Optional Read Slides: Link Layer

Slides:



Advertisements
Similar presentations
Lecture 15 Link Layer Protocols. Lecture 15-2 Link Layer Services r Framing and link access: encapsulate datagram into frame adding header and trailer,
Advertisements

5: DataLink Layer5a-1 Chapter 5 Data Link Layer Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
Link Layer Protocols. Link Layer Services  Framing and link access:  encapsulate datagram into frame adding header and trailer,  implement channel.
Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
1 The Data Link Layer Based on slides by Shiv. Kalyanaraman and B. Sidkar.
15 – Data link layer Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
5: DataLink Layer5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Ethernet.
11/11/ /13/2003 DLL, Error Detection, MAC, ARP November 11-13, 2003.
Review r Multicast Routing m Three options m source-based tree: one tree per source shortest path trees reverse path forwarding m group-shared tree: group.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
Medium Access Control Sublayer
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Chap 4 Multiaccess Communication (Part 1)
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
CSC4220/6220 Computer Networks
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Medium Access Control NWEN302 Computer Network Design.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 Week 5 Lecture 3 Data Link Layer. 2 Data Link Layer location application: supporting network applications –FTP, SMTP, STTP transport: host-host data.
5: DataLink Layer5-1 The Data Link Layer Chapter 5 Kurose and Ross Today 5.1 and 5.3.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Link Layer: Partitioning Dimensions; Media Access Control using Aloha Y. Richard Yang 11/01/2012.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r Understand principles behind data link layer services: m error detection, error correction.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, error correction.
Transport Layer 3-1 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
2. Data Link Layer: Medium Access Control. Scheduling.
EEC-484/584 Computer Networks
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Link Layer 5.1 Introduction and services
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: OFDM Implementation Wireless MAC Layer Design Yang (Richard) Yang Computer.
Chapter 5 Link Layer and LANs
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Computer Communication Networks
Chapter 5: The Data Link Layer
CS 457 – Lecture 6 Ethernet Spring 2012.
Data Link Issues Relates to Lab 2.
Services of DLL Framing Link access Reliable delivery
Multiple access.
EEC-484/584 Computer Networks
Link Layer; Media Access Control
Data Link Issues Relates to Lab 2.
Communication Networks NETW 501
Overview Jaringan Komputer (3)
The Medium Access Control Sublayer
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Link Layer 5.1 Introduction and services
7- chapter Seven Local Area Networks (LAN)
Link Layer: Multiple Access
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Optional Read Slides: Link Layer

Roadmap: The Hourglass Architecture of the Internet Telnet Email FTP WWW TCP UDP IP Ethernet Wireless FDDI ADSL CableDOCSIS

Link Layer Services Framing encapsulate datagram into frame, adding header, trailer and error detection/correction Multiplexing/demultiplexing frame headers to identify src, dest Reliable delivery between adjacent nodes we learned how to do this already ! seldom used on low bit error link (fiber, some twisted pair) common for wireless links: high error rates Media access control Forwarding/switching with a link-layer (Layer 2) domain

Adaptors Communicating datagram link layer protocol receiving node sending node frame frame adapter adapter link layer typically implemented in “adaptor” (aka NIC) Ethernet card, modem, 802.11 card, cloud virtual switch adapter is semi-autonomous, implementing link & physical layers in most link-layer, each adapter has a unique link layer address (also called MAC address)

Outline Link layer Overview Media access Link layer forwarding

Multiple Access Links and Protocols Many link layers use broadcast (shared wire or medium) traditional Ethernet; Cable networks 802.11 wireless LAN; cellular networks satellite Problem: if two or more simultaneous transmissions, due to interference, only one node can send successfully at a time (see CDMA later for an exception)

Multiple Access Protocol Protocol that determines how nodes share channel, i.e., determines when nodes can transmit Communication about channel sharing must use channel itself ! Discussion: properties of an ideal multiple access protocol.

Ideal Mulitple Access Protocol Broadcast channel of rate R bps Efficiency: when only one node wants to transmit, it can send at full rate R Rate allocation: simple fairness: when N nodes want to transmit, each can send at average rate R/N we may need more complex rate control Decentralized: no special node to coordinate transmissions no synchronization of clocks Simple

MAC Protocols Goals efficient, fair, decentralized, simple Three broad classes: non-partitioning random access allow collisions “taking-turns” a token coordinates shared access to avoid collisions channel partitioning divide channel into smaller “pieces” (time slot, frequency, code)

Random Access Protocols Examples of random access MAC protocols: slotted ALOHA and pure ALOHA CSMA and CSMA/CD, CSMA/CA Ethernet, WiFi 802.11 Key design points: when to access channel? how to detect collisions? how to recover from collisions?

