Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1.

Slides:



Advertisements
Similar presentations
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
1 Data Link Layer Ethernet Bridges Token Ring. 2 Summary of MAC protocols What do you do with a shared media? Channel Partitioning: time, frequency or.
5: DataLink Layer5-1 Asynchronous Transfer Mode: ATM r 1990’s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service.
5: Link Layer and Local Area Networks5c-1 Hubs, Bridges, and Switches r Used for extending LANs in terms of geographical coverage, number of nodes, administration.
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 23.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
Ethernet Switches r layer 2 (frame) forwarding, filtering using LAN addresses r Switching: A-to-B and A’- to-B’ simultaneously, no collisions r large number.
5: DataLink Layer ATM. Trouble compiling the project code on Ubuntu: r If you get the error: h_addr not a member of struct hostent In the file.
1 ATM and MPLS ECS 152A. 2 Virtualization of networks Virtualization of resources: a powerful abstraction in systems engineering: r computing examples:
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can.
5: DataLink Layer – Ethernet, Hubs and Switches.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
1 Interconnecting LAN segments Repeaters Hubs Bridges Switches.
5: DataLink Layer5a-1 Summary of MAC protocols r What do you do with a shared media? m Channel Partitioning, by time, frequency or code Time Division,Code.
5: DataLink Layer5a-1 Summary of MAC protocols r What do you do with a shared media? m Channel Partitioning, by time, frequency or code Time Division,Code.
Lecture 3#1#1 LAN Technologies Completing Lecture 2.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 5 outline 5.1 Introduction and services
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Introduction 1 Lecture 26 Link Layer (PPP, Virtualization) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
Link Layer 5.1 Introduction and services
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Computer Networking Bridges/Switches, , PPP.
Asynchronous Transfer Mode: ATM r 1980s/1990’s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture.
5: DataLink Layer5-1 VLANs. 5: DataLink Layer5-2 Introduction r Need to have different broadcast domains on the same physical network r E.g. Consider.
Chapter 5: The Data Link Layer
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
ATM r ATM (Asynchronous Transfer Mode) is the switching and transport technology of the B-ISDN (Broadband ISDN) architecture (1980) r Goals: high speed.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Ethernet Switches r layer 2 (frame) forwarding, filtering using LAN addresses r Switching: A-to-B and A’- to-B’ simultaneously, no collisions r large number.
5: DataLink Layer5-1 Point to Point Data Link Control r one sender, one receiver, one link: easier than broadcast link: m no Media Access Control m no.
Ethernet Switches r layer 2 (frame) forwarding, filtering using LAN addresses r Switching: A-to-B and A’- to-B’ simultaneously, no collisions r large number.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
4: DataLink Layer1 Hubs r Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Link Layer 5.1 Introduction and services
Chapter 5 Link Layer and LANs
CS 5565 Network Architecture and Protocols
EE 122: Lecture 19 (Asynchronous Transfer Mode - ATM)
Part 5: Link Layer Technologies
Hubs Hubs are essentially physical-layer repeaters:
Point to Point Data Link Control
Hubs Hubs are essentially physical-layer repeaters:
X.25 and Frame Relay Like ATM: wide area network technologies
Protocol layering and data
18: Ethernet, Hubs, Bridges, Switches
Protocol layering and data
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1

Outline Ethernet (IEEE 802.1) Hubs, Bridges, and Routers IEEE Token Ring PPP ATM X.25 Frame Relay 2

Ethernet “Dominant” LAN technology (aka IEEE 802.3): Cheap $20 for 100Mbs! First wildly used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10, 100, 1000 Mbps; 10, 40, 100 Gbps 3 Metcalfe’s Ethernet sketch

Ethernet Frame Structure (1) Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern followed by one byte with pattern Used to synchronize receiver, sender clock rates 4

Ethernet Frame Structure (2) Addresses: 6 bytes, frame is received by all adapters on a LAN and dropped if address does not match Type: indicates the higher layer protocol, mostly IP but others may be supported such as Novell IPX and AppleTalk) CRC: checked at receiver, if error is detected, the frame is simply dropped 5

Ethernet’s CSMA/CD (1) 6

Ethernet’s CSMA/CD (2) Jam Signal: make sure all other transmitters are aware of collision; 48 bits Exponential Backoff: Goal: adapt retransmission attempts to estimated current load – Heavy load: random wait will be longer First collision: choose K from {0,1}; delay is K × 512 bit transmission times After second collision: choose K from {0,1,2,3}… After ten or more collisions, choose K from {0,1,2,3,4,…,1023} 7

Ethernet Technologies: 10Base2 10: 10 Mbps; 2: under 200 meters max cable length Thin coaxial cable in a bus topology Repeaters used to connect up to multiple segments Repeater repeats bits it hears on one interface to its other interfaces: physical layer device only! 8

