Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Similar documents
Chapter 5: Link layer

Chapter 5 Link Layer and LANs

CSC 401 Data and Computer Communications Networks

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

The Link Layer and LANs. Chapter 6: Link layer and LANs

CS 455/555 Intro to Networks and Communications. Link Layer

Link Layer and LANs. CMPS 4750/6750: Computer Networks

Data Link Layer: Multi Access Protocols

ECE 4450:427/527 - Computer Networks Spring 2017

CSC 4900 Computer Networks: The Link Layer

CC451 Computer Networks

Chapter 6 The Link Layer and LANs

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Multiple Access Links and Protocols

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

CMPE 150: Introduction to Computer Networks

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Chapter V: Link Layer

Module 10 Data Link Layer CS655! 10-1!

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Chapter 5 Link Layer and LANs

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSCD 330 Network Programming

Chapter 5 Link Layer and LANs

SC250 Computer Networking I. Link Layer. Prof. Matthias Grossglauser LCA/I&C.

Chapter 6: Link layer and LANs. Link layer, LANs: outline. Link layer: introduction. Link layer: context. Link layer services (more)

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Chapter 4 Network Layer

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

MULTIPLE ACCESS PROTOCOLS 2. 1

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097

CS 3516: Computer Networks

CSCD 330 Network Programming Fall 2012

Links. CS125 - mylinks 1 1/22/14

Chapter V: Link Layer

Medium Access Control

Link Layer and LANs. Our Goals. Link Layer

Goals of Today s Lecture. Adaptors Communicating

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5: DataLink Layer

Module 4 Data Link Layer CS655! 4-1!

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSCI Computer Networks Spring 2017

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

CSCI Computer Networks Fall 2016

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Data Link Layer: Overview, operations

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Redes de Computadores. Medium Access Control

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Chapter 6 The Link Layer and LANs

Principles behind data link layer services

EE 122: Ethernet and

Lecture 6 - Link layer. Lecture 5 Review. Link Layer. Introduction, Services. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Medium Access Control

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CSC 8560 Computer Networks: Link Layer

Chapter 6 The Link Layer and LANs

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Link Layer and Ethernet

Chapter 5 Link Layer. Link Layer 5-1

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Principles behind data link layer services:

Principles behind data link layer services:

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Link Layer and Ethernet

COMP211 Chapter 6/7 Link Layer

Physical and Data Link layers

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Chapter 6 The Link Layer and LANs

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Chapter 6 The Link Layer and LANs

Chapter 6 The Link Layer and LANs

Chapter 6 The Link Layer and LANs

COS 140: Foundations of Computer Science

Chapter 5: The Data Link Layer

Chapter 5 Link Layer and LANs

Multiple Access Links and Protocols

Computer Network. Chapter #1. Computer Network: A large number of separate but interconnected computers to share the resources. Goals.

Chapter 5: Link layer

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Transcription:

Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer Networking: A Top-Down Approach, 6 th edition, by Jim Kurose and Keith Ross, Pearson, 2013. 1

Internet protocol stack application: supporting network applications HTTP, SMTP, FTP, DNS transport: process-process data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements 802.11, Ethernett physical: bits on the wire Application Transport Network Link Physical 2

Link Layer: Introduction Some terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links LANs layer-2 packet is a frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to adjacent node over a link 3

Packet Names message message Application segment Trans.-layer header message Transport datagram IP-layer header Trans.-layer header message Network frame Link-layer header IP-layer header Trans.-layer header message Link Physical 4

Link Layer Services framing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to identify source, dest different from IP address! error detection: errors caused by signal attenuation, noise. receiver detects presence of errors: signals sender for retransmission or drops frame error correction: receiver identifies and corrects bit error(s) without resorting to retransmission 5

Adaptors Communicating datagram datagram controller controller sending host frame sending side: encapsulates datagram in frame adds error checking bits, and other link- layer headers, etc. datagram receiving host receiving side looks for errors, etc extracts datagram, passes to upper layer at receiving side 6

