Housekeeping. Fall /5 CptS/EE 555 1

Similar documents
Overview. Performance metrics - Section 1.5 Direct link networks Hardware building blocks - Section 2.1 Encoding - Section 2.2 Framing - Section 2.

Point-to-Point Links. Outline Encoding Framing Error Detection Sliding Window Algorithm. Fall 2004 CS 691 1

Direct Link Networks. Nodes. Links. Outline Building Blocks Encoding

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Links. CS125 - mylinks 1 1/22/14

CS 640 Lecture 4: 09/11/2014

Direct Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems

Computer and Network Security

Problem Statement. Physical and Data Link Layer Overview. Five Tasks Encoding. Make two computers talk to each other

CSCI 466 Midterm Networks Fall 2011

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

L3: Building Direct Link Networks I. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

ECE 4450:427/527 - Computer Networks Spring 2017

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSCI 466 Midterm Networks Fall 2011

Direct Link Networks (II)

Direct Link Networks. Framing. Lecture - Encoding & Framing 1. Problems. Areas for Discussion

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reliable Transmission

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Data Link Layer Overview

Data Link Layer Overview

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Data Link Layer Overview

Data Link Layer Overview

CSCI-1680 Link Layer I Rodrigo Fonseca

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University

Chapter 2: Getting Connected

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

ECE 4450:427/527 - Computer Networks Spring 2017

CSE 461: Multiple Access Networks. This Lecture

Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3)

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Communication (III) Kai Huang

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Lecture 3: Modulation & Layering"

Link Layer (L2) Review

Ethernet. Introduction. CSE 3213 Fall 2011

Topics Today. Lecture 8: Physical and Link Layers. Protocol Layering. Physical layer: chips versus bits. Physical Layer (Layer 1) Protocol Layering

Switching and Forwarding - continued

Switching and Forwarding - continued

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Medium Access Control

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Goals of Today s Lecture. Adaptors Communicating

Link Layer and Ethernet

Link Layer and Ethernet

EE 122: Ethernet and

COMPUTER NETWORKS CS CS 55201

Data and Computer Communications

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Physical and Link Layers. CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham

ECE 653: Computer Networks Mid Term Exam all

Data Link Layer, Part 5. Medium Access Control

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

COMPUTER NETWORKS CS CS 55201

Medium Access Protocols

Packet? No. SenseCarrier. Discard packet attempts < 16. attempts == 16

CSE/EE 461 Section 2

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

CS 457 Networking and the Internet. Link Layer Protocols. Problems 8/31/16. Fall 2016 Indrajit Ray

Data Link Layer, Part 3 Medium Access Control. Preface

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

From Signals to Packets Computer Networking. Link Layer: Implementation. Datalink Functions. Lecture 5 - Coding and Error Control

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

From Signals to Packets Computer Networking. Link Layer: Implementation. Network Delay. 06-datalink.ppt, , Fall

Telematics. 5rd Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Computer Networking. Lecture 4 - Coding and Error Control

Computer Networks. Medium Access Sublayer (Part I)

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

COMP/ELEC 429/556 Introduction to Computer Networks

Medium Access Control

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

COS 140: Foundations of Computer Science

Direct Link Communication II: Wired Media. Multi-Access Communication

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Introduction to Computer Networks. IEEE Ethernet

Contention Protocols and Networks

Redes de Computadores. Medium Access Control

Summary of MAC protocols

Chapter 5 Link Layer and LANs

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

Code No: RR Set No. 1

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

EECS 122, Lecture 7. Kevin Fall Jean Walrand

Principles behind data link layer services

Multiple Access Protocols

LAN PROTOCOLS. Beulah A AP/CSE

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

Lecture 6 Datalink Framing, Switching. From Signals to Packets

Transcription:

Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section New HW assignment next time no programming Fall 2001 9/5 CptS/EE 555 1

Point-to-Point Links Outline Basic Performance Metrics Encoding Framing Error Detection Sliding Window Algorithm Fall 2001 9/5 CptS/EE 555 2

Basic Performance Metrics Bandwidth (throughput) data transmitted per time unit link versus end-to-end notation KB = 2 10 bytes Mbps = 10 6 bits per second Latency (delay) time to send message from point A to point B one-way versus round-trip time (RTT) components Latency = Propagation + Transmit + Queue Propagation = Distance / c*velocityfactor (Table 2.8) Transmit = Size / Bandwidth Fall 2001 9/5 CptS/EE 555 3

Bandwidth versus Latency Relative importance 1-byte: 1ms vs 100ms dominates 1Mbps vs 100Mbps 25MB: 1Mbps vs 100Mbps dominates 1ms vs 100ms Infinite bandwidth RTT dominates Throughput = TransferSize / TransferTime TransferTime = RTT + 1/Bandwidth x TransferSize 1-MB file to 1-Gbps link as 1-KB packet to 1-Mbps link Fall 2001 9/5 CptS/EE 555 4