10BaseT and 100BaseT (1) 10/100 Mbps rate; latter called “Fast Ethernet” T stands for Twisted Pair Hub to which nodes are connected by twisted pair, thus “star topology” CSMA/CD implemented at hub 9

10BaseT and 100BaseT (2) Max distance from node to Hub is 100 meters Hub can disconnect “jabbering adapter” Hub can gather monitoring information, statistics for display to LAN administrators 10

Outline Ethernet (IEEE 802.1) Hubs, Bridges, and Routers IEEE Token Ring PPP ATM X.25 Frame Relay 11

Hubs (1) Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces Hubs can be arranged in a hierarchy (or multi-tier design), with backbone hub at its top 12

Hubs (2) Each connected LAN referred to as LAN segment Hubs do not isolate collision domains: node may collide with any node residing at any segment in LAN Hub Advantages: – Simple, inexpensive device – Multi-tier provides graceful degradation: portions of the LAN continue to operate if one hub malfunctions – Extends maximum distance between node pairs (100 m per hub) 13

Hub Limitations Single collision domain results in no increase in max throughput – Multi-tier throughput same as single segment throughput Individual LAN restrictions pose limits on number of nodes in same collision domain and on total allowed geographical coverage Cannot connect different Ethernet types (e.g., 10BaseT and 100baseT) 14

Bridges (1) Link layer devices: operate on Ethernet frames, examining frame header and selectively forwarding frame based on its destination Bridge isolates collision domains since it buffers frames When frame is to be forwarded on segment, bridge uses CSMA/CD to access segment and transmit 15

Bridges (2) Bridge advantages: – Isolates collision domains resulting in higher total max throughput, and does not limit the number of nodes nor geographical coverage – Can connect different type Ethernet since it is a store and forward device – Transparent: no need for any change to hosts LAN adapters 16

Bridges: Frame Filtering, Forwarding Bridges filter packets – Same-LAN-segment frames not forwarded onto other LAN segments Forwarding: – How to know which LAN segment on which to forward frame? – Looks like a routing problem (more shortly!) 17

Bridge Learning: Example (1) Suppose C sends frame to D and D replies back with frame to C 18 C sends frame, bridge has no info about D, so floods to both LANs – Bridge notes that C is on port 1 – Frame ignored on upper LAN – Frame received by D

Bridge Learning: Example (2) 19 D generates reply to C, sends – Bridge sees frame from D – Bridge notes that D is on interface 2 – Bridge knows C on interface 1, so selectively forwards frame out via interface 1

Bridges vs. Routers Both store-and-forward devices – Routers: network layer devices (examine network layer headers) – Bridges are Link Layer devices Routers maintain routing tables, implement routing algorithms Bridges maintain filtering tables, implement filtering, learning and spanning tree algorithms 20

Routers vs. Bridges Bridges: Advantages and Disadvantages Advantage: Bridge operation is simpler requiring less processing bandwidth Disadvantages: Topologies are restricted with bridges: a spanning tree must be built to avoid cycles Bridges do not offer protection from broadcast storms (endless broadcasting by a host will be forwarded by a bridge) 21

Routers vs. Bridges Routers: Advantages and Disadvantages Advantages: Arbitrary topologies can be supported, cycling is limited by TTL counters (and good routing protocols) Provide firewall protection against broadcast storms Disadvantages: Require IP address configuration (not plug and play) Require higher processing bandwidth Bridges do well in small networks (few hundred hosts) while routers used in large networks (thousands of hosts) 22

Ethernet Switches (1) Layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-B and A′-to-B′ simultaneously, no collisions Large number of interfaces Often: individual hosts, star- connected into switch – Ethernet, but no collisions! 23

Ethernet Switches (2) Cut-through switching: frame forwarded from input to output port without awaiting for assembly of entire frame – Slight reduction in latency Combinations of shared/dedicated, 10/100/1000 Mbps interfaces 24

Ethernet Switches (3) 25 Dedicated Shared

Outline Ethernet (IEEE 802.1) Hubs, Bridges, and Routers IEEE Token Ring PPP ATM X.25 Frame Relay 26

Token Passing: IEEE Standard (1) 4 Mbps Max token holding time: 10 ms, limiting frame length 27 SD, ED mark start, end of packet AC: access control byte: – Token bit: value 0 means token can be seized, value 1 means data follows FC – Priority bits: priority of packet – Reservation bits: station can write these bits to prevent stations with lower priority packet from seizing token after token becomes free

Token Passing: IEEE Standard (2) 28 FC: frame control used for monitoring and maintenance Source, destination address: 48 bit physical address, as in Ethernet Data: packet from network layer Checksum: CRC FS: frame status: set by destination, read by sender m Set to indicate destination up, frame copied OK from ring m DLC-level ACKing

