Link Layer and Ethernet

Similar documents
Link Layer and Ethernet

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 5 Link Layer and LANs

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Module 10 Data Link Layer CS655! 10-1!

EE 122: Ethernet and

Principles behind data link layer services:

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Principles behind data link layer services

Master Course Computer Networks IN2097

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Chapter 5 Link Layer and LANs

Summary of MAC protocols

Chapter 5 Link Layer and LANs

Chapter V: Link Layer

The Link Layer and LANs. Chapter 6: Link layer and LANs

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Principles behind data link layer services:

Principles behind data link layer services:

Module 4 Data Link Layer CS655! 4-1!

Data Link Layer: Multi Access Protocols

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

CSC 4900 Computer Networks: The Link Layer

Link Layer and LANs. Our Goals. Link Layer

CSMA/CD (Collision Detection)

CS 455/555 Intro to Networks and Communications. Link Layer

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Chapter 5: Link layer

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Medium Access Control

Chapter V: Link Layer

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter 5: DataLink Layer

Master Course Computer Networks IN2097

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Medium Access Protocols

Chapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.

The Link Layer II: Ethernet

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Chapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 6: Link layer and LANs. Link layer, LANs: outline. Link layer: introduction. Link layer: context. Link layer services (more)

CC451 Computer Networks

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

CSC 4900 Computer Networks: Link Layer (2)

Links. CS125 - mylinks 1 1/22/14

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Computer Networks Principles LAN - Ethernet

CSCI Computer Networks Spring 2017

CSCI Computer Networks Fall 2016

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSCD 330 Network Programming

ECE 4450:427/527 - Computer Networks Spring 2017

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Data Link Layer, Part 5. Medium Access Control

Chapter 6 The Link Layer and LANs

Data Link Layer, Part 3 Medium Access Control. Preface

Lecture 4b. Local Area Networks and Bridges

The Link Layer and LANs: Ethernet and Swiches

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Chapter 5 Data Link Layer

Chapter 6 The Data Link layer

Chapter 5: The Data Link Layer

ECE 158A: Lecture 13. Fall 2015

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSCD 330 Network Programming Fall 2012

CSC 8560 Computer Networks: Link Layer

Data and Computer Communications. Chapter 11 Local Area Network

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Data Link Layer -2- Network Access

Redes de Computadores. Medium Access Control

LAN PROTOCOLS. Beulah A AP/CSE

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CSE 461: Multiple Access Networks. This Lecture

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Chapter 5 Data Link Layer

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Data Link Layer -2- Network Access

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Protocols for Multiaccess Networks

Multiple Access Links and Protocols

Transcription:

Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross

traceroute Data Link Layer Multiple (Media / Medium) Access Protocols Ethernet 2

Data Link Layer Mission The Data Link Layer transfers frames from one node, over a link, to an adjacent node i.e. service provided to network layer Service received from physical layer is the ability to move a bit across the link 3

Data Link Layer Link layer data is called a frame and will encapsulate a network layer datagram Link: Communication channel that connects adjacent nodes (host or router) Point-to-Point Broadcast Router has multiple link layers (one per interface) Each link is a subnet Local ISP Regional ISP Company Network

Context A packet is transferred by different link protocols over different links e.g., Ethernet on first link, frame relay on intermediate links, 802.11 on last link Each data link protocol provides different services e.g., may or may not provide reliable data transfer over link Local ISP Regional ISP Company Network

Link Layer Services Framing: encapsulate datagram into frame, adding header, trailer identify source, destination with addresses Different from IP addresses!! Link access: use medium access control (MAC) protocol Point-to-point channels: this is trivial Broadcast channels: more interesting 6

Link Layer Services (2) Error Detection: errors caused by signal attenuation, noise, crosstalk, etc if receiver detects errors, signals for retransmission or drops frame Error Correction: receiver identifies and corrects bit error(s) without resorting to retransmission 7

Link Layer Services (3) Reliable Delivery: between adjacent nodes similar to Reliable Data Transport seldom used on low bit-error links (fiber, twisted pair) critical for wireless links high error rates 8

