CS 3516: Computer Networks

Similar documents
CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 5 Link Layer and LANs

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

The Link Layer and LANs. Chapter 6: Link layer and LANs

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Data Link Layer: Multi Access Protocols

CS 455/555 Intro to Networks and Communications. Link Layer

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Chapter 5: Link layer

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

CSC 4900 Computer Networks: The Link Layer

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Chapter 5 Link Layer and LANs

CS 3516: Computer Networks

CC451 Computer Networks

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Multiple Access Links and Protocols

CMPE 150: Introduction to Computer Networks

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

CSC 401 Data and Computer Communications Networks

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Data Link Layer: Overview, operations

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

MULTIPLE ACCESS PROTOCOLS 2. 1

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Chapter 6 The Link Layer and LANs

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Module 10 Data Link Layer CS655! 10-1!

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CS 3516: Advanced Computer Networks

Redes de Computadores. Medium Access Control

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter V: Link Layer

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Medium Access Control

Links. CS125 - mylinks 1 1/22/14

Chapter 5 Link Layer and LANs

CSCD 330 Network Programming

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Link Layer and LANs. CMPS 4750/6750: Computer Networks

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Master Course Computer Networks IN2097

EE 122: Ethernet and

Link Layer and Ethernet

Link Layer and Ethernet

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Link Layer and LANs. Our Goals. Link Layer

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CSCD 330 Network Programming Fall 2012

CS 3516: Advanced Computer Networks

Chapter 6: Link layer and LANs. Link layer, LANs: outline. Link layer: introduction. Link layer: context. Link layer services (more)

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Goals of Today s Lecture. Adaptors Communicating

Chapter 4 Network Layer

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Multiple Access Protocols

Module 4 Data Link Layer CS655! 4-1!

SC250 Computer Networking I. Link Layer. Prof. Matthias Grossglauser LCA/I&C.

The Link Layer II: Ethernet

Chapter 5: DataLink Layer

Master Course Computer Networks IN2097

CS 3516: Computer Networks

CS 3516: Computer Networks

Chapter V: Link Layer

CS 3516: Advanced Computer Networks

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CS 3516: Computer Networks

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Data Link Layer, Part 5. Medium Access Control

CMPE 257: Wireless and Mobile Networking

Ethernet. Introduction. CSE 3213 Fall 2011

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CSCI Computer Networks Fall 2016

CSE 461: Multiple Access Networks. This Lecture

CMPE 257: Wireless and Mobile Networking

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CS 3516: Advanced Computer Networks

CSMA/CD (Collision Detection)

Data Link Layer, Part 3 Medium Access Control. Preface

Medium Access Control

CSCI Computer Networks Spring 2017

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

CSE 461 Multiple Access. David Wetherall

Contention Protocols and Networks

CS 3516: Advanced Computer Networks

CS 3516: Computer Networks

Transcription:

Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer Networking: A Top Down Approach, 7th edition, by Jim Kurose, Keith Ross, Addison-Wesley March 2016. Copyright 1996-2017 J.F Kurose and K.W. Ross, All Rights Resered.

Updates 1. Quiz 8: Grading by Monday 10/8. 2. Quiz 9: Grading by Tue 10/9. 3. Lab 3: Grading by Wed 10/10. Link Layer 5-2

Last week calendar Mondays Tuesdays Wednesdays Thursdays Fridays 9-9:50am 10-10:30am 10:30am- 11:30am Lecture AK219 Prof. Li, AK130 Prof. Li, AK130 Final Reiew AK219 Prof. Li, AK130 TA: Menghai 9:30AM- 11:30AM Final Exam Prof. Li, AK130 1-3pm TA: Marissa TA: Sanket TA: Marissa TA:Sanket Project 3 & Lab 3 due Office hours for all questions, e.g., project/lab assignment related questions, like programming Office hours for lecture related questions, and general questions for labs and projects.

