Data Link Layer Lower Layers Local Area Network Standards

Slides:



Advertisements
Similar presentations
1 Data Link Issues Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Advertisements

1 ICS 156: Lecture 2 (part 2) Data link layer protocols Address resolution protocol Notes on lab 2.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Link-layer EE122 Discussion 10/14/2011. MAC Addresses Link-layer deals with MAC addresses – 48-bit addresses, flat name space – E.g., 88-9F-FA-F
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
1 IEEE 802 LANs Following the success of CDMA technologies ALOHA & Ethernet, IEEE standardized CDMA/CD technology as IEEE LAN Also standardized are.
Ethernet Overview it the IEEE standard for Ethernet.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Data Link Protocols Relates to Lab 2.
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Data Link Issues Relates to Lab 2.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Link Layer 5.1 Introduction and services
Data Link Issues This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point.
Week3 The Medium Access Sublayer
A Taxonomy of Mechanisms for Multi-Access
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Nada Al Dosary CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks.
Computer networks.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
William Stallings Data and Computer Communications
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Data Link Issues This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point.
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Data Link Issues Relates to Lab 2.
Services of DLL Framing Link access Reliable delivery
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif
Chapter 12 Local Area Networks
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Protocol layering and data
Chapter 12 Multiple Access
Ethernet – CSMA/CD Review
Data Communication Networks
7- chapter Seven Local Area Networks (LAN)
Chapter 12 Local Area Networks
Protocol layering and data
Figure 3.1 Internet model.
Chapter 12 Local Area Networks
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

Data Link Layer Lower Layers Local Area Network Standards Point-to-Point Link Layer Protocols ARP and RARP © Jörg Liebeherr (modified by M. Veeraraghavan)

TCP/IP Suite and OSI Reference Model The TCP/IP protocol stack does not define the lower layers of a complete protocol stack. In this lecture, we will review the data link layer and the MAC sublayer. Most of the material should be familiar from EL 536. © Jörg Liebeherr (modified by M. Veeraraghavan)

Data Link Layer The main tasks of the data link layer are: Transfer data from the network layer of one machine to the network layer of another machine. Convert the raw bit stream of the physical layer into groups of bits (“frames”). Perform flow control between sender and receiver. © Jörg Liebeherr (modified by M. Veeraraghavan)

Types of Networks There are two types of communication networks: Broadcast Networks: All stations share a single communication channel. Point-to-Point Networks: Pairs of hosts (or routers) are directly connected. Typically, local area networks (LANs) are broadcast and wide area networks (WANs) are point-to-point. © Jörg Liebeherr (modified by M. Veeraraghavan)

Local Area Network Local area networks (LANs) typically connect computers within a building or a campus. Almost all LANs are broadcast networks. Typical topologies of LANs are bus or ring. © Jörg Liebeherr (modified by M. Veeraraghavan)

MAC and LLC In any broadcast network, the stations must ensure that only one station transmits at a time on the shared communication channel. The protocol that determines who can transmit on a broadcast channel is called Medium Access Control (MAC) protocol. The MAC protocol is implemented in the MAC sublayer which is the lower sublayer of the data link layer. The higher portion of the data link layer is often called Logical Link Control (LLC). © Jörg Liebeherr (modified by M. Veeraraghavan)

IEEE 802 Standards IEEE 802 is a family of standards for LANs. The 802 defines the LLC and several MAC sublayers. Higher Layers 802.1 Interface to Higher Layers LLC 802.2 Logical Link Control MAC 802.3 CSMA/CD (Ethernet) 802.4 Token Bus 802.5 Token Ring 802.6 DQDB © Jörg Liebeherr (modified by M. Veeraraghavan)

IEEE 802 LAN Standard © Jörg Liebeherr (modified by M. Veeraraghavan)

IEEE 802 LAN Standard IEEE 802.2 CSMA/CD L C M A P h y s i c a l I E 8 Unacknowledged connectionless service Connection-oriented service Acknowledged connectionless service I E 8 2 . 3 Broadband Unshielded twisted pair: 1, 10 Mbps Optical :Fiber 10 Mbps Token Bus 4 Shielded twisted pair: 4, 16 Mbps Unshielded 4 Mbps coaxial: 10 Mbps FDDI F D I Broadband Coaxial: 1,5,10 Carrierband Optical fiber 5,10,20 Mbps Token Ring I E 8 2 . 5 DQDB Optical Optical fiber: 6 . fiber 2 100 or Mbps 8 coaxial E 44.736 E Mbps E I © Jörg Liebeherr (modified by M. Veeraraghavan)