Interconnecting LANs Q: Why not just one big LAN? Limited amount of supportable traffic: on single LAN, all stations must share bandwidth Limited length: specifies maximum cable length Large “collision domain” (can collide with many stations) Limited number of stations: have token passing delays at each station 29

Outline Ethernet (IEEE 802.1) Hubs, Bridges, and Routers IEEE Token Ring PPP ATM X.25 Frame Relay 30

Point to Point Data Link Control One sender, one receiver, one link: easier than broadcast link: – No Media Access Control – No need for explicit MAC addressing – e.g., dialup link, ISDN line Popular point-to-point DLC protocols: – PPP (point-to-point protocol) – HDLC: High level data link control (Data link used to be considered “high layer” in protocol stack! 31

PPP Design Requirements [RFC 1557] Packet framing: encapsulation of network-layer datagram in data link frame – Carry network layer data of any network layer protocol (not just IP) at same time – Ability to demultiplex upwards Bit transparency: must carry any bit pattern in the data field Error detection (no correction) Connection liveness: detect, signal link failure to network layer Network layer address negotiation: endpoints can learn/configure each other’s network address 32

PPP Non-Requirements No error correction/recovery No flow control Out-of-order delivery OK No need to support multipoint links (e.g., polling) Error recovery, flow control, data re-ordering all relegated to higher layers! 33

PPP Data Frame (1) Flag: delimiter (framing) Address: does nothing (only one option) Control: does nothing; in the future possible multiple control fields Protocol: upper layer protocol to which frame delivered (e.g., PPP-LCP, IP, IPCP, etc.) 34

PPP Data Frame (2) Info: upper layer data being carried Check: cyclic redundancy check for error detection 35

Byte Stuffing (1) “Data transparency” requirement: data field must be allowed to include flag pattern – Q: Is received data or flag? Sender: adds (“stuffs”) extra byte after each data byte Receiver: – Two bytes in a row: discard first byte, continue data reception – Single : flag byte 36

Byte Stuffing (2) Flag byte pattern in data to send Flag byte pattern plus stuffed byte in transmitted data 37

PPP Data Control Protocol Before exchanging network-layer data, data link peers must Configure PPP link (max. frame length, authentication) Learn/configure network layer information – For IP: carry IP Control Protocol (IPCP) msgs (protocol field: 8021) to configure/learn IP address 38

Outline Ethernet (IEEE 802.1) Hubs, Bridges, and Routers IEEE Token Ring PPP ATM X.25 Frame Relay 39

Asynchronous Transfer Mode: ATM 1980s/1990s standard for high-speed (155 Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport of carrier’s voice, video, data – Meeting timing/QoS requirements of voice, video (versus Internet best-effort model) – “Next generation” telephony: technical roots in telephone world – Packet-switching (fixed length packets, called “cells”) using virtual circuits 40

ATM Architecture Adaptation layer: only at edge of ATM network – data segmentation/reassembly – roughly analagous to Internet transport layer ATM layer: “network” layer – cell switching, routing Physical layer 41

ATM: Network or Link Layer? Vision: end-to-end transport: “ATM from desktop to desktop” – ATM is a network technology Reality: used to connect IP backbone routers – “IP over ATM” – ATM as switched link layer, connecting IP routers 42

ATM Adaptation Layer (AAL) (1) ATM Adaptation Layer (AAL): “adapts” upper layers (IP or native ATM applications) to ATM layer below AAL present only in end systems, not in switches AAL layer segment (header/trailer fields, data) fragmented across multiple ATM cells – Analogy: TCP segment in many IP packets 43

ATM Adaption Layer (AAL) (2) Different versions of AAL layers, depending on ATM service class: AAL1: for CBR (Constant Bit Rate) services, e.g. circuit emulation AAL2: for VBR (Variable Bit Rate) services, e.g., MPEG video AAL5: for data (e.g., IP datagrams) AAL PDU ATM cell User data 44

AAL5 - Simple And Efficient AL (SEAL) AAL5: low overhead AAL used to carry IP datagrams – 4 byte cyclic redundancy check – PAD ensures payload multiple of 48bytes – Large AAL5 data unit to be fragmented into 48- byte ATM cells 45

ATM Layer Service: transport cells across ATM network Analogous to IP network layer Very different services than IP network layer Network Architecture Service Model Guarantees?Congestion Feedback BandwidthLossOrderTiming InternetBest effortNoneNo No (inferred via loss) ATMCBRConstant rate Yes No congestion ATMVBRGuaranteed rate Yes No congestion ATMABRGuaranteed minimum NoYesNoYes ATMUBRNoneNoYesNo 46

