Layer 2. Datalink / Media Access This layer is responsible for allowing the devices to access the media. Creates connections between devices If more than.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
Channel Access Methods
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
LANs Media Access Control Step 1 in Sharing Resources.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
SIMS-201 LAN Basics, MANs, WANs.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
Ethernet Two nodes transmit at the same time
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
ECEN5553 Telecom Systems Week #3 Read [4a] "High Speed Ethernet: A Planning Guide" [4b] "What If Ethernet Failed?" [4c] "8 Ethernet Predictions for 2014"
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
ECEN5553 Telecom Systems Dr. George Scheets Week #2 Read [3] "A Roadmap to 100G Ethernet at the Enterprise Data Center" Exam #1 Lecture 15, 21 September.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
1 CS4550: Computer Networks II Review Data Link Layer.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Outlines Received due 13 March 0%. Homework... Review your notes. Prepare for Midterm! Review your notes. Prepare for Midterm! Work on outline Work on.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
LANs : Aloha/CSMA , summary
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Link Layer 5.1 Introduction and services
ECEN5553 Telecom Systems Week #3 Read: [3] "A Roadmap to 100 Gbps Ethernet" [4a] "What if Ethernet Failed?" thru [4d] "Showdown Coming on Ethernet.
Chapter 12 Multiple Access.
High Speed LANs – Ethernet and Token Ring
The Medium Access Control Sublayer
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
CCNA 1 Chapter 5 Ethernet Fundamentals
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Computer Interfacing and Protocols
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet and Token Ring LAN Networks
Presentation transcript:

Layer 2

Datalink / Media Access This layer is responsible for allowing the devices to access the media. Creates connections between devices If more than one device on the physical link: –Requires some kind of address –MAC Address, Ethernet –DLCI, Frame Relay –VPI/VCI, ATM –LABEL, MPLS

Simplest case Point to Point link HDLC – High level data link control The physical might be T1, FiberChannel, SONET … Note the layer 2 data technologies CO-EXIST on Layer 1 technologies: –Ethernet often runs over a T1 line. –PPP over RS232 –Etc.

Bit oriented (Peterson) HDLC, High-Level Data Link Control –Standardized version of SDLC (IBM) Also uses the 0x7E control sequence to delineate beginning and end of frames –If 0x7E appears in the body of the message, special provisions must be made via an “escape sequence”

Byte Oriented PPP, Point to Point Protocol –Follow on from SLIP –Simple method of placing IP in Layer2 –Byte oriented –Protocol field determines what’s in the payload. Byte oriented means the frame frame contains an integer number of bytes. LCP/NCP are sister protocols used for setting up PPP session –Negotiate Frame size, IP address, etc.

PPP Frame Format (TCP/IP, Stevens)

Typical layer 2 requirements CRC Cylical Redundancy Check –Checks to make sure there are no errors in the frame. May include FEC Forward Error Correction –Can detect and correct effort Flag telling which Layer 3 protocol should process the frame –Ethernet can carry several protocols simultaneously (IP, IPX, NetBEUI, etc) Sequence numbers –So frames can be ordered and missing ones resent

CRC vs. FEC Simple parity case is similar to (CRC) –00,01,10,11 possible patterns to be sent –000, 011,101,110 actually sent (bit 3 is parity) –If receiver sees 111, it knows there’s a problem Error correction codes are more complicated –When problem is seen, error can be used to determine proper sequence that was sent –Will be discussed later this course

From: Peterson and Davie If ACK not received in time, frame is retransmitted.

Flow control Need to make sure packets are getting to where they are being sent. General concepts: –If message gets there, send another message –If they are getting lost, try again –If trying again and again doesn’t solve the problem Give up and notify upper protocol layer Continuing to dump duplicate messages degrades the network performance dramatically. –Most protocols “time-out”

Data Ack Data t frame t prop  = t prop t frame = Distance/Speed of Signal Frame size /Bit rate = Distance  Bit rate Frame size  Speed of Signal = 1 2  + 1 U= 2t prop +t frame t frame U  Light in vacuum = 300 m/  s Light in fiber = 200 m/  s Electricity = 250 m/  s Stop and wait flow control

Data Ack t frame t prop U= Nt frame 2t prop +t frame = N 2  +1 1 if N>2  +1 Window based flow control

Sharing a Medium

Pure ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times.

