Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Similar documents
Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

The Link Layer and LANs. Chapter 6: Link layer and LANs

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Chapter 5: Link layer

Chapter 5 Link Layer and LANs

CS 455/555 Intro to Networks and Communications. Link Layer

CSC 4900 Computer Networks: The Link Layer

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Data Link Layer: Multi Access Protocols

ECE 4450:427/527 - Computer Networks Spring 2017

CSC 401 Data and Computer Communications Networks

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer and LANs

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Link Layer: Overview, operations

Links. CS125 - mylinks 1 1/22/14

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Chapter V: Link Layer

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CC451 Computer Networks

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Multiple Access Links and Protocols

EE 122: Ethernet and

Chapter V: Link Layer

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

CMPE 150: Introduction to Computer Networks

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

Chapter 4 Network Layer

MULTIPLE ACCESS PROTOCOLS 2. 1

SC250 Computer Networking I. Link Layer. Prof. Matthias Grossglauser LCA/I&C.

Chapter 5 part 1 LINK LAYER

Link Layer and LANs. Our Goals. Link Layer

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Chapter 5: The Data Link Layer

Link Layer and Ethernet

Goals of Today s Lecture. Adaptors Communicating

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Module 10 Data Link Layer CS655! 10-1!

CS 3516: Computer Networks

Link Layer and LANs. CMPS 4750/6750: Computer Networks

Link Layer and Ethernet

CSCD 330 Network Programming

Chapter 6 The Link Layer and LANs

Lecture 6 - Link layer. Lecture 5 Review. Link Layer. Introduction, Services. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CSCD 330 Network Programming Fall 2012

Master Course Computer Networks IN2097

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Chapter 6: Link layer and LANs. Link layer, LANs: outline. Link layer: introduction. Link layer: context. Link layer services (more)

Chapter 5: DataLink Layer

Chapter 6 The Data Link layer

Master Course Computer Networks IN2097

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CSC 8560 Computer Networks: Link Layer

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Module 4 Data Link Layer CS655! 4-1!

Medium Access Control

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Random Assignment Protocols

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Chapter 6 The Data Link layer

Redes de Computadores. Medium Access Control

Chapter 5 Link Layer. Link Layer 5-1

Chapter 6 The Link Layer and LANs

Local Area Networks (LANs) SMU CSE 5344 /

Links. COS 461: Computer Networks Spring Mike Freedman h?p://

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Principles behind data link layer services

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

The MAC Address Format

CSE 461: Multiple Access Networks. This Lecture

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CS 3640: Introduction to Networks and Their Applications

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Computer Networks Principles LAN - Ethernet

Chapter 6 Medium Access Control Protocols and Local Area Networks

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Chapter 5 Link Layer and LANs

Data Link Layer Overview

Internet protocol stack

Links Reading: Chapter 2

COMP211 Chapter 6/7 Link Layer

Transcription:

Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Link Layer: setting the context two physically connected devices: host-router, router-router, host-host unit of data: frame

Link Layer Functions Framing, link access: encapsulate datagram into frame, adding header, trailer physical addresses used in frame headers to identify source and destination Medium access control: implement channel access if shared medium, Reliable delivery between two physically connected devices: errors caused by signal attenuation, noise Error Detection / Error Correction

Link Layer Implementation implemented in adapter e.g., PCMCIA card, Ethernet card typically includes: RAM, DSP chips, host bus interface, and link interface Hl Ht HnHt HnHt M M M M application transport network link physical data link protocol phys. link network link physical Hl HnHt frame M adapter card

Error Detection EDC = Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields Error detection not 100% reliable! protocol may miss some errors, but rarely larger EDC field yields better detection and correction

Parity Checking Single Bit Parity: Detect single bit errors Two Dimensional Bit Parity: Detect and correct single bit errors 0 0

Checksumming: Cyclic Redundancy Check view data bits, D, as a binary number choose r+1 bit pattern (generator), G goal: choose r CRC bits, R, such that <D,R> exactly divisible by G (modulo 2) receiver knows G, divides <D,R> by G. If non-zero remainder: error detected! can detect all burst errors less than r+1 bits widely used in practice (ATM, HDCL) R = remainder[ ] D. 2r G

Multiple Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.) switched (e.g., switched Ethernet, ATM etc)

Random access single shared communication channel two or more simultaneous transmissions by nodes interference only one node can send successfully at a time multiple access protocol: distributed algorithm that determines how stations share channel, i.e., determine when station can transmit communication about channel sharing must use channel itself! an be synchronous or asynchronous

MAC Protocols: a taxonomy Three broad classes: Channel Partitioning divide channel into smaller pieces (time slots, frequency) allocate piece to node for exclusive use Random Access Try to transmit when packets to send Collisions and re-transmissions Taking turns tightly coordinate shared access to avoid collisions Goal: efficient, fair, simple, decentralized

Random Access protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more trasnmitting nodes -> collision, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: slotted ALOHA ALOHA CSMA and CSMA/CD

Slotted Aloha Time is divided into equal size slots (= pkt trans. time) Packets of fixed length Node with new arriving pkt: transmit at beginning of next slot If collision: retransmit pkt in future slots with probability p, until successful. Success (S), Collision (C), Empty (E) slots

Slotted Aloha efficiency What is max fraction slots successful? Suppose N stations have packets to send each transmits in slot with probability p prob. successful transmission S is: by single node: S= p (1-p) (N-1) by any of N nodes: S = N p (1-p) (N-1) choosing optimum p as n -> infinity... = 1/e =.37 as N -> infinity At best: channel use for useful transmissions 37% of time!

Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization pkt needs transmission: send without awaiting for beginning of slot collision probability increases: pkt sent at t 0 collide with other pkts sent in [t 0-1, t 0 +1] S = 1/2e =.18 as N -> infinity

CSMA: Carrier Sense Multiple Access The functioning principle is to listen before transmit: if channel is idle: transmit entire pkt if channel is busy, defer transmission Persistent CSMA: retry immediately with probability p when channel becomes idle (may cause instability) Non-persistent CSMA: retry after random interval human analogy: don t interrupt others!

collisions can occur: propagation delay means two nodes may not year hear each other s transmission Collisions depend on the physical distance among nodes (the propagation delay) CSMA collisions spatial layout of nodes along ethernet

CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time (sensing when transmitting) colliding transmissions aborted, reducing channel wastage collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: receiver shut off while transmitting human analogy: the polite conversationalist

CSMA/CD collision detection