MTU Remember Max Transmission Unit? A value derived from the technology of the data-link layer The largest number of bytes carried in the payload of a frame Does not include the link-layer header or trailer 9

Various Link Layers FDDI: Fiber Distributed Data Interface Frame size: up to 4514 bytes Frame Relay Frame size: 46 to 4470 bytes ATM: Asynchronous Transfer Mode Frame size: always 53 bytes 10

traceroute Data Link Layer Multiple (Media / Medium) Access Protocols Ethernet 11

Two Types of Links Point-to-point (sender to receiver) point-to-point link between Ethernet switch and host Point-to-Point Protocol (PPP) used to negotiate, establish, authenticate, etc Broadcast (shared wire or medium) traditional Ethernet 802.11 wireless LAN 12

Medium Access Control Protocols For a single shared broadcast channel Simultaneous transmissions by 2 or more nodes interference collision if node receives two or more signals at the same time Multiple access protocol: a distributed algorithm that determines how nodes share channel communication about channel sharing must use channel itself! 13

MAC Protocols: A Taxonomy Channel Partitioning Taking Turns Random Access 14

Channel Partitioning Divide the channel into pieces time slots, frequency, or code Let each node use a piece of the channel Each node gets R/N bps, where R is channel throughput, N is # of nodes BUT: If < N nodes want to send, they still only get R/N bps 15

Taking Turns Taking Turns Like a time slot partition scheme... but, nodes with more to send can take longer turns Polling Protocol Master node asks each node in turn to send Examples: 802.15 and Bluetooth Token-passing Special-purpose frame is passed in fixed order from node to node (pattern repeats indefinitely) Only the node with the token may send Examples: FDDI and 802.5 (token-ring) 16

Random Access Transmitting node always sends at R bps Multiple nodes can send simultaneously Collision Collisions can be avoided or detected Avoided: Wireless, LocalTalk Detected: CSMA/CD Protocols 17

CSMA / CD Carrier Sense: Listen before talking Multiple Access: Broadcast Medium Collision Detection: Listen as you talk. If you hear someone else, be quiet Ethernet is the most famous example 18

CSMA / CD Overview Before transmitting, listen If channel is sensed idle, send the frame Else, defer transmission a random time If collision is detected, abort transmission reduces channel wastage 19

Collision Detection Easy in wired LANs Measure signal strengths, compare the transmitted and received signals Difficult in wireless LANs Receiver is shut off during transmission Hidden terminal problem You may not hear transmission from someone out of your range, but others will 20

Capturing a Channel Transmission is vulnerable for 1 propagation delay collision could occur If no other station initiates transmission during this period, sender has captured the channel No other node will initiate send Node transmits at t=0 Node captures channel at t=tprop

Space-Time Diagrams Illustrate propagation delay of message through the channel Message transmission time Time Space

Multiple Transmitters Time Signals mix, collision detected!

Detecting Collisions Time Min transmission time must be long enough for collisions to propagate

traceroute Data Link Layer Multiple (Media / Medium) Access Protocols Ethernet 25

History Developed at Xerox PARC, 1974-5ish By Robert Metcalfe, David Boggs, Chuck Thacker and Butler Lampson Metcalfe founded 3Com and popularized Quickly became the dominant LAN technology Standardized as IEEE 802.3 Originally 3Mbps, now up to 100Gbps 400Gbps expected 2017 26

Ethernet Services Connectionless No handshaking Unreliable Damaged frames are discarded No ACK or NACK generated by receiver In-order delivery 27

Topology Bus Topology: shared cable 28

Topology (2) Star Topology!!!!!! High-Speed backplane or interconnection fabric!!!! 29

Ethernet Frame Preamble Dest Addr Source Addr Data CRC Type Preamble: 8 bytes 7 bytes with pattern 10101010 followed by one byte with pattern 10101011 used to synchronize receiver, sender clock rates 30

