5: DataLink Layer5a-1 Chapter 5 Data Link Layer Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
CPSC 441 TUTORIAL TA: FANG WANG HUBS, SWITCHES AND BRIDGES Parts of the slides contents are courtesy of the following people: Jim Kurose, Keith Ross:
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
5: Link Layer and Local Area Networks5c-1 Hubs, Bridges, and Switches r Used for extending LANs in terms of geographical coverage, number of nodes, administration.
Chapter 6 High-Speed LANs1 Chapter 6 High-Speed LANs.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
1 Introduction to Wireless Networks Michalis Faloutsos.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Interconnecting LAN segments Repeaters Hubs Bridges Switches.
6: Wireless and Mobile Networks Wireless LANs.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
11/18/ /20/2003 Ethernet, Hubs/Bridges/Switches, Wireless November 19-20, 2003.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Connecting LANs, Backbone Networks, and Virtual LANs
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Hubs, Bridges, and Switches (oh my) r Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. r Differ.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 Network Equipment Technologies Network Equipment Technologies.
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
Computer Networking Bridges/Switches, , PPP.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
5: DataLink Layer5c-1 Today r Assign Homework m Ch5 #1,4,5,7,11,12 Due Wednesday October 22 m Ch5 #13-16,18,20 Due Monday, October 27 r Project #2 due.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
5: DataLink Layer5-1 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r Multi-tier design provides.
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
4: DataLink Layer1 Hubs r Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
5: DataLink Layer5-1 Link-layer switches. 5: DataLink Layer5-2 Hubs … physical-layer (“dumb”) repeaters: m bits coming in one link go out all other links.
Chapter 3 Part 1 Switching and Bridging
Link Layer 5.1 Introduction and services
Chapter 6 Wireless and Mobile Networks
Computer Communication Networks
Chapter 4 Data Link Layer Switching
Hubs Hubs are essentially physical-layer repeaters:
Chapter 3 Part 1 Switching and Bridging
Hubs Hubs are essentially physical-layer repeaters:
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
EEC-484/584 Computer Networks
Introduction to Wireless Networks
EEC-484/584 Computer Networks
18: Ethernet, Hubs, Bridges, Switches
ECSE-4730: Computer Communication Networks (CCN)
Chapter 5 Data Link Layer – Hub, Switch
Presentation transcript:

5: DataLink Layer5a-1 Chapter 5 Data Link Layer Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley, July A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in powerpoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) in substantially unaltered form, that you mention their source (after all, we’d like people to use our book!)  If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

5: DataLink Layer5a-2 5a-1 5: DataLink Layer Chapter 5 outline r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 LAN addresses and ARP r 5.5 Ethernet r 5.6 Hubs, bridges, and switches r 5.7 Wireless links and LANs r 5.8 PPP r 5.9 ATM r 5.10 Frame Relay

5: DataLink Layer5a-3 5a-2 5: DataLink Layer Hubs Physical Layer device  Simplest way to interconnect LANs  Operates on bits rather than frames  When a bit comes into a hub interface, the hub broadcasts the bit on all the other interfaces.

5: DataLink Layer5a-4 5a-3 5: DataLink Layer Interconnecting with hubs r Multi-tier hub design (hierarchy) r Backbone hub interconnects three academic depts or “LAN segments” r Depts have a 10BaseT Ethernet that provides network access r Hosts have point-to-point connections to departmental hub

5: DataLink Layer5a-5 5a-4 5: DataLink Layer Hubs: Benefits r Provides interdepartmental communication r Extends the max distance betw any pair of nodes r Multi-tier design provides a degree of graceful degradation m If one dept malfunctions, the backbone hub can detect the prob and disconnect the dept hub

5: DataLink Layer5a-6 5a-5 5: DataLink Layer Hubs: Limitations r When departmental LANs are interconnected by a hub, then the independent collision domains become one collision domain. r If depts use different Ethernet technologies, may not be able to interconnect them r Each Ethernet technology has restrictions on m max # of nodes in collision domain m max distance between two hosts m max # of tiers m Constrains # of hosts as well as geographical reach of the multi-tier LAN.