Link layer, LANs: outline 6.1 introduction, serices 6.2 error detection, correction 6.3 multiple access protocols 6.4 LANs addressing, ARP Ethernet Link Layer 5-4

Ethernet LAN A C B 6 5 1 2 4 3 B C A switch with six interfaces (1,2,3,4,5,6) Link Layer 5-5

Multiple access links, protocols two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch, host, Phone lines broadcast (shared wire or medium) old-fashioned Ethernet 802.11 wireless LAN shared wire (e.g., cabled Ethernet) shared RF (e.g., 802.11 WiFi) shared RF (Radio Frequency) (satellite) PPP: Point-to-Point Protocol Link Layer 5-6

Multiple access protocols (MAP) single shared broadcast channel two or more simultaneous transmissions by nodes: interference collision if node receies two or more signals at the same time multiple access protocol distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit Link Layer 5-7

An ideal multiple access protocol gien: broadcast channel of rate R bps Desired functions: 1. when one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at aerage rate R/M (fairness). 3. fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4. simple shared RF (e.g., 802.11 WiFi) Link Layer 5-8

MAC protocols: taxonomy three broad classes: channel partitioning diide channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusie use random access channel not diided, allow collisions recoer from collisions taking turns nodes take turns, but nodes with more to send can take longer turns Link Layer 5-9

Channel partitioning MAC protocols: TDMA TDMA: time diision multiple access access to channel in "rounds" each station gets fixed length slot (length = pkt trans time) in each round unused slots go idle example: 6-station LAN, 1,3,4 hae pkt, slots 2,5,6 idle 6-slot frame 6-slot frame 1 3 4 1 3 4 Pros: no collision Cons: idle slots, if only one node, it cannot transmit with R bps Link Layer 5-10

Random access protocols when node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes collision, random access MAC protocol specifies: how to detect collisions how to recoer from collisions (e.g., ia delayed retransmissions) examples of random access MAC protocols: slotted ALOHA CSMA CSMA/CD, Link Layer 5-11

Slotted ALOHA node 1 1 1 1 1 node 2 2 2 2 node 3 3 3 3 Pros: C E C S E C E S S single actie node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons: collisions, wasting slots idle slots clock synchronization Link Layer 5-12

CSMA (carrier sense multiple access) CSMA: listen before transmit: if channel sensed idle: transmit entire frame if channel sensed busy, defer transmission human analogy: don t interrupt others! Link Layer 5-13

CSMA collisions spatial layout of nodes collisions can still occur: propagation delay means two nodes may not hear each other s transmission collision: entire packet transmission time wasted distance & propagation delay play role in determining collision probability B D Link Layer 5-14

CSMA/CD (collision detection) spatial layout of nodes Link Layer 5-15

Ethernet CSMA/CD algorithm 1. NIC receies datagram from network layer, creates frame 2. If NIC senses channel idle, starts frame transmission. If NIC senses channel busy, waits until channel idle, then transmits. 3. If NIC transmits entire frame without detecting another transmission, NIC is done with frame! NIC: Network Interface Card 4. If NIC detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, NIC enters binary (exponential) backoff: after mth collision, NIC chooses K at random from {0,1,2,, 2 m -1}. NIC waits K 512 bit times, returns to Step 2 longer backoff interal with more collisions Link Layer 5-16

Taking turns MAC protocols channel partitioning MAC protocols: high load share channel efficiently and fairly at high load inefficient at low load: delay in channel access. random access MAC protocols: low load efficient at low load: single node can fully utilize channel high load: collision oerhead taking turns protocols look for best of both worlds! Link Layer 5-17

Taking turns MAC protocols token passing: control token passed from one node to next sequentially. token message concerns: token oerhead latency single point of failure (token) (nothing to send) T T data Link Layer 5-18

Summary of MAC protocols channel partitioning, by time, frequency or code Time Diision, Frequency Diision random access (dynamic), S-ALOHA, CSMA, CSMA/CD taking turns polling from central site, token passing Bluetooth, token ring Link Layer 5-19

Chapter 6: let s take a breath journey down protocol stack complete (except PHY) solid understanding of networking principles, practice.. could stop here. but lots of interesting topics! wireless multimedia security network management Link Layer 5-20

Questions? Network Layer 4-21