Ethernet Frame Preamble Dest Addr Source Addr Data CRC Type Dest, Source Addresses: 6 bytes each Flat address space, globally unique 3 bytes indicate adapter manufacturer 3 bytes generated uniquely Watch out: Can be changed/spoofed Broadcast address exists 31

Ethernet Frame Preamble Dest Addr Source Addr Data CRC Type Type: 2 bytes Indicates the network-layer protocol Mostly IP, ARP Others include Novell IXP, AppleTalk 32

Ethernet Frame Preamble Dest Addr Source Addr Data CRC Type Data: 46-1500 bytes Encapsulated datagram Short datagrams padded to 46 bytes IP receiver discards based on datagram length field in IP header 33

Ethernet Frame Preamble Dest Addr Source Addr Data CRC Type CRC: 4 bytes Error Checking Receiver will check simply discard frame on error 34

Ethernet Frame Preamble Dest Addr Source Addr Data CRC Type Total Frame Min size: 64 bytes + preamble = 72 bytes Long enough to guarantee collision detection in max length cable (100m) Max size: 1518 bytes + preamble Short enough to minimize wait times, receiver buffer requirements 35

Tx Algorithm 1. Ethernet adapter receives datagram from network-layer and builds frame Source address is MAC of sending adapter Destination address chosen based on IP address Address Resolution Protocol (ARP) Generates CRC often via H/W as frame is sent 36

Alg: Carrier Sense 2.Adapter listens for 96 bit times of idle channel Bit time is.1usec for 10Mbps Ethernet Variants exist for 1Mbps - 10Gbps If channel is idle, then transmit the frame If not idle, wait for it to be idle for 96 bit times 37

Alg: Collision Detection 3.While transmitting, listen and compare to sending values If no difference, great If collision, abort and send jam signal 48 bit times long Inform other transmitters of collision 38

Alg: Exponential Backoff 4. If collision happens, wait a random time before attempting transmission again For n th collision in a row, m=min{n,10} choose random value K from {0..2 m -1} {0,1} then {0,1,2,3}... {0..1023} wait 512 K bit times before going back to step number 2 (carrier sense) After 16 collisions, give up 39

Question #1 For 10Mbps Ethernet, what is the maximum wait time after a collision? 40

Question #2 A and B are on a 10 Mbps segment. What is the max separation to still guarantee collision detection? 41

Min Length Frame Jam Signal

Question #3 At t=0, A and B (who are separated by 200 bit times) each try to transmit a frame with 1500 bytes of data. A collision occurs, after which Ka = 0 and Kb = 1. At what time will B start retransmitting the frame? 43

Answer Time Event at A Event at B t = 0 Start sending Start Sending t = 200 B s message arrives, collision A s message arrives, collision t = 201 Send Jam signal Send Jam signal t = 248 Stop sending Jam Stop sending Jam wait 0 *512 bit times wait 1 * 512 bit times (until 760) t = 249 Still hearing B s message Still hearing A s message t = 400 Stop hearing B s message Stop hearing A s message t = 401 Start hearing B s Jam Start hearing A s Jam t = 448 Stop hearing B s Jam Stop hearing A s Jam t = 449 Listen for 96 bit times t = 545 Start sending t = 745 Start hearing A s Message

Answer Time Event at A Event at B t = 760 stop waiting Channel not idle t = 12753 Frame sent has 1518+preamble = 1526 bytes = 12208 bits. Message has now been transmitted t = 12953 Stop hearing A s message Still listening for idle channel t = 13049 Channel has been idle for 96 bit times Start Sending

Lesson Objectives Now, you should be able to: describe the mission, scope, addressing mechanism, data types and services / responsibilities of the Data Link Layer describe the differences between broadcast and point-to-point links describe three different general types of media access protocols 46

You should be able to: describe the CSMA/CD protocol, including the details of Ethernet's implementation use space-time diagrams to describe or solve problems relating to media access, including details of Ethernet's implementation describe the Ethernet frame format solve problems involving interaction of several Ethernet senders and receivers, collisions, propagation times, and the details of Ethernet's CSMA/CD algorithm