Where is the link layer in each and every host link layer implemented in adaptor (aka network interface card NIC) implemented? application transport host schematic Ethernet card, 802.11 network cpu memory link card implements link, physical layer controller attaches into host s system buses combination of hardware, software, firmware link physical physical transmission host bus (e.g., PCI) network adapter card 7

Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point to link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet upstream HFC 802.11 wireless LAN shared wire (e.g., shared RF cabled Ethernet) (e.g., 802.11 WiFi) shared RF (satellite) humans at a cocktail party (shared air, acoustical) 8

Multiple Access protocols single shared broadcast channel two or more simultaneous transmissions by nodes: interference collision if node receives two or more signals at the same time multiple access protocol distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit communication about channel sharing must use channel itself! no out-of-band channel for coordination i 9

Ideal Multiple Access Protocol Broadcast channel of rate R bps 1. when one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M 3. fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4. simple 10

Multiple Access Control (MAC) Protocols: a classification Three broad classes: Channel Partitioning divide channel into smaller pieces (time slots, frequency, code) Random Access channel not divided, allow collisions Taking turns nodes take turns, but nodes with more to send can take longer turns 11

Channel Partitioning MAC protocols: TDMA TDMA: time division multiple access access to channel in "rounds" each station gets fixed-length slot (length = packet transmission time) in each round unused slots go idle example: 6-station LAN, 1,3,4 have packet, slots 2,5,6, idle 6-slot frame 1 3 4 1 3 4 12

Channel Partitioning MAC protocols: FDMA FDMA: frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go idle example: 6-station LAN, 1,3,4 have packet, frequency bands 2,5,6 idle cy bands frequenc ffdm cable 13

Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes collision, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: Slotted ALOHA Pure ALOHA CSMA, CSMA/CD, CSMA/CA 14

The ALOHA Protocol Context: Norm Abramson, U. Hawaii Developed scheme to connect islands via satellite network 15

Slotted ALOHA Assumptions: Operation: all frames same size when node obtains fresh time divided into equal frame, transmits in next size slots (time to slot transmit 1 frame) if no collision: node can nodes start to transmit send new frame in next only at slot beginning slot nodes are synchronized if collision: node if 2 or more nodes retransmits frame in transmit in a slot, all each subsequent slot nodes detect collision with prob. p until success 16

Slotted ALOHA Pros Cons single active node can collisions, wasting slots continuously transmit idle slots at full rate of channel once collision happens, highly decentralized entire slot is wasted simple clock synchronization 17

Analysis of Collisions A collision i occurs when multiple l transmissions i overlap in time Throughput S: total number of successful frames per slot Offered load G: total number of frames transmitted per slot 18

Slotted ALOHA efficiency Efficiency : long-run fraction of successful slots (equivalent to throughput measured per slot) Suppose: N nodes with many frames to send, each transmits in a slot with probability p The average offered traffic is therefore G=Np in frames/slot Need to calculate the average amount of offered traffic that gets successfully received and this is known as throughput S in frames/slot Prob that a node is successful in a slot = p(1-p) N-1 Prob that any node is successful = Np(1-p) N-1 or G(1-G/N) G/N) N-1 and is the throughput h t S in frames/slot 19

Slotted ALOHA efficiency ot ames/slo Sfra G frames/slot 20

Slotted ALOHA efficiency At best: channel used for useful transmissions 37% of time! 21

Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately increase collision probability: frame sent at t 0 collides with other frames sent in [t 0-1,t 0 +1] 22

Pure Aloha efficiency even worse than slotted Aloha! 23

Throughput vs. Offered Load Throughput = G exp(-2g) Throughput S frames/ slot) Peak at G=0.5, the max. value is 1/2e 18% (0.18 successful packet per slot) Throughput S: number of successful frames per slot Offered load G: total number of frames transmitted per slot Offered load, G 24

Summary Link layer functions Link layer helps share a channel Many ways to share a channel Channel partitioning (FDMA, TDMA) Random access (ALOHA) Taking turns Simple analysis for ALOHA collisions and throughput Slotted ALOHA Pure ALOHA 25