Dr. Mozafar Bag-Mohammadi University of Ilam

Slides:



Advertisements
Similar presentations
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Advertisements

Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
CPSC 441 TUTORIAL TA: FANG WANG HUBS, SWITCHES AND BRIDGES Parts of the slides contents are courtesy of the following people: Jim Kurose, Keith Ross:
1 Data Link Layer Ethernet Bridges Token Ring. 2 Summary of MAC protocols What do you do with a shared media? Channel Partitioning: time, frequency or.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
5: DataLink Layer5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Ethernet.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: Data Link Layer:
1 Interconnecting LAN segments Repeaters Hubs Bridges Switches.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
5: DataLink Layer5a-1 Summary of MAC protocols r What do you do with a shared media? m Channel Partitioning, by time, frequency or code Time Division,Code.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Hubs, Bridges, and Switches (oh my) r Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. r Differ.
1 Network Equipment Technologies Network Equipment Technologies.
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r link layer services r error detection, correction r multiple access protocols and LANs.
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
4: DataLink Layer1 Hubs r Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Data Link Issues Relates to Lab 2.
Computer Communication Networks
Chapter 3 Part 1 Switching and Bridging
Link Layer 5.1 Introduction and services
Data Link Issues This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point.
Link Layer 5.1 Introduction and services
Chapter 5 Link Layer and LANs
MAC Addresses and ARP 32-bit IP address:
Computer Communication Networks
Chapter 4 Data Link Layer Switching
Data Link Issues This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point.
Hubs Hubs are essentially physical-layer repeaters:
University of Pittsburgh
Chapter 3 Part 1 Switching and Bridging
CS 457 – Lecture 6 Ethernet Spring 2012.
Data Link Issues Relates to Lab 2.
Mac Addressing, Ethernet, and Interconnections
Hubs Hubs are essentially physical-layer repeaters:
Overview Jaringan Komputer (3)
Communication Networks NETW 501
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
EEC-484/584 Computer Networks
18: Ethernet, Hubs, Bridges, Switches
Link Layer: Multiple Access
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Link Layer 5.1 Introduction and services
Presentation transcript:

Dr. Mozafar Bag-Mohammadi University of Ilam Link Layer 2 Dr. Mozafar Bag-Mohammadi University of Ilam

Contents Multiple Access Protocols Local Area Network (LAN) Ethernet Hubs, Bridges, and Switches

1.Multiple Access Links and Protocols Three types of “links”: point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.) switched (e.g., switched Ethernet, ATM etc)

Multiple Access protocols single shared communication channel two or more simultaneous transmissions by nodes: interference only one node can send successfully at a time multiple access protocol: distributed algorithm that determines how stations share channel, i.e., determine when station can transmit communication about channel sharing must use channel itself! type of protocols: synchronous or asynchronous information needed about other stations robustness (e.g., to channel errors) performance

Multiple Access Control Protocols Three broad classes: Channel Partitioning divide channel into smaller “pieces” (time slots, frequency, code) allocate piece to node for exclusive use TDMA, FDMA, CDMA Random Access allow collisions “recover” from collisions CSMA, ALOHA Taking turns tightly coordinate shared access to avoid collisions Token ring Goal: efficient, fair, simple, decentralized

Random Access protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes -> “collision”, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: slotted ALOHA ALOHA CSMA and CSMA/CD

CSMA: Carrier Sense Multiple Access CSMA: listen before transmit: If channel sensed idle: transmit entire pkt If channel sensed busy, defer transmission human analogy: don’t interrupt others!

CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time colliding transmissions aborted, reducing channel wastage persistent or non-persistent retransmission collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: receiver shut off while transmitting human analogy: the polite conversationalist

Collisions A B A B A B A B

CSMA/CD collision detection

2. Local Area Network (LAN) addressing Ethernet hubs, bridges, switches 802.11 PPP ATM

LAN Address (more) MAC address allocation administered by IEEE manufacturer buys portion of MAC address space (to assure uniqueness) Analogy: (a) MAC address: like Social Security Number (b) IP address: like postal address MAC flat address => portability can move LAN card from one LAN to another IP hierarchical address NOT portable depends on network to which one attaches

IEEE 802 Standards IEEE 802 is a family of standards for LANs, which defines an LLC and several MAC sublayers

3. Ethernet “dominant” LAN technology: first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10Mbps, 100Mbps, 1Gbps, 10Gbps Metcalfe’s Ethernet sketch

Ethernet Speed: 10Mbps -10 Gbps Standard: 802.3, Ethernet II (DIX) Most popular physical layers for Ethernet: 10Base5 Thick Ethernet: 10 Mbps coax cable 10Base2 Thin Ethernet: 10 Mbps coax cable 10Base-T 10 Mbps Twisted Pair 100Base-TX 100 Mbps over Category 5 twisted pair 100Base-FX 100 Mbps over Fiber Optics 1000Base-FX 1Gbps over Fiber Optics 10000Base-FX 10Gbps over Fiber Optics (for wide area links)