5: DataLink Layer5a-7 5a-6 5: DataLink Layer Bridges Link layer device r Operate on Ethernet frames unlike hubs r are full-fledged packet switches that forward and filter Ethernet frames using the LAN destination addresses r examines frame header and selectively forwards frame based on MAC dest address r when frame is to be forwarded on segment, uses CSMA/CD to access segment

5: DataLink Layer5a-8 5a-7 5: DataLink Layer Bridges: traffic isolation r Bridge installation breaks LAN into LAN segments r bridges filter packets: m same-LAN-segment frames not usually forwarded onto other LAN segments m segments become separate collision domains bridge collision domain collision domain = hub = host LAN (IP network) LAN segment

5: DataLink Layer5a-9 5a-8 5: DataLink Layer Forwarding How do determine to which LAN segment to forward frame? Looks like a routing problem...

5: DataLink Layer5a-10 5a-9 5: DataLink Layer Self learning r A bridge has a bridge table r entry in bridge table: m (Node LAN Address, Bridge Interface, Time Stamp) m stale entries in table dropped (TTL can be 60 min) r bridges learn which hosts can be reached through which interfaces m when frame received, bridge “learns” location of sender: incoming LAN segment m records sender/location pair in bridge table

5: DataLink Layer5a-11 5a-10 5: DataLink Layer Filtering/Forwarding When bridge receives a frame: index bridge table using MAC dest address if entry found for destination then{ if dest on segment from which frame arrived then drop the frame else forward the frame on interface indicated } else flood forward to all but the interface on which the frame arrived

5: DataLink Layer5a-12 5a-11 5: DataLink Layer Bridge example Suppose C sends frame to D and D replies back with frame to C.  Bridge receives frame from from C  notes in bridge table that C is on interface 1  because D is not in table, bridge sends frame into interfaces 2 and 3  frame received by D

5: DataLink Layer5a-13 5a-12 5: DataLink Layer Bridge Learning: example  D generates frame for C, sends  bridge receives frame  notes in bridge table that D is on interface 2  bridge knows C is on interface 1, so selectively forwards frame to interface 1 D C

5: DataLink Layer5a-14 5a-15 5: DataLink Layer Bridges Spanning Tree r for increased reliability, desirable to have redundant, alternative paths from source to dest r with multiple paths, cycles result - bridges may multiply and forward frame forever r solution: organize bridges in a spanning tree by disabling subset of interfaces Disabled

5: DataLink Layer5a-15 5a-16 5: DataLink Layer Some bridge features rIsolates collision domains resulting in higher total max throughput rCan have limitless number of nodes and geographical coverage rCan be used to combine Ethernet segments using different Ethernet technologies with Ethernet bridges m10Base2, 100BaseT, 10Base2 = can use a Gigabit bridge rTransparent (“plug-and-play”): no configuration necessary

5: DataLink Layer5a-16 Interconnection without backbone - all traffic between EE and SE must path over CS segment r Not recommended for two reasons: - single point of failure at Computer Science hub

5: DataLink Layer5a-17 Backbone configuration Recommended ! Backbone: a network that has direct connections to all the LAN segments

5: DataLink Layer5a-18 Bridges vs. Routers r bridges maintain bridge tables, implement filtering, learning and spanning tree algorithms r both store-and-forward devices m routers: network layer devices (IP Address) m bridges are link layer devices (LAN Address) r routers maintain routing tables, implement routing algorithms

5: DataLink Layer5a-19 Routers vs. Bridges - Bridges do not offer protection from broadcast storms Bridges Pros + Bridge operation is simpler resulting in high packet filtering and forwarding rates. + Bridge tables are self learning + “plug-and-play” Bridges Cons - All traffic confined to spanning tree, even when more direct (but disconnected) path.

5: DataLink Layer5a-20 Routers vs. Bridges r bridges do well in small (few hundred hosts) while routers used in large networks (thousands of hosts) Routers Cons Routers Pros + arbitrary topologies can be supported, cycling is limited by TTL counters (datagram) + provide protection against broadcast storms - require IP address configuration (not Plug-and-play) - require higher packet processing - Pronunciation

5: DataLink Layer5a-21 Ethernet Switches r often: individual hosts, star-connected into switch m Dedicated Access r Essentially a multi-interface bridge r layer 2 (frame) forwarding, filtering using LAN addresses r Switching: A-to-A’ then B-to-B’ simultaneously No collisions (full duplex mode)

5: DataLink Layer5a-22 Ethernet Switches r combinations of shared/dedicated, 10/100/1000 Mbps interfaces r cut-through switching: frame forwarded from input to output port without awaiting for assembly of entire frame m slight reduction in latency m ex. Caravan

5: DataLink Layer5a-23 Not an atypical LAN (IP network) Dedicated Shared

5: DataLink Layer5a-24 Summary comparison hubsbridgesroutersswitches traffic isolation noyes plug & playyes noyes optimal routing no yesno cut through yesno yes

