LANs IEEE data link layer in LANs has two sub layers LLC: Logical Link Control MAC: Medium Access Control network LLC MAC physical COMPUTER NETWORK DESIGN Review of layer 2 protocols - 54 Pag. 27

28 802.1 ARCHITECTURE COMPUTER NETWORKS Data link layer protocols Frame delineation LANs layer 2 functions MAC (silence among packets and SFD) Multiplexing (higher layer protocols) IEEE LLC, MAC Ethernet Error detection MAC Error correction (window protocol) LLC (optionale) Addressing MAC used to identify the NIC (Network Interface Card), LLC for higher layer protocol multiplexing COMPUTER NETWORK DESIGN Review of layer 2 protocols - 55 Standard IEEE INTERNETWORKING LOGICAL LINK CONTROL INTERNETWORKING LOGICAL LINK MEDIUM ACCESS MEDIUM ACCESS MEDIUM ACCESS MEDIUM ACCESS MEDIA ACCESS PHY PHY PHY PHY PHYSICAL COMPUTER NETWORK DESIGN Review of layer 2 protocols - 56 Pag. 28

29 Ethernet: packet format Preamble = SFD = MAC destination address MAC source address Higher layer protocol > 1500 BYTES D A T A FCS Inter Packet GAP (silence) 4 Equivalent to 12 COMPUTER NETWORK DESIGN Review of layer 2 protocols - 57 IEEE 802.3: packet format Preamble = SFD = MAC destination address MAC source address Length (<1500) BYTES D A T A Padding FCS Inter Packet GAP (silence) Equivalent to 12 COMPUTER NETWORK DESIGN Review of layer 2 protocols - 58 Pag. 29

30 Elements Laptops, smartphones (may be fixed, not mobile) Base station Typically connected to a wired network Covers a given area and acts as a relay Wireless links Need MAC to coordinate access Various bit rate and distance Wireless LANs network infrastructure COMPUTER NETWORK DESIGN Review of layer 2 protocols - 59 No base station Ad hoc wireless LANs Nodes transmito to other nodes within coverage Must create and ad hoc network among nodes Nodes router traffic among themselves COMPUTER NETWORK DESIGN Review of layer 2 protocols - 60 Pag. 30

31 Hidden Terminal Effect A and C cannot hear each other because of obstacles, signal attenuation A and C unaware of collision at B How to avoid it? COMPUTER NETWORK DESIGN Review of layer 2 protocols - 61 How to avoid collisions? Multiple access 2 or plus nodes transmitting at same time : CSMA - sense before transmitting don t collide with ongoing transmission by other node : no collision detection! difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can t sense all collisions in any case: hidden terminal, fading goal: avoid collisions: CSMA/CA (Collision Avoidance) COMPUTER NETWORK DESIGN Review of layer 2 protocols - 62 Pag. 31

32 IEEE DCF Implementation mandatory DCF is based on the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) scheme: stations that have data to transmit contend to access the channel a station has to repeat the contention procedure every time it has a new data frame to transmit Stations are half-duplex: they either transmit or receive (or sense the channel) Explicit ACKs sent by the receiver!!! To solve the hidden terminal problem COMPUTER NETWORK DESIGN Review of layer 2 protocols - 63 Sender: if sense channel idle for DIFS seconds then transmit entire frame (no collision detection) if sense channel busy Select a random backoff time and send If unsuccesfull (no ACK) exponential backoff (CA) Receiver: if data received correctly returns ACK after SIFS Collisions last a lot! DCF Overview COMPUTER NETWORK DESIGN Review of layer 2 protocols - 64 Pag. 32

33 DCF with Handshaking Explicit channel reservation to avoid collisions on long data frames Sender: send short RTS (Request To Send) Receiver (BS): reply with short CTS (Clear To Send) CTS reserves channel, notifying (possibly hidden) stations After the CTS reception, the sender node sends the data with no collision Avoids data frame collisions using short RTS and CTS collisions less likely of shorter duration performance result similar to collision detection COMPUTER NETWORK DESIGN Review of layer 2 protocols - 65 Layer 2 protocols: a comparison Protocol Packet delineation Layer 3 protocol multiplexing Error detection Error correction (window protocol) Sharing LAPB Delimiter Higher layer YES YES Multiplexing LAPF core + LAPF control ATM (core)+ AAL (edge) Delimiter Done at the physical layer Via virtual circuits Via virtual circuits YES in LAPF core YES in AAL (edge) Optional in LAPF control (edge) NO Multiplexing Multiplexing PPP Delimiter YES YES NO Multiplexing LLC NO (Done in MAC IEEE 802.3) YES Optional Optional Multiplexing Ethernet MAC Silence YES YES NO Multiplexing/mult iple access (Wi-FI) Silence Above YES NO Multiple access COMPUTER NETWORK DESIGN Review of layer 2 protocols - 66 Pag. 33