Slotted Aloha [Norm Abramson] Time is divided into equal size slots (= pkt trans. time) Node with new arriving pkt: transmit at beginning of next slot If collision: retransmit pkt in future slots with probability p, until successful. Success (S), Collision (C), Empty (E) slots

Slotted Aloha in Real Life call setup in GSM Notations: Broadcast control channel (BCCH): from base station, announces cell identifier, synchronization Random access channel (RACH): MSs for initial access, slotted Aloha access grant channel (AGCH): BTS informs an MS its allocation standalone dedicated control channel (SDCCH): signaling and short message between MS and an MS Traffic channels (TCH) MS BTS RACH (request signaling channel) AGCH (assign signaling channel) SDCCH (request call setup) SDCCH message exchange SDCCH (assign TCH) Communication

Slotted Aloha Efficiency Q: What is the fraction of successful slots? suppose n stations have packets to send suppose each transmits in a slot with probability p - prob. of succ. by a specific node: p (1-p)(n-1) - prob. of succ. by any one of the N nodes S(p) = n * Prob (only one transmits) = n p (1-p)(n-1)

Goodput vs. Offered Load for Slotted Aloha S = throughput = “goodput” (success rate) 0.5 1.0 1.5 2.0 G = offered load = np when p n < 1, as p (or n) increases probability of empty slots reduces probability of collision is still low, thus goodput increases when p n > 1, as p (or n) increases, probability of empty slots does not reduce much, but probability of collision increases, thus goodput decreases goodput is optimal when p n = 1

Dynamics of (Slotted) Aloha Slotted Aloha has maximum throughput when np = 1 Implies we need to adjust p as the number of backlog stations varies. Early design question: what is the effect if we do not change p-–use a fixed p Assume we have a total of m stations (the machines on a LAN): n of them are currently backlogged, each tries with a (fixed) probability p the remaining m-n stations are not backlogged. They may start to generate packets with a probability pa, where pa is much smaller than p

each transmits with prob. p Model n backlogged each transmits with prob. p m-n: unbacklogged each transmits with prob. pa

Dynamics of Aloha: Effects of Fixed Probability - assume a total of m stations pa << p success rate is the departure rate, the rate the backlog is reducing desirable stable point successful transmission rate at offered load np + (m-n)pa dep. and arrival rate of backlogged stations new arrival rate: (m-n) pa undesirable stable point m n: number of backlogged stations offered load = 1 Lesson: if we fix p, but n varies, we may have an undesirable stable point

Summary of Problems of Aloha Protocols slotted Aloha has better efficiency than pure Aloha but clock synchronization is hard to achieve Aloha protocols have low efficiency due to collision or empty slots when offered load is optimal (p = 1/N), the goodput is only about 37% when the offered load is not optimal, the goodput is even lower undesirable steady state at a fixed transmission rate, when the number of backlogged stations varies Ethernet design: address the problems: approximate slotted Aloha without clock synchronization reduce the penalty of collision or empty slots infer optimal transmission rate

Ethernet “Dominant” LAN technology: First widely used LAN technology Kept up with speed race: 10 Mbps, 100 Mbps, 1 Gbps, 10 Gbps, 100 Gbps Metcalfe’s Ethernet sketch

The Basic MAC Mechanisms of Ethernet get a packet from upper layer; K := 0; n := 0; // K: control wait time; n: no. of collisions repeat: wait for K * 512 bit-time; while (network busy) wait; wait for 96 bit-time after detecting no signal; transmit and detect collision; if detect collision stop and transmit a 48-bit jam signal; n ++; m:= min(n, 10), where n is the number of collisions choose K randomly from {0, 1, 2, …, 2m-1}. if n < 16 goto repeat else give up

MAC Protocols Goals efficient, fair, decentralized, simple Three broad classes: non-partitioning random access allow collisions “taking-turns” a token coordinates shared access to avoid collisions channel partitioning divide channel into smaller “pieces” (time slot, frequency, code)

Example Channel Partitioning: CDMA CDMA (Code Division Multiple Access) Used mostly in wireless broadcast channels (cellular, satellite, etc) A spread-spectrum technique History: http://people.seas.harvard.edu/~jones/cscie129/nu_lectures/lecture7/hedy/lemarr.htm Examples: Sprint and Verizon, WCDMA

