COS 461 Fall 1997 Data Link Layer u Today: LANs other than Ethernet –token rings –switched networks –cellular technology u remaining issues –error detection.

Slides:



Advertisements
Similar presentations
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 14 Introduction to Computer Networks.
Advertisements

COS 461 Fall 1997 Todays Lecture u introduction to data link layer –in other words, how LANs work u all about Ethernet today u next time: other LANs u.
CSCI-1680 Link Layer Reliability Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
Primitives for Achieving Reliability 3035/GZ01 Networked Systems Kyle Jamieson Department of Computer Science University College London.
COS 461 Fall 1997 COS 461: Networks and Distributed Computing u Prof. Ed Felten u u.
Lecture 12 Layer 2 – Data Link Layer Protocols
CSCI-1680 Link Layer Reliability Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
8-Reliability and Channel Coding Dr. John P. Abraham Professor UTPA.
Reliability & Channel Coding
Spring 2002CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 12 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 13 Introduction to Computer Networks.
Long distance communication Multiplexing  Allow multiple signals to travel through one medium  Types Frequency division multiplexing Synchronous time.
EE 122: Error detection and reliable transmission Ion Stoica September 16, 2002.
1 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
CS335 Networking & Network Administration Wednesday, April 7 PacketsPackets, Frames, and Error DetectionFramesError Detection.
Chapter 6: Errors, Error Detection, and Error Control
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 20.
Spring 2004 EE4272 Direct Link Networks (I) Hardware Building Blocks (nodes & links) 5 Issues before Exchanging Packets  Encoding  Framing  Error Detection.
Chapter 2 : Direct Link Networks (Continued). So far... Modulation and Encoding Link layer protocols Error Detection -- Parity Check.
Spring 2003CS 4611 Outline Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
Chapter 6 Errors, Error Detection, and Error Control
1 K. Salah Module 6.1: TCP Flow and Congestion Control Connection establishment & Termination Flow Control Congestion Control QoS.
CS352- Link Layer Dept. of Computer Science Rutgers University.
Error Detection and Reliable Transmission EECS 122: Lecture 24 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
18-Aug-154/598N: Computer Networks Overview Direct link networks –Error detection - Section 2.4 –Reliable transmission - Section 2.5.
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Lecture 6: Framing and Error Detection-Data Link Layer Functions
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 12: Reliability Slides used with permissions.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Transport Layer: Sliding Window Reliability
Transmission Errors Error Detection and Correction.
1 Direct Link Networks: Reliable Transmission Sections 2.5.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
Computer Networking Lecture 16 – Reliable Transport.
NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS ( NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS (PRACTICAL PART) Tutorial 4 : Chapter 7 Data & computer.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
CS380 Int. to Comp. Networks Data Link Networks - Part II1 Reliable Transmission How to fix corrupted frames. –Error correcting codes too expensive –Should.
Computer Communication & Networks
Part III Datalink Layer 10.
Getting Connected (Chapter 2 Part 3)
Data link layer (LLC).
Advanced Computer Networks
Chap. 4 Data link layer 2.
Data Link Layer What does it do?
Introduction of Transport Protocols
Data Link Layer: Data Link Control
COMP/ELEC 429/556 Introduction to Computer Networks
Link Layer and LANs Its not about how hard you hit... It's about how hard you can get hit and keep moving forward 5: DataLink Layer.
CS412 Introduction to Computer Networking & Telecommunication
Getting Connected (Chapter 2 Part 3)
Review First mile problem Internet End Users Last mile
Reliable transmission
Point-to-Point Links Outline Encoding Framing Error Detection
Getting Connected (Chapter 2 Part 3)
Error detection: Outline
Presentation transcript:

COS 461 Fall 1997 Data Link Layer u Today: LANs other than Ethernet –token rings –switched networks –cellular technology u remaining issues –error detection –reliable transmission

COS 461 Fall 1997 Token Rings u example: FDDI u nodes arranged in ring u all frames travel around the ring in the same direction u ring acts like broadcast medium –all nodes see all frames –need algorithm to decide when to transmit

COS 461 Fall 1997 The Token u special token frame circulates on ring u must grab the token before sending u to send a frame –remove token from circulation –send data frame –(some token rings: wait for acknowledgement to come back) –re-inject token

COS 461 Fall 1997 Token Ring Evaluation u unlike Ethernet, can operate at full capacity u but: –more expensive –have to wait for token before sending, even if network is idle –adding a host hurts performance, even if that host is silent –trickery required to recover from corrupted token

COS 461 Fall 1997 Switched LANs u example: Myrinet u point-to-point links connected with switching hardware u advantages –total bandwidth scales as hosts are added –cookie-cutter approach