Delay x Bandwidth Product Amount of data in flight or in the pipe Example: 100ms x 45Mbps = 560KB Why is the delay-bandwidth product important? Delay Bandwidth Fall 2001 9/5 CptS/EE 555 5

Things that go wrong Damaged packets electrical/optical errors Dropped packets congestion Duplicated packets Link and node failures Messages are delayed Messages are deliver out-of-order Third parties eavesdrop or inject traffic Fall 2001 9/5 CptS/EE 555 6

Encoding Signals propagate over a physical medium modulate electromagnetic waves e.g., vary voltage Encode binary data onto signals e.g., 0 as low signal and 1 as high signal known as Non-Return to zero (NRZ) Bits 0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0 NRZ Fall 2001 9/5 CptS/EE 555 7

Problem: Consecutive 1s or 0s Low signal (0) may be interpreted as no signal High signal (1) leads to baseline wander Unable to recover clock Fall 2001 9/5 CptS/EE 555 8

Alternative Encodings Non-return to Zero Inverted (NRZI) make a transition from current signal to encode a one; stay at current signal to encode a zero solves the problem of consecutive ones Manchester transmit XOR of the NRZ encoded data and the clock only 50% efficient. Fall 2001 9/5 CptS/EE 555 9

Encodings (cont) 4B/5B every 4 bits of data encoded in a 5-bit code 5-bit codes selected to have no more than one leading 0 and no more than two trailing 0s thus, never get more than three consecutive 0s resulting 5-bit codes are transmitted using NRZI achieves 80% efficiency Fall 2001 9/5 CptS/EE 555 10

Encodings (cont) Bits 0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0 NRZ Clock Manchester NRZI Fall 2001 9/5 CptS/EE 555 11

Framing Break sequence of bits into a frame Typically implemented by network adaptor Node A Bits Adaptor Adaptor Node B Frames Fall 2001 9/5 CptS/EE 555 12

Sentinel-based Approaches delineate frame with special pattern: 01111110 e.g., HDLC, SDLC, PPP 8 16 16 8 Beginning sequence Header problem: special pattern appears in the payload solution: bit stuffing/byte stuffing Body sender: insert 0 after five consecutive 1s receiver: delete 0 that follows five consecutive 1s finite state machine implementation CRC Ending sequence Fall 2001 9/5 CptS/EE 555 13

Approaches (cont) Counter-based include payload length in header e.g., DDCMP (Digital Data Communication Message Protocol) 8 8 8 14 42 16 SYN SYN Class problem: count field corrupted solution: catch when CRC fails Count Header Body CRC Fall 2001 9/5 CptS/EE 555 14

Approaches (cont) Clock-based each frame is 125us long e.g., SONET: Synchronous Optical Network STS-n (STS-1 = 51.84 Mbps) Overhead Payload Hdr STS-1 Hdr STS-1 Hdr STS-1 9 rows Hdr STS-3c 90 columns Fall 2001 9/5 CptS/EE 555 15

Ethernet Overview History developed by Xerox PARC in mid-1970s roots in Aloha packet-radio network standardized by Xerox, DEC, and Intel in 1978 similar to IEEE 802.3 standard CSMA/CD carrier sense multiple access collision detection Frame Format 64 48 48 16 32 Preamble Dest addr Src addr Type Body CRC Fall 2001 9/5 CptS/EE 555 16

Addresses Ethernet (cont) unique, 48-bit unicast address assigned to each adapter example: 8:0:e4:b1:2 broadcast: all 1s multicast: first bit is 1 Bandwidth: 10Mbps, 100Mbps, 1Gbps Length: 2500m (500m segments with 4 repeaters) Problem: Distributed algorithm that provides fair access Fall 2001 9/5 CptS/EE 555 17

Transmit Algorithm If line is idle send immediately upper bound message size of 1500 bytes must wait 9.6us between back-to-back frames If line is busy wait until idle and transmit immediately called 1-persistent (special case of p-persistent) Fall 2001 9/5 CptS/EE 555 18

Algorithm (cont) If collision jam for 32 bits, then stop transmitting frame minimum frame is 64 bytes (header + 46 bytes of data) delay and try again 1st time: 0 or 51.2us 2nd time: 0, 51.2, or 102.4us 3rd time51.2, 102.4, or 153.6us nth time: k x 51.2us, for randomly selected k=0..2 n -1 give up after several tries (usually 16) exponential backoff Fall 2001 9/5 CptS/EE 555 19

Collisions A B A B A B A B Fall 2001 9/5 CptS/EE 555 20

Review Physical layer and link layer Performance concepts extend to multi-hop networks Encoding primarily physical layer Framing varies PPP it is a link layer issue, ethernet it is a physical layer issue Fall 2001 9/5 CptS/EE 555 21