Data Link Layer: Overview; Error Detection

Slides:



Advertisements
Similar presentations
Transport Layer3-1 Transport Overview and UDP. Transport Layer3-2 Goals r Understand transport services m Multiplexing and Demultiplexing m Reliable data.
Advertisements

5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
15 – Data link layer Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
1 ITC242 – Introduction to Data Communications Week 10 Topic 16 Data link control.
Review r The Internet (IP) Protocol m Datagram format m IP fragmentation m ICMP: Internet Control Message Protocol m NAT: Network Address Translation r.
Review r Multicast Routing m Three options m source-based tree: one tree per source shortest path trees reverse path forwarding m group-shared tree: group.
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 20.
Flow control and Error control ECS 152A Xin Liu Based on Kurose and Ross.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
Introduction1-1 1DT014/1TT821 Computer Networks I Chapter 5 Link Layer and LANs.
3-1 Last time □ Finished introduction and overview: ♦ Network access and physical media ♦ Internet structure and ISPs ♦ Delay & loss in packet-switched.
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Characteristics of Communication Systems
CS 1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
Link Layer5-1 Chapter 5: Link layer our goals:  understand principles behind link layer services:  error detection, correction  sharing a broadcast.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
27-Oct-15Computer Networks1 Outline Chapter 2: Direct Link Networks Encoding Framing Error Detection Sliding Window Algorithm Point-to-Point Links.
4: DataLink Layer1 Chapter 4: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
November 8 th, 2012 CS1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Error Detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 Week 5 Lecture 3 Data Link Layer. 2 Data Link Layer location application: supporting network applications –FTP, SMTP, STTP transport: host-host data.
11/25/20151 EEC-484 Computer Networks Lecture 12 Wenbing Zhao Cleveland State University
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
EEC-484/584 Computer Networks
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
Shashank Srivastava Motilal Nehru national Institute Of Information Technology, Allahabad Data Link Layer.
1 Point-to-Point Links: Encoding Encoding: Section 2.2 (Section 2.1 read on your own)
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
CPSC 441: Link Layer1 Link Layer Addressing Slides originally from Carey Williamson Notes derived from “ Computer Networking: A Top Down Approach”, by.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
1 Path attributes & BGP routes r advertised prefix includes BGP attributes m prefix + attributes = “route” r two important attributes: m AS-PATH: contains.
Chapter 5 Link Layer A note on the use of these ppt slides:
EEC-484/584 Computer Networks
Link Layer: Introduction
CS4470 Computer Networking Protocols
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Transport Layer Slides are originally from instructor: Carey Williamson at University of Calgary Very minor modification are made Notes derived from “Computer.
Chapter 3 outline 3.1 Transport-layer services
Data Link Layer.
Part III. Data Link Layer
CS 5565 Network Architecture and Protocols
Advanced Computer Networks
CIS 321 Data Communications & Networking
Computer Communication Networks
Chapter 5: The Data Link Layer
CS 1652 Jack Lange University of Pittsburgh
Part III Datalink Layer 10.
Chapter 5: The Data Link Layer
EEC-484/584 Computer Networks
CS 1652 Jack Lange University of Pittsburgh
September 19th, 2013 CS1652 Jack Lange University of Pittsburgh
Data Link Issues Relates to Lab 2.
Link Layer and LANs Its not about how hard you hit... It's about how hard you can get hit and keep moving forward 5: DataLink Layer.
Chapter 3 Transport Layer
Data Link Layer. Position of the data-link layer.
Transport Layer Our goals:
Presentation transcript:

Data Link Layer: Overview; Error Detection CS 352, Lecture 14 http://www.cs.rutgers.edu/~sn624/352-S19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors)

The Link layer Application Transport Network Link layer … Ethernet HTTPS … FTP HTTP SMTP DNS TCP UDP IP 802.11 802.3 ATM Transport Network Link layer Ethernet

Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to physically adjacent node over a link

Link layer: context transportation analogy: trip from Princeton to Lausanne limo: Princeton to JFK plane: JFK to Geneva train: Geneva to Lausanne tourist = datagram transport segment = communication link transportation mode = link layer protocol travel agent = routing algorithm datagram transferred by different link protocols over different links: e.g., Ethernet on first link, frame relay on intermediate links, 802.11 on last link each link protocol provides different services e.g., may or may not provide rdt over link

Link layer services Encoding framing, link access: convert bits to signals and recover bits from received signals framing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium “MAC” addresses used in frame headers to identify source, destination different from IP address! reliable delivery between adjacent nodes we learned how to do this already (chapter 3)! seldom used on low bit-error link (fiber, some twisted pair) wireless links: high error rates Q: why both link-level and end-end reliability?

Encoding Signals propagate over a physical medium modulate electromagnetic waves e.g., vary voltage Encode binary data onto signals e.g., 0 as low signal and 1 as high signal known as Non-Return to zero (NRZ) Problem: consecutive 1s and 0s, noise levels Bits NRZ 1

Encodings (cont’d) Bits NRZ Clock Manchester NRZI 1 1 Manchester encoding: +ve transition  0; -ve transition  1 XOR(bit,clock)

Error detection EDC = Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields Error detection not 100% reliable! protocol may miss some errors, but rarely larger EDC field yields better detection and correction otherwise

Parity checking single bit parity: two-dimensional bit parity: detect single bit errors two-dimensional bit parity: detect and correct single bit errors

Internet checksum (review) goal: detect “errors” (e.g., flipped bits) in transmitted packet (note: used at transport layer only) sender: treat segment contents as sequence of 16-bit integers checksum: addition (1’s complement sum) of segment contents sender puts checksum value into UDP checksum field receiver: compute checksum of received segment check if computed checksum equals checksum field value: NO - error detected YES - no error detected. But maybe errors nonetheless?

Cyclic redundancy check more powerful error-detection coding view data bits, D, as a binary number choose r+1 bit pattern (generator), G goal: choose r CRC bits, R, such that <D,R> exactly divisible by G (modulo 2) receiver knows G, divides <D,R> by G. If non-zero remainder: error detected! can detect all burst errors less than r+1 bits widely used in practice (Ethernet, 802.11 WiFi, ATM)

CRC example want: D.2r XOR R = nG equivalently: D.2r = nG XOR R if we divide D.2r by G, want remainder R to satisfy: D.2r G R = remainder[ ]

ARP How to get a MAC address for an IP address?

ARP: Address Resolution Protocol By default, NICs only pass on packets destined to their destination MAC address to the higher layers In a broadcast-based LAN, each source needs to know its destination’s MAC address After a packet reaches a router, the link layer header needs to be added to reflect the destination host on that link ARP returns a link layer address when given an Internet address Communication requires IP  MAC address translation

ARP packet format Hardware type: ex: Ethernet (1) Hardware address length: 6 octets Protocol Type: ex: IPv4 0x0800 (requesting IPv4 addr) Protocol address length: 4 octets Opcode ARP request:1 Opcode ARP reply:2

ARP operation Proto=IPv4 0x0800 Oper=1 ARP packet Sender H/W address Sender IP address Target H/W address target IP address ARP packet containing “128.195.1.38?” ARP Ethernet Address: 05:23:f4:3d:e1:04 IP Address: 128.195.1.20 Ethernet Address: 12:04:2c:6e:11:9c IP Address: 128.195.1.122 Ethernet Address: 98:22:ee:f1:90:1a IP Address: 128.195.1.38 Wants to transmit to 128.195.1.38 Ignored Answered