Data-link Layer Computer Networks.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Computer Networks Ethernet I Professor Hui Zhang
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Chapter 13 Wired LANs: Ethernet
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Data Link Layer IS250 Spring 2010
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Chapter 13 Wired LANs: Ethernet
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Packet Transmission (Part III) Local Area Networks (LANs)
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Ethernet Standards DIX consortium – Mbps Ethernet 1 st Blue book – 1980 IEEE group takes over – Project 802 –802.1 – High Level Interface –HLI –
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
Ethernet Overview it the IEEE standard for Ethernet.
Autumn 2000John Kristoff1 Data-link Layer Computer Networks.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Chapter 8-10 Local Area Networks (LANs). Comparison 4e and 5e  Ch 7, 4eCh 8, 5e Ch 10, Forouzan  Ch 8, 4eCh 14, 5e Ch 13, Forouzan  Ch 9, 4eCh 13,
1 Hardware Addressing and Frame Type Identification.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
SIMS-201 Computer Networks.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
CS4470 Computer Networking Protocols
Chapter 12 Multiple Access.
Advanced Computer Networks
Local Area Networks: Topologies
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif
Ethernet and Token Ring LAN Networks
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
CT1303 LAN Rehab AlFallaj.
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
Physical and Logical Topologies
Protocol layering and data
CCNA 1 Chapter 5 Ethernet Fundamentals
7- chapter Seven Local Area Networks (LAN)
Chapter 4 Ethernet Technology
SIMS-201 Computer Networks.
Chapter 12 Local Area Networks
Protocol layering and data
Local Area Networks (LANs)
Chapter 12 Local Area Networks
Computer Interfacing and Protocols
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Dr. John P. Abraham Professor UTPA
LAN Technologies LAN TECHNOLOGIES.
Ethernet and Token Ring LAN Networks
Presentation transcript:

Data-link Layer Computer Networks

Where are we?

The Data Link Interface

The Local Area Network Popular (most data links are LANs) High Throughput Low Cost Short Distances Often shared medium access Most new installations usually "switched"

Shared Medium Access A Shared Medium Used by All Only One Station Transmits at a Time Stations "Take Turns” MAC Protocol defines fairness policy

Topology Review

Data Link Bit Encoding

Example Bus: Ethernet Most Popular LAN IEEE Standardized as 802.3 Several Generations Same frame format (mostly) Changing data rates Different physical layer requirements The book: Gigabit Ethernet, Rich Seifert

Ethernet Transmission Only one station transmits at a time Signal propagates entire cable length All stations receive all transmissions CSMA/CD medium access control scheme

CSMA/CD Carrier Sense (CS) Multiple Access (MA) Wait until medium is idle Begin to transmit frame Multiple Access (MA) Multiple stations attached to shared media Each station uses the same access algorithm Simultaneous Transmission is Possible

CSMA/CD [continued] Simultaneous Transmission: Interfere with each other Known as a collision CSMA with Collision Detect (CD) Listen to media during transmission Detect whether another station’s signal interferes Back off from interference and try again

Transmission Logic 1. If media is idle, transmit. 2. Else, continue to listen to the media and when it is available, transmit. 3. Listen to media while transmitting. 4. If collision is detected while transmitting, send jam and back-off 5. Go to step 1 until max-try counter is reached.

Exponential Back-off Algorithm Let 1 Slot Time = 512 bit times Upon 1st collision, randomly choose among {0,1} slot delay Upon 2nd collision, randomly choose among {0,1,2,3} slot delay Up to a maximum of 16 transmission attempts with a range of delay from {0 to 1024} bit times 0 <= r < 2k-1 Where r is the random number generated, where k = MIN(n,10) and where n is the n-th retransmission attempt

The Collision Domain Minimum Length Frame Must Be >= Maximum RTT of the Ethernet segment Minimum Frame is 512 bits Requires 46 bytes of data whether the upper layer has them or not Distances decrease as speed increases Full-duplex mode eliminates the collision domain

An Aside - Collisions They are NOT bad, unless they’re late Collision statistics are mostly meaningless Monitor utilization Distance Matters Becoming irrelevant with switching The name "Collision” is misleading

Ethernet Addressing Standardized by IEEE Each station assigned a unique 48-bit address First 24-bits are the OUI Second 24-bits are vendor assigned Usually set when NIC is manufactured Canonical address format

Ethernet Address Recognition Each Frame Contains a Destination Address All Stations Receive All Transmissions Station Discards Any Frame Not Destined for It Important: interface hardware, not software, checks address

