Data-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols

Similar documents
Point-to-Point Protocol (PPP)

Ethernet Switches Bridges on Steroids. Ethernet Switches. IEEE Wireless LAN. Ad Hoc Networks

POINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Chapter 3. The Data Link Layer

Computer Networks Principles

Hubs, Bridges, and Switches (oh my) Hubs

Chapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.

Lecture 1.1: Point to Point Protocol (PPP) An introduction

Principles behind data link layer services:

Data Link Protocols. TCP/IP Suite and OSI Reference Model

AirNet (PPTP) on linux. Overview Requirements MPPE Security Installation Configuration Getting it going Examples Resources (links)

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Data Link Layer, Part 4. Exemplary Protocols

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Advanced Computer Networks

Chapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.

Time Division Multiplexing (TDM) Demarcation Point Serial and parallel ports HDLC Encapsulation PPP

Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2

Ethernet Switches (more)

Point-to-Point Protocol (PPP)

Principles behind data link layer services

Chapter 5 part 2 LINK LAYER. Computer Networks Timothy Roscoe Summer Networks & Operating Systems Computer Networks

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Other Protocols. Arash Habibi Lashkari

Teldat Router. PPP Interface

Configuring the Cisco 827 Router as a PPPoE Client With NAT

Ethereal Exercise 2 (Part A): Link Control Protocol

Principles behind data link layer services:

Principles behind data link layer services:

How to use the SIM7100 Module in Linux

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

Introduction to Computer Networks. 03 Data Link Layer Introduction

CSC 401 Data and Computer Communications Networks

Chapter 5 Link Layer and LANs

Module 4 Data Link Layer CS655! 4-1!

Chapter 6 The Link Layer and LANs

Data Link layer (CN chap 3.1, 3.4, 3.6)

Chapter 5 Data-Link Layer: Wired Networks

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

Flow control: Ensuring the source sending frames does not overflow the receiver

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Physical and Data Link layers

Lecture 20: Link Layer

Internet 최양희서울대학교컴퓨터공학부. MMlab 1

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

CSE 461: Framing, Error Detection and Correction

Data Link Layer Overview

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

Computer Networks Principles LAN - Ethernet

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Links. CS125 - mylinks 1 1/22/14

Link Layer and Ethernet

Hubs. Interconnecting LANs. Q: Why not just one big LAN?

Data Link Layer Overview

Link Layer and Ethernet

Review. Some slides are in courtesy of J. Kurose and K. Ross

Networking interview questions

Lecture 5: Data Link Layer Basics

CS 455/555 Intro to Networks and Communications. Link Layer

Data Link Layer Overview

Data Link Layer Overview

Troubleshooting Guide for Skywire Modems

Physical and Data Link layers

Chapter 10 Security Protocols of the Data Link Layer

Chapter 5: Link layer

QUESTION BANK EVEN SEMESTER

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Chapter 3. The Data Link Layer

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination

Chapter 5 Link Layer and LANs

PPPoE Technology White Paper

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L4 Data link (part 1)

PART III. Data Link Layer MGH T MGH C I 204

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Ethereal Exercise 2 (Part B): Link Control Protocol

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSC 4900 Computer Networks: The Link Layer

Chapter 4: Network Access. Introduction to Networks v5.1

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees

This document describes how to configure an Layer 2 Tunneling Protocol (L2TP) Tunnel between a windows machine and a Cisco router.

Computer Networking. Introduction. Course goals. Networking lab. Contents. Course support. Overview. Prof. Andrzej Duda

Configuring the Cisco Router and VPN Clients Using PPTP and MPPE

Physical and Data Link layers. Youki Kadobayashi Graduate School of Information Science Nara Institute of Science and Technology

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CS422 Computer Networks

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

3. Data Link Layer 3-2

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Cisco recommends that you have knowledge of End-to-End Layer 1 connectivity is User Priority (UP).

Computer Networking. Introduction. Quintin jean-noël Grenoble university

The Data Link Layer Chapter 3

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Debugging a Virtual Access Service Managed Gateway

Using an ADTRAN Terminal Adapter with Cisco Routers

15 WAN Introduction CERTIFICATION OBJECTIVES Q&A Wide Area Networking Overview HDLCp PPP. Two-Minute Drill Self Test

Chapter 5 part 1 LINK LAYER

Transcription:

Computer Networking Data-link layer Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr Data Link Layer Our goals: Understand principles behind link layer services: sharing a broadcast channel: multiple access link layer ing LAN interconnection Instantiation and implementation of various link layer technologies Overview: Link layer services Point-to-point PPP Later on: LANs: Ethernet 802. link layer ing, ARP LAN interconnection hubs, bridges, switches 2 Link Layer: setting the context Link Layer: setting the context two physically connected devices: host-router, router-router, host-host unit of : frame (trame) a gram may be handled by different link-layer s, offering different services, on the different links in the path transferring a gram across an individual link H t H n H t Hl HnHt application transport network link physical link phys. link network link physical Hl Hn Ht frame 3 adapter card 4 Link Layer Services Framing, link access: encapsulate gram into frame, adding header, trailer implement channel access if shared medium, physical es used in frame headers to identify source, dest different from IP! Reliable delivery between two physically connected devices: we learned how to do this already (cf. Transport Layer) seldom used on low bit error link (fiber, some twisted pair) wireless links: high error rates link-level reliability to avoid end-end retransmission Link Layer Services (more) Flow Control pacing between sender and receivers Error Detection errors caused by signal attenuation, noise. receiver detects presence of errors: signals sender for retransmission or drops frame Error Correction receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex 5 6

Generating polynomials CCITT g(x) = x 6 + x 2 + x 5 + detectes all simple errors, doubles, odd number of errors, bursts of 6 and less, 99.997% of 7, 99.998% of 8 or more g(x) = x 6 + x 5 + x 2 + Ethernet g(x) = x 32 + x 26 + x 23 + x 22 + x 6 + x 2 + x + x 0 + x 8 + x 7 + x 5 + x 4 + x 2 + x + Examples of s - Cyclic Redundancy Check X.25 - LAPB, PPP, IEEE 802 LLC 8 bits Ethernet dest 8 bits source type variable 6 bits 6 bytes 6 bytes 2 bytes 46-500 bytes 4 bytes 7 8 Error detection in TCP/IP Example Checksum TCP/IP sum of 6 bit words with carry in 's complement carry is added 's complement Characteristics detects all simple errors Undetected Packet Error Rate in 6*0 6 to in 0 0 7 bit words: 000000 00 000 00000 0000 000 0000 9 0 ultiple Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP) broadcast (shared wire or medium; e.g, Ethernet, 802.) Point to Point Data Link Control One sender, one receiver, one link: easier than a broadcast link: no edia Access Control no need for explicit AC ing e.g., dialup link, ISDN line Popular point-to-point DLC s: PPP (point-to-point ) HDLC: High level link (Data link used to be considered high layer in stack!) NBA - Non Broadcast ultiple Access (AT, X.25) 2 2

PPP (Point-to-Point Protocol) Point to point link dial-up (modem) connexions, fiber (SONET/SDH) Data framing, error detection Transparent transmission avoid transmitting characters interpreted by the modem Data multi-: IP packets, IPX packets, others Header compression - IP, TCP Authentication Associated s LCP (Link Control Protocol) activate a link negociate options test IPCP (IP Control Protocol) network layer negotiation: hosts/nodes across the link must learn/configure each other s network PAP (PPP Authentification Protocol) password exchange 3 4 Associated s Protocols CHAP (Challenge Handshake Authentication Protocol) server sends a challenge (random number) dial-up host encrypts it using a common secret password sends the results server does the same and compares call NCP (Network Control Protocol) to finish with network level configuration NCP (Network Configuration Protocol) network layer negotiation depends on the network IPCP (IP Configuration Protocol) NCP for IP: configure the network layer negotiation assign a temporary IP to dial-up host decide whether to use IP/TCP header compression 5 6 CHAP PAP authentication IP header compression PPP Physical layer NCP LCP negociation -link network PPP PPP-LCP establishes/releases the PPP connection; negotiates options Starts in DEAD state Options: max frame length; authentication, call-back Once PPP link established, IPCP moves in (on top of PPP) to configure IP network es etc. Data framing Frame format inherited from first packet switching networks synchronous transmission with error recovery (HDLC) Transpac (X.25 LAPB) PPP start and end of frame delimitation transparent transmission how to transmit characters used for delimitation? byte stuffing error detection - polynomial code 7 8 3