Pure ALOHA (2) Vulnerable period for the shaded frame.

Pure ALOHA (3) Throughput versus offered traffic for ALOHA systems. Best case 18% utilization pure Aloha, 36.8% for slotted Aloha. Slotted requires a clock source, only transmit at frame boundaries

Protocols that listen before transmitting Station listens to network, if busy –Wait till net available then transmit: if collision then, Back off for some time then send again if channel available. If the stations always retransmits when the network becomes available – CSMA 1 persistant If the station gradually becomes less aggressive about siezing the network when it’s busy: –CSMA nonpersistent If the station attempts to retransmit with some probability p less than 1 –CSMA p-persistent

Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.

CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.

Collision-Free Protocols The basic bit-map protocol. –Station asserts the bit in it’s slot if it wants to transmit. –Stations then transmit in turn. –Reservation based, no chance of collision

Collision-Free Protocols (2) Binary countdown protocol More efficient than bit-map protocol –Bits in the stations addresses determine when they access the channel –Reduces overhead compared to bit-map

Limited-Contention Protocols Acquisition probability for a symmetric contention channel.

Ethernet overview

Channel Capacity (C) Bandwidth, Bit Rate, SNR, and BER related Channel Capacity defines relationship C = Maximum reliable bit rate C = W*Log 2 (1 + SNR) bps Bandwidth sets the maximum Baud rate

Channel Capacity (C) Bandwidth, Bit Rate, SNR, and BER related Channel Capacity defines relationship C = Maximum reliable bit rate C = W*Log 2 (1 + SNR) bps Bandwidth sets the maximum Baud rate SNR sets the maximum number of different symbols (the "M" in M-ary)

Normalized Propagation Delay NPD = End-to-End Propagation Delay Average time to inject a Packet NPD > 1 implies “High Speed Network” 1 or more packets can simultaneously be in transit NPD < 1 implies “Slow Speed Network” Packet front end hits far side before back end transmitted TransmitterReceiver High Speed Low Speed

Types of Traffic... Computer Data Bursty Highly sensitive to errors Not as time sensitive as voice or video Interactive Voice/Video Fixed Rate (if not compressed) *Not sensitive to errors Fixed or Variable Rate (if compressed) *Sensitive to errors Time Sensitive

IEEE Ethernet Based on late 1970’s technology Covers OSI Layers 1 & 2 10 Mbps Line Speed Logical Bus Designed to move Computer Data

Serial Bit Stream: NRZ Coding time +1 volts 0 T 00 Logic One Logic Zero Called ‘Non Return to Zero’ because voltage never dwells on zero volts. T Coax Cable

Ethernet Uses Manchester Coding time +1 volts 0 T 00 Logic One Logic Zero All symbols have a transition in the middle.

Ethernet Uses Manchester Coding time +1 volts 0 T High Pass Filters Emphasize Change

High Pass Filter Output time +1 0

Rectify (Absolute Value) time +1 0 T Result always has pulses T seconds apart. Useful for receiver synchronization.

What is CSMA/CD? Polite Conversation –One node active at a time –No deliberate interruptions –Collisions sometimes occur after a break

802.3 Back-Off Algorithm choose random number 1st Collision0, 1 2nd Collision0, 1, 2, 3 3rd Collision0, 1,..., 6, 7 4th Collision0, 1,..., 14, 15 10th Collision0, 1,..., 1022, th Collision0, 1,..., 1022, th CollisionPunt Wait (Random Number* ) seconds

802.3 Flow Chart Packet to Send? No Yes Set Collision Counter = 0 Traffic on Network? Yes No Send Packet Collision? No Jam Yes Bump Collision Counter by +1 16th Collision? Drop Packet. Notify Higher Layer Yes Back-Off No

Major Drawbacks of CSMA/CD... Worst case waiting time equals infinity (No guaranteed Bandwidth) No Priorities These make Ethernet the worst LAN protocol to use for Multimedia Traffic

802.3 Packet Format PreSFD Destination Address Source Address LenCRCData + Padding Bytes:

Preamble time +1 volts 0 T 0 0 Logic One Logic Zero Series of pulses generated at receiver T seconds apart & in middle of each symbol.

