Chapter 5: Link layer

Similar documents
CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Chapter 5 Link Layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs

CSC 401 Data and Computer Communications Networks

CSC 4900 Computer Networks: The Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer

Data Link Layer: Multi Access Protocols

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Lecture 8 Link Layer: functionality, error detection, media access algorithm

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 6 The Link Layer and LANs

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CC451 Computer Networks

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CMPE 150: Introduction to Computer Networks

Link Layer and LANs. CMPS 4750/6750: Computer Networks

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Chapter 6: Link layer and LANs. Link layer, LANs: outline. Link layer: introduction. Link layer: context. Link layer services (more)

SC250 Computer Networking I. Link Layer. Prof. Matthias Grossglauser LCA/I&C.

Chapter 4 Network Layer

Multiple Access Links and Protocols

Chapter V: Link Layer

Master Course Computer Networks IN2097

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter V: Link Layer

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Chapter 5 Link Layer and LANs

MULTIPLE ACCESS PROTOCOLS 2. 1

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Master Course Computer Networks IN2097

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Links. CS125 - mylinks 1 1/22/14

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter 5: DataLink Layer

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Lecture 6 - Link layer. Lecture 5 Review. Link Layer. Introduction, Services. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Chapter 5 Link Layer and LANs

CSCD 330 Network Programming

Module 10 Data Link Layer CS655! 10-1!

Medium Access Control

Link Layer and LANs. Our Goals. Link Layer

Data Link Layer: Overview, operations

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Chapter 6 The Link Layer and LANs

CSCI Computer Networks Fall 2016

CSC 8560 Computer Networks: Link Layer

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

CSCI Computer Networks Spring 2017

Chapter 5 Link Layer. Link Layer 5-1

CS 3516: Computer Networks

CSCD 330 Network Programming Fall 2012

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Module 4 Data Link Layer CS655! 4-1!

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees

Chapter 6 The Link Layer and LANs

Chapter 6 The Link Layer and LANs

Goals of Today s Lecture. Adaptors Communicating

Chapter 6 The Link Layer and LANs

Chapter 5: Link layer

Chapter 6 The Link Layer and LANs

COMP 3331/9331: Computer Networks and Applications. Data Link layer. Link layer, LANs: outline. Data Link Layer

Topic 2a. Ch 6: The Link Layer and LANs. Computer Networking: A Top Down Approach

Chapter 6 The Link Layer and LANs

Chapter 5 Link Layer and LANs

Chapter 5: The Data Link Layer

Redes de Computadores. Medium Access Control

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Chapter 6. Link Layer and LANs 6-1. Computer Networking: A Top Down Approach 7th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

COMP211 Chapter 6/7 Link Layer

Link Layer and Ethernet

Chapter 6 The Link Layer and LANs

Chapter 6 The Link Layer and LANs

Chapter 6 The Link Layer and LANs

EE 122: Ethernet and

Chapter 5: Link layer

Link Layer and Ethernet

Architettura di Reti

Links Reading: Chapter 2

Principles behind data link layer services

Principles behind data link layer services:

Transcription:

Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks: Ethernet, VLANs v instantiation, implementation of various link layer technologies Link Layer 5-1

Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs addressing, ARP Ethernet switches VLANS 5.5 link virtualization: MPLS 5.6 data center networking 5.7 a day in the life of a web request Link Layer 5-2

Link layer: introduction terminology: v hosts and routers: nodes v communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs v layer-2 packet: frame, encapsulates datagram global ISP data-link layer has responsibility of transferring datagram from one node to physically adjacent node over a link Link Layer 5-3

Link layer: context v datagram transferred by different link protocols over different links: e.g., Ethernet on first link, frame relay on intermediate links, 802.11 on last link v each link protocol provides different services e.g., may or may not provide rdt over link transportation analogy: v trip from Princeton to Lausanne limo: Princeton to JFK plane: JFK to Geneva train: Geneva to Lausanne v tourist = datagram v transport segment = communication link v transportation mode = link layer protocol v travel agent = routing algorithm Link Layer 5-4

Link layer services v framing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to identify source, dest different from IP address! v reliable delivery between adjacent nodes we learned how to do this already (chapter 3)! seldom used on low bit-error link (fiber, some twisted pair) wireless links: high error rates Q: why both link-level and end-end reliability? Link Layer 5-5

Link layer services (more) v flow control: pacing between adjacent sending and receiving nodes v error detection: errors caused by signal attenuation, noise. receiver detects presence of errors: signals sender for retransmission or drops frame v error correction: receiver identifies and corrects bit error(s) without resorting to retransmission v half-duplex and full-duplex with half duplex, nodes at both ends of link can transmit, but not at same time Link Layer 5-6

Where is the link layer implemented? v in each and every host v link layer implemented in adaptor (aka network interface card NIC) or on a chip Ethernet card, 802.11 card; Ethernet chipset implements link, physical layer v attaches into host s system buses v combination of hardware, software, firmware application transport network link link physical cpu controller physical transmission memory host bus (e.g., PCI) network adapter card Link Layer 5-7