ATM Layer: Virtual Circuits (1) VC transport: cells carried on VC from source to dest – Call setup, teardown for each call before data can flow – Each packet carries VC identifier (not destination ID) – Every switch on source-dest path maintain “state” for each passing connection – Link, switch resources (bandwidth, buffers) may be allocated to VC to get circuit-like perf. Permanent VCs (PVCs) – Long lasting connections – Typically: “permanent” route between to IP routers Switched VCs (SVC): – Dynamically set up on per-call basis 47

ATM VCs (2) Advantages of ATM VC approach: – QoS performance guarantee for connection mapped to VC (bandwidth, delay, delay jitter) Drawbacks of ATM VC approach: – Inefficient support of datagram traffic – One PVC between each source/dest pair) does not scale (N 2 connections needed) – SVC introduces call setup latency, processing overhead for short lived connections 48

ATM Layer: ATM Cell 5-byte ATM cell header 48-byte payload – Why?: small payload short cell-creation delay for digitized voice – Halfway between 32 and 64 (compromise!) Cell header Cell format 49

ATM Cell Header VCI: virtual channel ID – Will change from link to link thru net PT: Payload type (e.g. RM cell versus data cell) CLP: Cell Loss Priority bit – CLP = 1 implies low priority cell, can be discarded if congestion HEC: Header Error Checksum – Cyclic redundancy check 50

ATM Physical Layer: Sub-Layers Two pieces (sub-layers) of physical layer: Transmission Convergence Sublayer (TCS): adapts ATM layer above to PMD sublayer below Physical Medium Dependent: depends on physical medium being used TCS Functions: – Header checksum generation: 8 bits CRC – Cell delineation – With “unstructured” PMD sub-layer, transmission of idle cells when no data cells to send 51

ATM Physical Layer Physical Medium Dependent (PMD) sublayer SONET/SDH: transmission frame structure (like a container carrying bits); – bit synchronization; – bandwidth partitions (TDM); – several speeds: OC1 = Mbps; OC3 = Mbps; OC12 = Mbps T1/T3: transmission frame structure (old telephone hierarchy): 1.5 Mbps/ 45 Mbps unstructured: just cells (busy/idle) 52

IP-Over-ATM (1) Classic IP only 3 “networks” (e.g., LAN segments) MAC (802.3) and IP addresses Replace “network” (e.g., LAN segment) with ATM network ATM addresses, IP addresses ATM network Ethernet LANs Ethernet LANs 53

IP-Over-ATM (2) Issues: r IP datagrams into ATM AAL5 PDUs r From IP addresses to ATM addresses m Just like IP addresses to MAC addresses! ATM network Ethernet LANs 54

Datagram Journey in IP-over-ATM Network At Source Host: – IP layer finds mapping between IP, ATM dest address (using ARP) – Passes datagram to AAL5 – AAL5 encapsulates data, segments to cells, passes to ATM layer ATM network: moves cell along VC to destination At Destination Host: – AAL5 reassembles cells into original datagram – If CRC OK, datgram is passed to IP 55

ARP in ATM Nets ATM network needs destination ATM address – Just like Ethernet needs destination Ethernet address IP/ATM address translation done by ATM ARP (Address Resolution Protocol) – ARP server in ATM network performs broadcast of ATM ARP translation request to all connected ATM devices – Hosts can register their ATM addresses with server to avoid lookup 56

Outline Ethernet (IEEE 802.1) Hubs, Bridges, and Routers IEEE Token Ring PPP ATM X.25 Frame Relay 57

X.25 and Frame Relay Like ATM: Wide area network technologies Virtual circuit oriented Origins in telephony world Can be used to carry IP datagrams – Can thus be viewed as Link Layers by IP protocol 58

X.25 X.25 builds VC between source and destination for each user connection Per-hop control along path – Error control (with retransmissions) on each hop using LAP-B Variant of the HDLC protocol – Per-hop flow control using credits Congestion arising at intermediate node propagates to previous node on path Back to source via back pressure 59

IP versus X.25 X.25: reliable in-sequence end-end delivery from end-to-end – “intelligence in the network” IP: unreliable, out-of-sequence end-end delivery – “intelligence in the endpoints” gigabit routers: limited processing possible 2000–: IP wins 60

Outline Ethernet (IEEE 802.1) Hubs, Bridges, and Routers IEEE Token Ring PPP ATM X.25 Frame Relay 61

Frame Relay (1) Designed in late 1980s, widely deployed in the 1990s Frame relay service: – No error control – End-to-end congestion control 62

Frame Relay (2) Designed to interconnect corporate customer LANs – Typically permanent VCs: “pipe” carrying aggregate traffic between two routers – Switched VCs: as in ATM Corporate customer leases FR service from public Frame Relay network (eg, Sprint, AT&T) 63

Summary: Link Layer Technologies Ethernet (IEEE 802.1) Hubs, bridges, routers IEEE Token Ring PPP ATM X.25 Frame Relay 64