CDMA: Encoding All users share same frequency, but each user m has its own unique “chipping” sequence (i.e., code) cm to encode data, i.e., code set partitioning e.g. cm = 1 1 1 -1 1 -1 -1 -1 Assume original data are represented by 1 and -1 Encoded signal = (original data) modulated by (chipping sequence) assume cm = 1 1 1 -1 1 -1 -1 -1 if data is d, send d cm, if data d is 1, send cm if data d is -1 send -cm

CDMA: Encoding tb: bit period tc: chip period tb user data d(t) 1 -1 X chipping sequence c(t) -1 1 1 -1 1 -1 1 -1 1 1 -1 1 -1 1 = resulting signal -1 1 1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 tb: bit period tc: chip period

CDMA: Decoding Inner-product (summation of bit-by-bit product) of encoded signal and chipping sequence if inner-product > 0, the data is 1; else -1

CDMA Encode/Decode Code of user m cm: 1 1 1 -1 1 -1 -1 -1 The number of bits of each chipping sequence is M

CDMA: Deal with Multiple-User Interference Two codes Ci and Cj are orthogonal, if , where we use “.” to denote inner product, e.g. If codes are orthogonal, multiple users can “coexist” and transmit simultaneously with minimal interference: C1: 1 1 1 -1 1 -1 -1 -1 C2: 1 -1 1 1 1 -1 1 1 ----------------------------------------- C1 . C2 = 1 +(-1) + 1 + (-1) +1 + 1+ (-1)+(-1)=0 Analogy: Speak in different languages!

CDMA: Two-Sender Interference Code 1: 1 1 1 -1 1 -1 -1 -1 Code 2: 1 -1 1 1 1 -1 1 1

Generating Orthogonal Codes The most commonly used orthogonal codes in current CDMA implementation are the Walsh Codes

Walsh Codes 1,1,1,1,1,1,1,1 1,1,1,1 ... 1,1,1,1,-1,-1,-1,-1 1,1 1,1,-1,-1,1,1,-1,-1 ... 1,1,-1,-1 X,X 1,1,-1,-1,-1,-1,1,1 1 X 1,-1,1,-1,1,-1,1,-1 X,-X ... 1,-1,1,-1 1,-1,1,-1,-1,1,-1,1 1,-1 n 2n 1,-1,-1,1,1,-1,-1,1 ... 1,-1,-1,1 1,-1,-1,1,-1,1,1,-1 1 2 4 8

Orthogonal Variable Spreading Factor (OSVF) Variable codes: Different users use different lengths spreading codes Orthogonal: diff. users’ codes are orthogonal 1,1,1,1,1,1,1,1 1,1,1,1 ... 1,1,1,1,-1,-1,-1,-1 1,1 1,1,-1,-1,1,1,-1,-1 ... 1,1,-1,-1 X,X 1,1,-1,-1,-1,-1,1,1 1 X 1,-1,1,-1,1,-1,1,-1 X,-X ... No parent-child on the code tree 1,-1,1,-1 1,-1,1,-1,-1,1,-1,1 1,-1 SF=n SF=2n 1,-1,-1,1,1,-1,-1,1 ... 1,-1,-1,1 1,-1,-1,1,-1,1,1,-1 SF=1 SF=2 SF=4 SF=8 If user 1 is given code [1,1], what orthogonal codes can we give to other users?

WCDMA Orthognal Variable Spreading Factor (OSVF) Flexible code (spreading factor) allocation up link SF: 4 – 256 down link SF: 4 - 512 WCDMA downlink No parent-child on the code tree

SDCCH message exchange Combined Random Access + Channel Partition: GSM Logical Channels and Request call setup from an MS Control channels Broadcast control channel (BCCH) from base station, announces cell identifier, synchronization Common control channels (CCCH) paging channel (PCH): base transceiver station (BTS) pages a mobile host (MS) random access channel (RACH): MSs for initial access, slotted Aloha access grant channel (AGCH): BTS informs an MS its allocation Dedicated control channels standalone dedicated control channel (SDCCH): signaling and short message between MS and an MS Traffic channels (TCH) MS BTS RACH (request signaling channel) AGCH (assign signaling channel) SDCCH (request call setup) SDCCH message exchange SDCCH (assign TCH) Communication

Discussions Advantages of channel partitioning over random access Advantages of random access over channel partitioning