Adaptors communicating datagram datagram controller controller sending host frame datagram receiving host v sending side: encapsulates datagram in frame adds error checking bits, rdt, flow control, etc. v receiving side looks for errors, rdt, flow control, etc extracts datagram, passes to upper layer at receiving side Link Layer 5-8

Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs addressing, ARP Ethernet switches VLANS 5.5 link virtualization: MPLS 5.6 data center networking 5.7 a day in the life of a web request Link Layer 5-9

Error detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields Error detection not 100% reliable! protocol may miss some errors, but rarely larger EDC field yields better detection and correction otherwise Link Layer 5-10

Parity checking single bit parity: v detect single bit errors two-dimensional bit parity: v detect and correct single bit errors 0 0 Link Layer 5-11

Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs addressing, ARP Ethernet switches VLANS 5.5 link virtualization: MPLS 5.6 data center networking 5.7 a day in the life of a web request Link Layer 5-12

Multiple access links, protocols two types of links : v point-to-point PPP for dial-up access point-to-point link between Ethernet switch, host v broadcast (shared wire or medium) old-fashioned Ethernet upstream HFC 802.11 wireless LAN shared wire (e.g., cabled Ethernet) shared RF (e.g., 802.11 WiFi) shared RF (satellite) humans at a cocktail party (shared air, acoustical) Link Layer 5-13

Multiple access protocols v single shared broadcast channel v two or more simultaneous transmissions by nodes: interference collision if node receives two or more signals at the same time multiple access protocol v distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit v communication about channel sharing must use channel itself! no out-of-band channel for coordination Link Layer 5-14

An ideal multiple access protocol given: broadcast channel of rate R bps desire: 1. when one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M 3. fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4. simple Link Layer 5-15

MAC protocols: taxonomy three broad classes: v channel partitioning divide channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusive use v random access channel not divided, allow collisions recover from collisions v taking turns nodes take turns, but nodes with more to send can take longer turns Link Layer 5-16

Channel partitioning MAC protocols: TDMA TDMA: time division multiple access v access to channel in "rounds" v each station gets fixed length slot (length = pkt trans time) in each round v unused slots go idle v example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle 6-slot frame 6-slot frame 1 3 4 1 3 4 Link Layer 5-17

Channel partitioning MAC protocols: FDMA FDMA: frequency division multiple access v channel spectrum divided into frequency bands v each station assigned fixed frequency band v unused transmission time in frequency bands go idle v example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6 idle time FDM cable frequency bands Link Layer 5-18

Random access protocols v when node has packet to send transmit at full channel data rate R. no a priori coordination among nodes v two or more transmitting nodes collision, v random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) v examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA Link Layer 5-19

Slotted ALOHA assumptions: v all frames same size v time divided into equal size slots (time to transmit 1 frame) v nodes start to transmit only slot beginning v nodes are synchronized v if 2 or more nodes transmit in slot, all nodes detect collision operation: v when node obtains fresh frame, transmits in next slot if no collision: node can send new frame in next slot if collision: node retransmits frame in each subsequent slot with prob. p until success Link Layer 5-20

Slotted ALOHA node 1 1 1 1 1 node 2 2 2 2 node 3 3 3 3 Pros: C E C S E C E S S v single active node can continuously transmit at full rate of channel v highly decentralized: only slots in nodes need to be in sync v simple Cons: v collisions, wasting slots v idle slots v nodes may be able to detect collision in less than time to transmit packet v clock synchronization Link Layer 5-21

Slotted ALOHA: efficiency efficiency: long-run fraction of successful slots (many nodes, all with many frames to send) v suppose: N nodes with many frames to send, each transmits in slot with probability p v prob that given node has success in a slot = p(1- p) N-1 v prob that any node has a success = Np(1-p) N-1 v max efficiency: find p* that maximizes Np(1-p) N-1 v for many nodes, take limit of Np*(1-p*) N-1 as N goes to infinity, gives: max efficiency = 1/e =.37 at best: channel used for useful transmissions 37% of time!! Link Layer 5-22

Pure (unslotted) ALOHA v unslotted Aloha: simpler, no synchronization v when frame first arrives transmit immediately v collision probability increases: frame sent at t 0 collides with other frames sent in [t 0-1,t 0 +1] Link Layer 5-23

Pure ALOHA efficiency P(success by given node) = P(node transmits). P(no other node transmits in [t 0-1,t 0 ]. P(no other node transmits in [t 0-1,t 0 ] = p. (1-p) N-1. (1-p) N-1 = p. (1-p) 2(N-1) choosing optimum p and then letting n = 1/(2e) =.18 even worse than slotted Aloha! Link Layer 5-24

CSMA (carrier sense multiple access) CSMA: listen before transmit: if channel sensed idle: transmit entire frame v if channel sensed busy, defer transmission v human analogy: don t interrupt others! Link Layer 5-25

CSMA collisions spatial layout of nodes v collisions can still occur: propagation delay means two nodes may not hear each other s transmission v collision: entire packet transmission time wasted distance & propagation delay play role in in determining collision probability Link Layer 5-26

CSMA/CD (collision detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time colliding transmissions aborted, reducing channel wastage v collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed by local transmission strength v human analogy: the polite conversationalist Link Layer 5-27

CSMA/CD (collision detection) spatial layout of nodes Link Layer 5-28