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

LAN interconnection. Telecommunication Networks Group

LAN interconnection. Telecommunication Networks Group LAN interconnection Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS - LAN interconnection- 1 Copyright Quest opera è protetta dalla licenza

More information

IEEE standards for local area networks

IEEE standards for local area networks IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

More information

COMPUTER NETWORKS Data link layer protocols

COMPUTER NETWORKS Data link layer protocols Data link layer (layer 2) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

COMPUTER NETWORKS - Window protocols

COMPUTER NETWORKS - Window protocols ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Window protocols - 1 Copyright Quest opera è protetta dalla licenza Creative

More information

COMPUTER NETWORKS - Window protocols

COMPUTER NETWORKS - Window protocols ARQ techniques (window protocols) Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Ethernet Switches (more)

Ethernet Switches (more) Ethernet Switches layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-B and A - to-b simultaneously, no collisions large number of interfaces often: individual hosts, star-connected

More information

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems: Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

ATM Technology in Detail. Objectives. Presentation Outline

ATM Technology in Detail. Objectives. Presentation Outline ATM Technology in Detail Professor Richard Harris Objectives You should be able to: Discuss the ATM protocol stack Identify the different layers and their purpose Explain the ATM Adaptation Layer Discuss

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Medium Access Control

Medium Access Control Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Hubs. Interconnecting LANs. Q: Why not just one big LAN?

Hubs. Interconnecting LANs. Q: Why not just one big LAN? Interconnecting LANs Q: Why not just one big LAN? Limited amount of supportable traffic: on single LAN, all stations must share bandwidth limited length: 802.3 specifies maximum cable length large collision

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

IEEE WLAN (802.11) Copyright. Nomadic Communications

IEEE WLAN (802.11) Copyright. Nomadic Communications Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Chapter 10. Circuits Switching and Packet Switching 10-1

Chapter 10. Circuits Switching and Packet Switching 10-1 Chapter 10 Circuits Switching and Packet Switching 10-1 Content Switched communication networks Circuit switching networks Circuit-switching concepts Packet-switching principles X.25 (mentioned but not

More information

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Dr. Nils

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Lecture 8 Link Layer: functionality, error detection, media access algorithm Lecture 8 Link Layer: functionality, error detection, media access algorithm From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

Module 10 Data Link Layer CS655! 10-1!

Module 10 Data Link Layer CS655! 10-1! Module 10 Data Link Layer CS655! 10-1! Please note: Most of these slides come from this book. Note their copyright notice below! A note on the use of these ppt slides: We re making these slides freely

More information

CC451 Computer Networks

CC451 Computer Networks CC451 Computer Networks Lecture 9 Link Layer 5: DataLink Layer 5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students,

More information

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION Q-1(a) In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities can send at the same time. (b)

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline ATM Asynchronous Transfer Mode these slides are based on USP ATM slides from Tereza Carvalho 1 ATM Networks Outline ATM technology designed as a support for ISDN Definitions: STM and ATM Standardization

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

Asynchronous. nous Transfer Mode. Networks: ATM 1

Asynchronous. nous Transfer Mode. Networks: ATM 1 Asynchronous nous Transfer Mode (ATM) Networks: ATM 1 Issues Driving LAN Changes Traffic Integration Voice, video and data traffic Multimedia became the buzz word One-way batch Two-way batch One-way interactive

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Network Management and QoS provisioning Class intro and review

Network Management and QoS provisioning Class intro and review Class goals Network Management and Quality of Service Provisioning Class intro and review Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Describe,

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can

More information

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching.

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching. Asynchronous Transfer Mode (ATM) Networks! All source media is first broken down into a stream of fixed sized units known as cells.! Cell streams relating to different media types are multiplexed together

More information

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of

More information

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006 CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject

More information