Bus Topology 10Base5 and 10Base2 Ethernets has a bus topology

Star Topology Starting with 10Base-T, stations are connected to a hub in a star configuration

Frame format Dest addr 64 48 32 CRC Preamble Src Type Body 16

Ethernet uses CSMA/CD A: sense channel, if idle then { transmit and monitor the channel; If detect another transmission abort and send jam signal; update # collisions; delay as required by exponential backoff algorithm; goto A } else {done with the frame; set collisions to zero} else {wait until ongoing transmission is over and goto A}

Ethernet’s CSMA/CD (more) Jam Signal: make sure all other transmitters are aware of collision; 48 bits; Exponential Backoff: Goal: adapt retransmission attempts to estimated current load heavy load: random wait will be longer first collision: choose K from {0,1}; delay is K x 512 bit transmission times after second collision: choose K from {0,1,2,3}… after ten or more collisions, choose K from {0,1,2,3,4,…,1023}

4. Hubs, Bridges and Switches 5. 1 Interconnecting LANs Q: Why not just one big LAN? Limited amount of supportable traffic: on single LAN, all stations must share bandwidth limited length: 802.3 specifies maximum cable length large “collision domain” (can collide with many stations)

Hubs Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces Hubs can be arranged in a hierarchy (or multi-tier design), with backbone hub at its top

Hubs (more) Each connected LAN referred to as LAN segment Hubs do not isolate collision domains: node may collide with any node residing at any segment in LAN Hub Advantages: simple, inexpensive device Multi-tier provides graceful degradation: portions of the LAN continue to operate if one hub malfunctions extends maximum distance between node pairs (100m per Hub)

Hub limitations single collision domain results in no increase in max throughput multi-tier throughput same as single segment throughput individual LAN restrictions pose limits on number of nodes in same collision domain and on total allowed geographical coverage cannot connect different Ethernet types (e.g., 10BaseT and 100baseT)

Ethernet Hubs vs. Ethernet Switches An Ethernet switch is a packet switch for Ethernet frames Buffering of frames prevents collisions. Each port is isolated and builds its own collision domain An Ethernet Hub does not perform buffering: Collisions occur if two frames arrive at the same time. Hub Switch

Bridges Link Layer devices: operate on Ethernet frames, examining frame header and selectively forwarding frame based on its destination Bridge isolates collision domains since it buffers frames When frame is to be forwarded on segment, bridge uses CSMA/CD to access segment and transmit

Bridges (more) Bridge advantages: Isolates collision domains resulting in higher total max throughput, and does not limit the number of nodes nor geographical coverage Can connect different type Ethernet since it is a store and forward device Transparent: no need for any change to hosts LAN adapters

Bridges: frame filtering, forwarding same-LAN-segment frames not forwarded onto other LAN segments forwarding: how to know which LAN segment on which to forward frame? looks like a routing problem (more shortly!)

Interconnection with Backbone Bridge

Interconnection Without Backbone Not recommended for two reasons: - single point of failure at Computer Science hub - all traffic between EE and SE must path over CS segment

Bridge Filtering bridges learn which hosts can be reached through which interfaces: maintain filtering tables when frame received, bridge “learns” location of sender: incoming LAN segment records sender location in filtering table filtering table entry: (Node LAN Address, Bridge Interface, Time Stamp) stale entries in Filtering Table dropped (TTL can be 60 minutes)

Bridges Spanning Tree for increased reliability, desirable to have redundant, alternate paths from source to dest with multiple simultaneous paths, cycles result - bridges may multiply and forward frame forever solution: organize bridges in a spanning tree by disabling subset of interfaces Disabled

Bridges vs. Routers both store-and-forward devices routers: network layer devices (examine network layer headers) bridges are Link Layer devices routers maintain routing tables, implement routing algorithms bridges maintain filtering tables, implement filtering, learning and spanning tree algorithms

Routers vs. Bridges Bridges + and - + Bridge operation is simpler requiring less processing bandwidth - Topologies are restricted with bridges: a spanning tree must be built to avoid cycles - Bridges do not offer protection from broadcast storms (endless broadcasting by a host will be forwarded by a bridge)

Routers vs. Bridges Routers + and - + arbitrary topologies can be supported, cycling is limited by TTL counters (and good routing protocols) + provide firewall protection against broadcast storms - require IP address configuration (not plug and play) - require higher processing bandwidth bridges do well in small (few hundred hosts) while routers used in large networks (thousands of hosts)

Ethernet Switches Popular LAN device layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-B and A’-to-B’ simultaneously, no collisions large number of interfaces often: individual hosts, star-connected into switch Ethernet, but no collisions!

Ethernet Switches (more) Shared