Possible Destinations 1. Single destination (unicast) 2. All stations on the Ethernet (broadcast) 3. Subset of stations on the Ethernet (multicast) MAC address is used to distinguish between the destinations

Ethernet Destination Addresses

Promiscuous Mode Designed for testing/debugging Allows interface to accept all frames Available on most Ethernet hardware

IEEE 802.3 Frame Format Sender fills in: Sender’s source address Recipient’s destination address Type of data in the frame type field Cyclic Redundancy in FCS field

Demultiplexing on Frame Type Field Network Interface Hardware Receives a copy of each transmitted frame Examines address and either accepts or discards Passes accepted frame to system software Network device software Examines frame type Passes frame to correct software module

Ethernet Wiring - 10BASE5 Thick Ethernet (Thicknet) Heavy coaxial cable

Ethernet Wiring - 10BASE2 Thin Ethernet (Thinnet) Smaller coaxial cable

Ethernet Wiring - 10BASE-T Uses a hub Twisted-pair wiring

Ethernet Office Wiring

High-speed Ethernet Fast Ethernet Gigabit Ethernet Operates at 100 Mb/s Standardized in IEEE 802.3 as 100BASE-T and 100BASE-F standards 10/100 Devices available Gigabit Ethernet Operates at 1 Gb/s Mostly fiber systems using switches Even higher speeds coming!

Ethernet - Final Notes Data Link Layer Usually Implemented with Physical Layer Link Beat Interframe Gap Time Capture Effect Modern Ethernet is a star-shaped bus news://comp.dcom.lans.ethernet IETF increasing maximum frame size?

Example Ring: Token Ring Popular in IBM environments IEEE Standardized as 802.5 Operates at 4Mb/s, 16Mb/s Quickly Being Abandoned 802.5 working group moved to "hibernation" status in July 2000 Still worth learning about!

Token Ring Transmission Station waits for token before sending Signal travels the entire ring Sender receives its own transmission

Token Passing Paradigm Frames travel in a unidirectional fashion around the ring Stations must wait for token to transmit Stations can reserve the token Token will circle indefinitely until a station wants to transmit

MAC Frames Ring management and control frames Beacon, Ring purge, claim token, report error Ring Poll every 7 seconds Active monitor present Standby monitor present NAUN notification process

Active and Standby Monitor Only 1 Active Monitor per ring AM is the master clock for the ring AM inserts 24-bit delay to transmissions AM ensures tokens/frames are present AM removes circulating frames SMs are ready to take over if AM fails

Monitor Contention Ring elects a new Active Monitor Initiated when: Loss of signal is detected Active monitor not detected Time-outs of token timer, NAUN, etc. Highest MAC address wins Everyone else is Standby Monitor

Token Ring Insertion Process Phase 0 - Media Lobe Check Phase 1 - Physical Insertion Phase 2 - Address Verification Phase 3 - Participation in Ring Poll Phase 4 - Request Initialization

The Token Frame When no station is transmitting, the token frame travels continuously around the ring.

Token Ring Addressing Standardized by IEEE Each station assigned a unique 48-bit address First 24-bits are the OUI Second 24-bits are vendor assigned Usually set when NIC is manufactured Non-canonical address format

Token Ring Address Recognition Each Frame Contains a Destination Address All Stations Receive and Repeat All Transmissions Stations Copy Any Frame Destined for It Important: interface hardware, not software, checks address

Token Ring Destination Addresses

Token Ring Frame Format Sender fills in: Sender’s source address Recipient’s destination address Cyclic Redundancy in FCS field Other stations may change: Frame Status

High-speed Token Ring HSTR Operates at 100 Mb/s 1 Gb/s was being worked on Standardized in IEEE 802.5 Some 4/16/100 devices

Why Token Ring Lost IBM was the only systems manufacturer that promoted it Cost Complexity Support throughout the industry Only one vendor left to develop product!

Token Ring - Final Notes Jitter Early Token Release Backup Path Token Transmission Timer Needs LLC - we haven’t talked about it yet news://comp.dcom.lans.token-ring

Example Ring: FDDI Uses Optical Fiber cabling High reliability (dual rings) Immune to interference Standardized by ANSI Transmission rate of 100 Mb/s Similar to token ring

FDDI Dual Ring Operation

Logical Link Control Standardized by IEEE 802.2 Often used for MACs that don’t use type field

LLC with SNAP

What else? ATM Wireless (802.11) Fiber Channel HIPPI Token Bus (802.4) IEEE 802 standards may become free!