Transmitting a File Broken into smaller packets Initial packets from Layer 5 Open Logical Connection Packets from Layer 7 “Data” Contains Layer 7 traffic “Data” Contains Layer 3-5 info Packets from Layer 4 Acknowledgements Final packets from Layer 5 Close Logical Connection

10Base5 & 10Base2 (Obsolete) PC Printer Logical & Physical Bus All nodes monitor traffic 3 Nodes share 10 Mbps Coax Cable

10BaseT & Shared Hub PC Hub Logical Bus & Physical Star Shared hub (OSI Level 1) copies input bits to all outputs. All nodes monitor traffic. 4 nodes share 10 Mbps. Twisted Pair

10BaseT & Switched Hub PC Switched Hub Logical Bus & Physical Star Switched Hub (OSI Level 1 & 2) copies packet to proper output. Only the destination monitors traffic.

10BaseT & Switched Hub PC Switched Hub Logical Bus & Physical Star This example system can move up to 20 Mbps

10BaseT & Switched Hub PC Switched Hub Logical Bus & Physical Star Each node shares 10 Mbps with the Switched Hub.

10BaseT & Switched Hub PC Switched Hub Using Half Duplex 10BaseT, a collision occurs if PC & Switched Hub simultaneously transmit. reception is screwed up

IEEE 802.3u 100 Mbps Fast Ethernet Preserves CSMA/CD Preserves Packet Format Maximum End-to-End Lengths (a.k.a. Collision Domain) reduced to keep Normalized Propagation Delay low Sales are pretty good

Full Duplex System PC Switched Hub Most 1 Gbps (& many 100 Mbps) systems are Full Duplex. NIC’s are designed to simultaneously transmit & receive. Line no longer shared. No Collisions. No need for CSMA/CD.

1995 Two 100 Mbps ‘Ethernets’ introduced Version A –CSMA/CD MAC, Ethernet Frames Version B –Demand Priority MAC, Ethernet Frames IEEE said Version A is Ethernet –IEEE 802.3u Fast Ethernet IEEE said Version B is not Ethernet –IEEE VG-AnyLAN is currently Dead RIP

IEEE 802.3z 1 Gbps Ethernet Uses an extended version of CSMA/CD, including ‘Frame Bursting’ Best performance uses full duplex connections & switched hubs –CSMA/CD included so it can be called Ethernet Collision Domain same as Fast Ethernet Preserves Packet Format Good Sales More on GigE later

IEEE 802.1p Priority Tags 8 priorities MAC protocols remain unchanged Used by 802.1p enabled switches –Allows interactive voice or video to receive preferential treatment on an Ethernet LAN

IEEE Token Ring Based on early 1980’s technology Covers OSI Layers 1 & 2 4 or 16 Mbps Line Speed Logical Ring A ‘Token’ is passed around the ring Node must have the Token to transmit Guaranteed Bandwidth Has Priorities

802.5 Token Format SDACED Bytes: Starting Delimiter: Token/Frame starts here Access Control: Indicates whether Token or Frame, Priority Ending Delimiter: End of Token/Frame

802.5 Packet Format SDAC Destination Address Source Address CRCData Bytes: > FC Modified Token a.k.a Starting Frame Delimiter EDFS Frame Control: Ring Status Frame Status: Receiver indicates whether received OK

IEEE Token Ring Technically Superior to Ethernet 2nd most widely used LAN protocol Similar evolution to Ethernet –Logical & Physical Ring –Logical Ring, Shared Physical Star –Logical Ring, Switched Physical Star 100 Mbps products available since ’98 Sales sharply declining. Heading for LAN graveyard. RIP

Layer 2 Switching Why?? Bridges Spanning Tree Algorithm