5: DataLink Layer5a-25 Chapter 5 outline r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 LAN addresses and ARP r 5.5 Ethernet r 5.6 Hubs, bridges, and switches r 5.7 Wireless links and LANs r 5.8 PPP r 5.9 ATM r 5.10 Frame Relay

5: DataLink Layer5a-26 Wireless Links r The wave of the future for networking: wireless links r Examples of end systems: m Portable PCs, PDAs, airport hubs, wireless telephony (such as the cellphone pictured) m Future appliances may include cameras, automobiles, pets, security systems, kitchen appliances, and plants. r IEEE b – most popular standard wireless LANs r Bluetooth – new standard that allows devices to communicate with each other r Three classifications: m Power, range, data rate m Bluetooth – low, short, low m – high, medium, high

5: DataLink Layer5a-27 IEEE Wireless LAN r b m Currently most popular form of wireless LAN: wireless Ethernet, Wi-Fi m GHz unlicensed radio spectrum m up to 11 Mbps m physical layer and Media Access Control (MAC) layer for wireless local area network m direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code Not a multi access protocol (does not coordinate channel access from multiple hosts m widely deployed, using base stations

5: DataLink Layer5a-28 IEEE Wireless LAN r Other wireless standards m a – operates on 5-6GHz range and uses OFDM (orthogonal frequency-division multiplexing, not DSSS m Speeds can get up to 54Mbps m g – operates at 2.4GHz m Speeds up to 54Mbps r All use CSMA/CA for multi-access and have base stations and ad-hoc network versions

5: DataLink Layer5a-29 Base station approch r Wireless host communicates with a base station m base station = access point (AP) r Basic Service Set (BSS) (a.k.a. “cell”) contains: m wireless hosts m access point (AP): base station r BSS’s combined to form distribution system (DS)

5: DataLink Layer5a-30 Ad Hoc Network approach r No AP (i.e., base station) r wireless hosts communicate with each other m to get packet from wireless host A to B may need to route through wireless hosts X,Y,Z r Applications: m “laptop” meeting in conference room, car m interconnection of “personal” devices m battlefield r IETF MANET (Mobile Ad hoc Networks) working group

5: DataLink Layer5a-31 IEEE : multiple access r Collision if 2 or more nodes transmit at same time r CSMA makes sense: m get all the bandwidth if you’re the only one transmitting m shouldn’t cause a collision if you sense another transmission r Collision detection doesn’t work: hidden terminal problem

5: DataLink Layer5a-32 IEEE MAC Protocol: CSMA/CA CSMA: sender - if sense channel idle for DISF sec. then transmit entire frame (no collision detection) -if sense channel busy then binary backoff CSMA receiver - if received OK return ACK after SIFS (ACK is needed due to hidden terminal problem)

5: DataLink Layer5a-33 Collision avoidance mechanisms r Problem: m two nodes, hidden from each other, transmit complete frames to base station m wasted bandwidth for long duration ! r Solution: m small reservation packets m nodes track reservation interval with internal “network allocation vector” (NAV)

5: DataLink Layer5a-34 Collision Avoidance: RTS-CTS exchange r sender transmits short RTS (request to send) packet: indicates duration of transmission r receiver replies with short CTS (clear to send) packet m notifying (possibly hidden) nodes r hidden nodes will not transmit for specified duration: NAV

5: DataLink Layer5a-35 Collision Avoidance: RTS-CTS exchange r RTS and CTS short: m collisions less likely, of shorter duration m end result similar to collision detection r IEEE allows: m CSMA m CSMA/CA: reservations m polling from AP

5: DataLink Layer5a-36 Cellular vs Wireless LAN r 3G Cellular mobile m 2Mbps indoor m 384kbps outdoor m Licensed radio freq (1885 – 2025 and 2110 – 2200 MHz) r Cons m 3G is more costly ($2000 for radio freq licenses) m Competition from wireless LAN tech. r IEEE b wireless LAN enjoys more widespread usage m LAN capable cards will be installed in most all prepackaged computers m Continue with other devices m Bulk of traffic local termination m Handles GSM/GPRS

5: DataLink Layer5a-37 A word about Bluetooth r Low-power, small radius, wireless networking technology m meters r omnidirectional m not line-of-sight infared r Interconnects gadgets r GHz unlicensed radio band r up to 721 kbps r Interference from wireless LANs, digital cordless phones, microwave ovens: m frequency hopping helps r MAC protocol supports: m error correction m ARQ r Each node has a 12-bit address