Functions of the LLC LLC can provide different services to the network layer: acknowledged connectionless service unacknowledged connectionless service connection-oriented service Framing Error control Addressing © Jörg Liebeherr (modified by M. Veeraraghavan)

Functions of the MAC sublayer The various MAC sublayers of the IEEE 802 standard are very different. We will discuss: CSMA/CD a.k.a. Ethernet © Jörg Liebeherr (modified by M. Veeraraghavan)

IEEE 802.3 (CSMA/CD) 802.3 standardizes the 1-persistent CSMA/CD multi-access control protocol. 1. Each station listens before it transmits. 2. If the channel is busy, it waits until the channel goes idle, and then it transmits. 3. If the channel is idle it transmits immediately. Continue sensing. 4. If collision is detected, transmit a brief jamming signal, then cease transmission, wait for a random time, and retransmit. © Jörg Liebeherr (modified by M. Veeraraghavan)

Different techniques 1-persistent: if busy, constantly sense channel if idle, send immediately if collision is detected, wait a random amount of time before retransmitting Non-persistent: sense channel when station has a packet to send if busy, wait a random amount of time before sensing again; if idle, transmit as soon as it is idle collisions reduced because sensing is not immediately rescheduled drawback: more delay p-persistent: combines 1-persistent goal of reduced idle channel time with the non-persistent goal of reduced collisions. sense constantly if busy and the station needs to send a packet when the channel becomes idle, transmit packet with probability p with probability 1-p station waits an additional tprop before sensing again © Jörg Liebeherr (modified by M. Veeraraghavan)

Collisions in Ethernet The collision resolution process of Ethernet requires that a collision is detected while a station is still transmitting. Assume: max. propagation delay on the bus is a. © Jörg Liebeherr (modified by M. Veeraraghavan)

Collisions in Ethernet Restrictions: Each frame should be at least twice as long as the time to detect a collision (2 · maximum propagation delay). © Jörg Liebeherr (modified by M. Veeraraghavan)

Different MAC schemes ALOHA: True free-for-all. When a node needs to send, it does so. It listens for an amount of time equal to the maximum round trip delay plus a fixed increment. If it hears an acknowledgment, fine; otherwise it resends. After several attempts, it gives up. Max. utilization: 18% Slotted ALOHA: improved utilization: 37% (with time slots; frames that overlap, overlap completely) CSMA: Sense carrier, if idle, send.Wait for ack. If there isn’t one, assume there was a collision, retransmit. © Jörg Liebeherr (modified by M. Veeraraghavan)

CSMA/CD CSMA/CD: In CSMA, if collision occurs, need to wait till damaged frames have fully propagated. For long frames compared to propagation delay, this could lead to significant waste of capacity. So add collision detection. Rule: Frames should be long enough to allow collision detection prior to the end of transmission (pg 405, EL536 textbook) © Jörg Liebeherr (modified by M. Veeraraghavan)

Exponential Backoff Algorithm If a station is involved in a collision, it waits a random amount of time before attempting a retransmission. The random time is determined by the following algorithm: Set “slot time” to 2a. After first collision wait 0 or 1 time unit. After i-th collision, wait a random number between 0 and 2 i-1 time slots. Do not increase random number range if i=10. Give up after 16 collisions. © Jörg Liebeherr (modified by M. Veeraraghavan)

Physical Layer Specifications for 802.3 Many types of media are allowed for 802.3. These are the most popular: © Jörg Liebeherr (modified by M. Veeraraghavan)

Ethernet and IEEE 802.3: Any Difference? On a conceptual level, they are identical. But there are subtle differences that are relevant if we deal with TCP/IP. “Ethernet”: An industry standard from 1982 that is based on the first implementation of CSMA/CD by Xerox. Predominant version of CSMA/CD in the US. 802.3: IEEE’s version of CSMA/CD from 1985. Interoperates with 802.2 (LLC) as higher layer. Difference for our purposes: Ethernet and 802.3 use different methods to encapsulate an IP datagram. © Jörg Liebeherr (modified by M. Veeraraghavan)

IEEE 802.2/802.3 Encapsulation (RFC 1042) Error: This should be 8035 not 0835 © Jörg Liebeherr (modified by M. Veeraraghavan)

Ethernet Encapsulation (RFC 894 and 893) © Jörg Liebeherr (modified by M. Veeraraghavan)

Interconnection of LANs LANs of different types can be interconnected by data link bridges. © Jörg Liebeherr (modified by M. Veeraraghavan)