Services of DLL Framing Link access Reliable delivery

Slides:



Advertisements
Similar presentations
Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
Advertisements

5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
5: DataLink Layer5a-1 MAC Sublayer. 5: DataLink Layer5a-2 Multiple Access Links and Protocols Two types of “links”: r point-to-point m PPP for dial-up.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
15 – Data link layer Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
1 Announcement r Homework #3 was due last night r Homework #4 is out.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
DataLink Layer session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
Medium Access Control Sublayer
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Chap 4 Multiaccess Communication (Part 1)
1 Mao W07 Multiple Access EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement:
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
1 Link-Layer Contention EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
CSC4220/6220 Computer Networks
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Medium Access Control NWEN302 Computer Network Design.
Multiple Access Readings: Kurose & Ross, 5.3, 5.5.
Ch 5. Link layer and Local Area Networks Myungchul Kim
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
5: DataLink Layer5-1 The Data Link Layer Chapter 5 Kurose and Ross Today 5.1 and 5.3.
Multiple Access Links and Protocols
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, error correction.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
EEC-484/584 Computer Networks
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Link Layer 5.1 Introduction and services
Random Access Protocols
Chapter 5 Link Layer and LANs
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
Chapter 5: The Data Link Layer
Multiple Access Mahesh Jangid Assistant Professor JVW University.
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Chapter 5: The Data Link Layer
Multiple access.
2017 session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Slides have been adapted from: Computer.
2012 session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken from: Computer.
EEC-484/584 Computer Networks
Overview Jaringan Komputer (3)
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Data Communication Networks
Link Layer 5.1 Introduction and services
Link Layer: Multiple Access
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

Services of DLL Framing Link access Reliable delivery Error detection and correction (bit-level error detection and correction) 9/17/2018 Data Link Layer

Ethernet Frame MTU of Ethernet is 1,500 bytes (46 to 1,500 bytes). 9/17/2018 Data Link Layer

The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs 9/17/2018 Data Link Layer

MAC Protocols: a taxonomy Three broad classes: Channel Partitioning divide channel into smaller “pieces” (time slots, frequency, code) allocate piece to node for exclusive use Random Access channel not divided, allow collisions “recover” from collisions “Taking turns” Nodes take turns, but nodes with more to send can take longer turns 9/17/2018 Data Link Layer

Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes ➜ “collision”, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA 9/17/2018 Data Link Layer

Slotted ALOHA Assumptions all frames same size L bits time is divided into equal size slots (L/R), secs time to transmit 1 frame nodes start to transmit frames only at beginning of slots nodes are synchronized for slots if 2 or more nodes transmit in slot, all nodes detect collision, before slot ends Operation (Let p be a probability) when node obtains fresh frame, it transmits in next slot no collision, node can send new frame in next slot if collision, node retransmits frame in each subsequent slot with prob. p until success

Slotted ALOHA Pros single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization

Slotted Aloha efficiency Efficiency is the long-run fraction of successful slots when there are many nodes, each with many frames to send For max efficiency with N nodes, find p* that maximizes Np(1-p)N-1 For many nodes, take limit of Np*(1-p*)N-1 as N goes to infinity, gives 1/e = .37 Suppose N nodes with many frames to send, each transmits in slot with probability p prob that node 1 has success in a slot = p(1-p)N-1 prob that any node has a success = Np(1-p)N-1 At best: channel used for useful transmissions 37% of time! 9/17/2018 Data Link Layer

Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t0 collides with other frames sent in [t0-1,t0+1] 9/17/2018 Data Link Layer

Pure Aloha efficiency P(success by given node) = P(node transmits) . P(no other node transmits in [t0-1,t0] . P(no other node transmits in [t0, t0+1] = p . (1-p)N-1 . (1-p)N-1 = p . (1-p)2(N-1) … choosing optimum p and then letting n -> infty ... = 1/(2e) = .18 Even worse ! 9/17/2018 Data Link Layer

Throughput Comparison 9/17/2018 Data Link Layer

CSMA (Carrier sense multiple access)

MAC 9/17/2018 Data Link Layer

In slotted and pure ALOHA, a node’s decision to transmit is made independently of the activity of the other nodes attached to the broadcast channel.

CSMA Listen before speaking If someone else begins talking at the same time, stop talking (collision detection):If it detects that another node is transmitting, it stops and waits a random amount of time before repeating the sense-and-transmit-when-idle cycle.

When each node sense before transmitting why collisions occur: Longer the propagation delay between nodes, larger the chance that a node is not yet able to sense a transmission that has already begun

Persistence Technique

9/17/2018 Data Link Layer

Persistence Technique This is technique defined that what should we do when medium is busy Non-persistence: 1. If the medium is idle ,transmit; otherwise , go to step 2 2. If the medium is busy , wait an amount of time drawn from a probability distribution(retransmission delay) and repeat step 1 9/17/2018 Data Link Layer

1-Persistence Algorithm: 1. If the medium is idle ,transmit; otherwise , go to step 2 2. If the medium is busy , continue to listen until the channel is sensed idle; then transmit immediately Still, there is a chance of collision, when two stations senses the medium simultaneously 9/17/2018 Data Link Layer

p-Persistence Algorithm: 1. If the medium is idle ,transmit with probability p, and delay one time unit with probability (1-p) (The time unit is typically equal to the maximum propagation delay) 2. If the medium is busy, continue to listen until the channel is idle and repeat step 1 3. If the transmission is delayed one time unit, repeat step 1 It shows the highest performance among the all persistence technique 9/17/2018 Data Link Layer

9/17/2018 Data Link Layer

CSMA/CD In previous figure nodes do not stop transmission when collides

CSMA/CD Operations 1. The adapter obtains a datagram from the network layer, prepares a link-layer frame, and puts the frame to the adapter buffer. 2. If the adapter senses that the channel is idle (that is, there is no signal energy entering the adapter from the channel), it starts to transmit the frame. If, on the other hand, the adapter senses that the channel is busy, it waits until it senses no signal energy and then starts to transmit the frame. 3. While transmitting, the adapter monitors for the presence of signal energy coming from other adapters using the broadcast channel. 4. If the adapter transmits the entire frame without detecting signal energy from other adapters, the adapter is finished with the frame. If, on the other hand, the adapter detects signal energy from other adapters while transmitting, it aborts the transmission (that is, it stops transmitting its frame). 5. After aborting, the adapter waits a random amount of time and then returns to step 2.

9/17/2018 Data Link Layer

CSMA/CD

CSMA/CD efficiency Tprop = max prop between 2 nodes in LAN ttrans = time to transmit max-size frame Efficiency goes to 1 as tprop goes to 0 Goes to 1 as ttrans goes to infinity Much better than ALOHA, but still decentralized, simple, and cheap 9/17/2018 Data Link Layer