PPP - frame formats PPP - frame formats 8 bits 8 bits 8 bits 8 or 6 bits variable 6 bits 8 bits Flag: 00-0x7e Address: Control: 000000 Protocol: LCP, IPCP, IP Data: 500 bytes by default : 6 bit CCITT polynomial code 8 bits 8 bits 8 bits 8 or 6 bits variable 6 bits 8 bits Transparent transmission - Byte stuffing 0x7e 0x7d 0x5e 0x7d 0x7d 0x5d character X < 0x20 0x7d 0xYY 0xYY = X + 0x20 example : 0x03 0x7d 0x23 9 20 (logs) PPPoE connecting to service PPPoE connection established. Connect: ppp0 <--> socket[34:6] sent [LCP ConfReq id=0x <mru 492> <asyncmap 0x0> <magic 0xf3f807b> <pcomp> <accomp>] rcvd [LCP ConfReq id=0x8 <mru 500> <auth chap D5> <magic 0x4b4dcf02>] sent [LCP ConfAck id=0x8 <mru 500> <auth chap D5> <magic 0x4b4dcf02>] rcvd [LCP ConfRej id=0x <asyncmap 0x0> <pcomp> <accomp>] sent [LCP ConfReq id=0x2 <mru 492> <magic 0xf3f807b>] 2 (logs) ConfReq: ask for modification of default values ConfAck: new values accepted ConfNAck: new values rejected, but can be negociated ConfRej: values cannot be negociated, contains acceptable values RU: maximum reception unit id: match Req with Rep magic: detect loops between two equipments (should be different for both sides) asyncmap: transcoding map Asynchronuous Control Character ap: a series of bits, if - the character is transcoded using 0x7d escape character, if 0 - no transcoding pcomp: field compression (on byte) accomp: access and fields compression 22 rcvd [LCP ConfAck id=0x2 <mru 492> <magic 0xf3f807b>] sent [LCP EchoReq id=0x0 magic=0xf3f807b] rcvd [CHAP Challenge id=0x <a5c7a4446bf4a5bc5b70dfbb66ae>, name = "BSGRE02"] ChapReceiveChallenge: rcvd type CHAP-DIGEST-D5 sent [CHAP Response id=0x <2c99f036ee390e0364d6bad0e4b97>, name = "monlogin@isp"] rcvd [LCP EchoRep id=0x0 magic=0x4b4dcf02] rcvd [LCP ConfReq id=0x2 <auth pap> <magic 0x794cb2ad>] sent [LCP ConfReq id=0x3 <mru 492> <asyncmap 0x0> <magic 0x5893aee> <pcomp> <accomp>] lcp_reqci: returning CONFACK. 23 sent [LCP ConfAck id=0x2 <auth pap> <magic 0x794cb2ad>] rcvd [LCP ConfNak id=0x3 <mru 500>] sent [LCP ConfReq id=0x4 <asyncmap 0x0> <magic 0x5893aee> <pcomp> <accomp>] rcvd [LCP ConfAck id=0x4 <asyncmap 0x0> <magic 0x5893aee> <pcomp> <accomp>] sent [LCP EchoReq id=0x0 magic=0x5893aee] sent [PAP AuthReq id=0x user="monlogin@isp" password=<hidden>] rcvd [LCP EchoRep id=0x0 magic=0x794cb2ad] rcvd [PAP AuthAck id=0x ""] sent [IPCP ConfReq id=0x <addr 0.0.0.0> <compress VJ 0f 0>] rcvd [IPCP ConfReq id=0x48 <addr 92.68.254.254>] ipcp: returning Configure-ACK 24 4

sent [IPCP ConfAck id=0x48 <addr 92.68.254.254>] rcvd [IPCP ConfRej id=0x <compress VJ 0f 0>] sent [IPCP ConfReq id=0x2 <addr 0.0.0.0>] rcvd [IPCP ConfNak id=0x2 <addr 82.65.0.0>] sent [IPCP ConfReq id=0x3 <addr 82.65.0.0>] rcvd [IPCP ConfAck id=0x3 <addr 82.65.0.0>] ipcp: up local IP 82.65.0.0 remote IP 92.68.254.254 (traces) Point-to-Point Protocol Address: 0xff Control: 0x03 Protocol: IP (0x002) Internet Protocol, Src Addr: 62.47.72.95 (62.47.72.95), Dst Addr: 29.88.38. (29.88.38.) Protocol: TCP (0x06) Transmission Control Protocol, Src Port: 53475 (53475), Dst Port: ssh (22), Seq: 9284850, Ack: 0, Len: 0 25 26 (traces) Not provided by PPP Point-to-Point Protocol Address: 0xff Control: 0x03 Protocol: IP (0x002) Internet Protocol, Src Addr: 29.88.38. (29.88.38.), Dst Addr: 62.47.72.95 (62.47.72.95) Protocol: TCP (0x06) Transmission Control Protocol, Src Port: ssh (22), Dst Port: 53475 (53475), Seq: 558034509, Ack: 92848502, Len: 0 error correction/recovery flow sequencing 27 28 Data Link Layer: Summary Principles behind link layer: structure the information sent over the wire frame structure may add some functions TCP/IP: error and flow done at upper layers using a link between two connected devices point-to-point sharing a broadcast channel PPP used in many contexts modems, ADSL, POS authentication and accounting 29 5