Frames, Packets and Topologies

Similar documents
CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

The Link Layer and LANs. Chapter 6: Link layer and LANs

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CSE 461: Multiple Access Networks. This Lecture

ECE 4450:427/527 - Computer Networks Spring 2017

Data Link Layer -2- Network Access

CS 455/555 Intro to Networks and Communications. Link Layer

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Data Link Layer -2- Network Access

Data Link Layer: Collisions

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Data Link Layer Technologies

Link Layer and Ethernet

Protocols for Multiaccess Networks

Links. CS125 - mylinks 1 1/22/14

Link Layer and Ethernet

CSE/EE 461 Wireless and Contention-Free Protocols

2. LAN Topologies Gilbert Ndjatou Page 1

CS 3640: Introduction to Networks and Their Applications

Contention Protocols and Networks

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Chapter 16 Networking

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Introduction to LAN Protocols

Chapter 12 Multiple Access 12.1

Redes de Computadores. Medium Access Control

Chapter 5 Link Layer and LANs

Computer and Network Security

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 5 Link Layer and LANs

Data Link Layer (Sicherungsschicht) Medium Access Control (Zugriffsverfahren)

LAN PROTOCOLS. Beulah A AP/CSE

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Lecture 8 Link Layer: functionality, error detection, media access algorithm

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Access Technologies! Fabio Martignon

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Chapter V: Link Layer

CSE 461 Multiple Access. David Wetherall

ECE 333: Introduction to Communication Networks Fall 2001

Module 10 Data Link Layer CS655! 10-1!

Sharing Channels CS 118

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CS 640 Lecture 4: 09/11/2014

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

COMMUNICATION NETWORKS NETW 501

Medium Access Control in Wireless Sensor Networks

Medium Access Control

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

CHAPTER 2 - NETWORK DEVICES

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

1. Data Link Layer (Layer 2)

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Data Link Layer, Part 3 Medium Access Control. Preface

Local Area Networks (LANs) SMU CSE 5344 /

Data Link Layer: Overview, operations

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Extending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10

Chapter 5: DataLink Layer

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Chapter 6: Network Communications and Protocols

Physical and Data Link layers

Module 4 Data Link Layer CS655! 4-1!

Medium Access Control in Wireless Sensor Networks

Computer network questions for final exam preparation 21/08/2017

Data Link Layer, Part 5. Medium Access Control

Introduction to LAN Protocols

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CSE/EE 461 Section 2

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Summary of MAC protocols

Ethernet. Introduction. CSE 3213 Fall 2011

Chapter V: Link Layer

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Chapter 8 LAN Topologies

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Aloha and slotted aloha

Lecture 6: Example LAN: Ethernet

Rahman 1. Application

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Medium Access Protocols

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

The MAC layer in wireless networks

Transcription:

Frames, Packets and Topologies Info 341 Networking and Distributed Applications Frames and Packets 1

Motivating Packets What if a network required everything to be sent as a single chunk What happens when you download a really large file, like a DVD? Motivating Packets What if a network required everything to be sent as a single chunk What happens when you download a really large file, like a DVD? Does every one else just wait? What happens if someone just sends? What if there is an error in the middle of the transmission? 2

Outline Motivating Packets Sharing Packets Concept of the packet Handling special content Detecting transmission error Sharing the Network What are some ways we know of sharing a network? 3

Sharing the Network What are some ways we know of sharing a network? Multiplexing Frequency Division Multiplexing Time Division Multiplexing Packets are chunks of data What is a packet? Packets are binary data on a network Contents are often written in hexadecimal Packets facilitate sharing the network A form of time division multiplexing We ll use the term packet for as the most general way of describing data on a network. 4

Packets = payload + overhead Payload (the data) Overhead Destination address Source address Packet format/type Error detection Each device that communicates on a network needs a locally unique address Payloads Special content Some data values are special Special meaning, reserved Special non-printing ASCII characters soh, eot, esc How do you send special data? 5

Byte Stuffing Mechanism for transmitting special data Example Characters soh and eot have special meaning What if you want to send the soh character as part of payload? Byte Stuffing Example Suppose your message contained a special character c o n t a i n s s o h h e r e In hexadecimal 63 6F 6E 74 61 69 6E 73 20 73 6F 68 20 68 65 72 65 20 01 Byte stuffing ensures that the special character soh (01 in hex) is not in the data 63 6F 6E 74 61 69 6E 73 20 73 6F 68 20 68 65 72 65 20 1B 78 Sometimes known as an escape sequence 6

Byte Stuffing Example Special character replaced with a sequence Data Sent soh eot esc esc x esc y esc z After byte stuffing data is safe in any packet 01 63 6F 6E 74 61 69 6E 73 20 73 6F 68 20 68 65 72 65 20 1B 78 04 Envelope Packets within Packets Sometimes the data in a packet - is a packet Enveloping Network hardware packet The hardware defines what the native packet format - called a frame Outer most packet is always the hardware packet type 7

Network Toplogies Outline Locality of Reference Topology Physical structure Logical structure Topology Types Point to point Star Ring Bus 8

Locality of Reference An organizing principle for many phenomenon Consider client files in a physical file Locality of Reference An organizing principle for many phenomenon Consider client files in a physical file Two key types Physical locality of reference Temporal locality of reference 9

Topology Two views of network topology Physical topology The actual layout of the network How it is physically built Logical topology How data is organized and transported across the network. Topologies Point-to-Point Star Ring Bus 10

Point-to-Point Each computer has a direct connection to every other computer in the network Very robust Highly redundant How Many Connections? Rate of interconnection increases quickly Connections = (N 2 - N)/2 Location 1 Location 2 11

Point-to-Point For long distance networks, point-topoint is not efficient Maybe better to have one connection? Location 1 Location 2 Location 1 Location 2 Star Each computer has one connection to a central connector device A central point (hub/switch) receives the data and communicates it to the destination Small number of connections If central point fails, everything stops 12

Ring Each computer has two connections Connected in series, if one computer fails ring breaks Adding computers slows network Shared medium Ring Token Ring FDDI (Fiber Distributed Data Interface) Double-counter directional rings 13

Each computer needs one connection All computers receive the data Shared medium Bus Protocols for Shared Access Reservation Controlled Access Polling Token Passing ALOHA Multi-Access Protocols Random Access CSMA/CD CSMA/CA FDMA Channelization TDMA CDMA 14

Random Access Protocols ALOHA Early radio network protocol CSMA/CD Carrier Sense Multi-Access/ Collision Detection Ethernet CSMA/CA Carrier Sense Multi-Access/Collision Avoidance WiFi Key Features of CSMA/CD Carrier Sense CSMA/CD Detect if a packet is being sent if you only see the carrier, then no packet is currently being sent Collision Detection Listen when sending, if signal is different from what is sent, then collision Exponential Backoff When collision happens calculate a random time to wait before sending 15

CSMA/CA Key Features Collision Avoidance handles hidden node problem Computer 2 sees 1 and 3, but 1 is hidden from 3 because of signal attenuation Computer 3 Computer 1 Computer 2 CSMA/CA Key Features Computer 1 sends a request to send Computer 2 sends a clear to send signal Notifies Computer 1 *and* Computer 3 Computer 1 sends data Does not prevent a collision Computer 3 Computer 1 Computer 2 16

17