COS 461 Fall 1997 Switched LANs

COS 461 Fall 1997 Myrinet Details u arbitrary topology u hosts map the network initially –remap periodically (soft state) u source routing: sender determines path through network –path encoded in header u built from 8-way or 16-way switches

COS 461 Fall 1997 Myrinet vs. Alternatives u performs well –same as 1 Gb/sec Ethernet, which is newer u tolerant of configuration changes –like 10BaseT –unlike others u moderate cost –more than Ethernet u great for researchers –programmable adaptor

COS 461 Fall 1997 Error Detection u Internet checksum –weak, but simple to code u CRC –based on nontrivial math –strong –easy to build in hardware

COS 461 Fall 1997 Internet Checksum u complement of the ones-complement sum u Misses some common errors –rearranged words –complementary errors in consecutive words short checksum(short buf[]){ int sum = 0; for(int i=0; i<buf.length; ++i){ sum += buf[i]; if(sum & 0xffff0000){ sum &= 0xffff; ++sum; } return ~(sum & 0xffff); }

COS 461 Fall 1997 CRC (Cyclic Redundancy Code) u based on polynomial math, modulo 2 –addition = exclusive-or (modulo 2) u think of a bit-string as representing a polynomial –ith bit is on ==> x i term in polynomial u pick a magic polynomial C(x) u transmit a bit-string (polynomial) that is divisible by C(x)

COS 461 Fall 1997 CRC u to make a polynomial divisible by C(x) –let k = degree of C(x) –multiply message by x k to get Q(x) –compute the remainder Q(x) % C(x) –P(x) = Q(x) - (Q(x) % C(x)) message remainder

COS 461 Fall 1997 CRC u sender transmits P(x) u receiver verifies result is divisible by C(x) –if not, message was corrupted u strength depends on properties of C(x) –popular values of C(x) »CRC-8: x 8 +x 2 +x+1 »CRC-16: x 16 +x 15 +x 2 +1 »CRC-32: x 32 +x 26 +x 23 +x 16 +x 12 +x 11 +x 10 +x 8 +x 7 +x 5 +x 4 +x 2 +x+1

COS 461 Fall 1997 Computing CRC in Hardware u compute remainder incrementally –start with zero –grow message one bit at a time –to shift in a bit: »multiply polynomial by x (left shift) »add one if shifted-in bit is one (bit flip) »take remainder mod C(x) u after tricks, boils down to one AND and one XOR per bit

COS 461 Fall 1997 Reliable Transmission u build reliable communication on top of unreliable u acknowledgement, timeout, retransmission u known as ARQ (Automatic Repeat reQuest) –lousy acronym, and a misnomer u will discuss three variants of ARQ

COS 461 Fall 1997 Stop-and-Wait u dont send a packet to a host until it has acknowledged the previous packet –covered in first lecture –recall: use one-bit sequence number on packets –implemented in Assignment 1 u advantage: simple u disadvantage: poor use of bandwidth –especially if hosts are far apart

COS 461 Fall 1997 Efficiency of Stop-and-Wait u assume –packet size = S (bytes) –network bandwidth = B (bytes/second) –delay between hosts = D (seconds) u time per packet is T = 2D + S/B effective bandwidth = S T = 1 + 2BD S B

COS 461 Fall 1997 Bandwidth-Delay Product u says how much data could be in transit at any moment u for maximum efficiency, want to have this much data in transit u keep the pipe full u better ARQ variants fill the pipe u in practice, often hard to figure out the bandwidth-delay product –adaptive algorithms

COS 461 Fall 1997 Improving Stop-and-Wait u run several stop-and-wait protocols at once between a pair of hosts –logical channels u use them in round-robin fashion u packet (or ack) header says which channel the packet belongs to u number of logical channels chosen big enough to fill the pipe

COS 461 Fall 1997 u with C logical channels, effective bandwidth is u by making C big enough, can use available bandwidth fully Performance 1 + 2BD CS B

COS 461 Fall 1997 Sliding Window u extend stop-and-wait to allow multiple unacknowledged packets to be outstanding –limited number: window size W u give each packet a sequence number –ack carries sequence number u sender must have space to buffer W packets u equivalent to logical channels –harder to understand, but more often discussed

COS 461 Fall 1997 Sliding-Window Details u sequence numbers must be large enough to represent 2W distinct values –note: logical channel used lg(W) bits to identify channel, plus 1-bit sequence number u different ways to deal with reordering, dropping –receiver can ignore (simple) –receiver can remember (efficient)