Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lectures 26-27 Local Area Networks [Ref: “Computer Networks” A.S.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Chapter 7 Data Link Layer
CompTIA Network+ Chapter 2
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Review on Networking Technologies Linda Wu (CMPT )
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Data Link Layer IS250 Spring 2010
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Ethernet, ARP.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Midterm Review - Network Layers. Computer 1Computer 2 2.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
University of the Western Cape Chapter 12: The Transport Layer.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Data Link Layer Dr. Muazzam A. Khan.
CSCI 465 D ata Communications and Networks Lecture 21 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
Networks. Common Xmit Media Shared Media Networks are a shared communication resource Only one user can access at a time.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Network Protocols n ISO OSI 7-layer model n TCP/IP suite l TCP/UDP l IP l Ethernet/Token Ring l ICMP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
William Stallings Data and Computer Communications
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 16/Cisco 4 - Module 9 CCNA Certification Exam Review By Your Name.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 15 Local Area Networks [Ref: “Computer Networks” A.S. Tanenbaum]
Ethernet Overview it the IEEE standard for Ethernet.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Networks and Distributed Systems Sarah Diesburg Operating Systems COP 4610.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Coding and Error Control
Data Link Layer.
Data link layer (LLC).
Layered Architectures
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
Protocol layering and data
7- chapter Seven Local Area Networks (LAN)
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lectures Local Area Networks [Ref: “Computer Networks” A.S. Tanenbaum]

Copyright 1999, S.D. Personick. All Rights Reserved. Local Area Networks LAN Overview Link Layer- packet error control and media access (coordination) protocols Network Layer: addressing and routing protocols Higher layer protocols Examples of LAN standards: Ethernet, token ring

Copyright 1999, S.D. Personick. All Rights Reserved. What are we trying to do? We are trying to create a local communications infrastructure which will allow computing appliances to exchange data in the form of packet data units (packets) We want this local communications infrastructure to be low in cost, and easy to implement and maintain

Copyright 1999, S.D. Personick. All Rights Reserved. A typical packet Payload: 64-to-2048 bytes Header Header contains: source address, destination address, special handling requirements, packet sequence number, information about packet history, error control bytes,...

Copyright 1999, S.D. Personick. All Rights Reserved. What are we trying to do? (cont’d) We would like our local communication infrastructure to employ “open” interfaces at appropriate points, so that portions of it can be provided by different suppliers; and so that we can accommodate multiple types of physical layer transmission media: wires, coaxial cable, fiber, wireless We would like our local communication infrastructure to support a wide range of applications

Copyright 1999, S.D. Personick. All Rights Reserved. Issues we need to address When packet data units (PDU’s) are transmitted across a physical medium (e.g., wire pairs), errors may occur We need to coordinate the actions of multiple computing devices that may wish to send PDU’s over the same medium We need a way to identify the intended recipient(s) of a PDU

Copyright 1999, S.D. Personick. All Rights Reserved. Issues We Need to Address We need to deal with the possibility that PDU’s may be inadvertently lost, duplicated, or delivered out of the order in which they were sent We need to deal with the possibility that some PDU’s may require expedited delivery We need to manage congestion when more PDU’s are being sent than the network can accommodate

Copyright 1999, S.D. Personick. All Rights Reserved. “Higher Layer Issues” We need a methodology that enables computing appliances to inform each other of their desire to communicate (establish a “session”), and to accept or decline such communication We may need to provide mechanisms for “secure” communication We may need to provide mechanisms which enable different higher layer protocols to inter- operate (e.g., converting text to speech)

Copyright 1999, S.D. Personick. All Rights Reserved. The Protocol Stack Application Layer (e.g., or WWW) Presentation Layer (e.g., Microsoft Word, plain text) Session Layer (e.g., accepting or denying access) Transport Layer (e.g., asking for retransmission of lost packets; re-ordering packets that are out of order) Network Layer (reading addresses and directing packets toward their intended destinations) Link Layer (coordinating access to the physical medium, and trying to move packets across the physical medium without making errors) Physical layer (e.g., wire pairs or fiber or wireless)

Copyright 1999, S.D. Personick. All Rights Reserved. Separation of Concerns Each layer in the protocol stack should be able to use the services of the layer(s) below it, without having to be concerned with the details of how those services are implemented. For example, the transport layer should not be concerned with, or dependent upon the details of how the network layer manages to get the right packets to the right destinations

Copyright 1999, S.D. Personick. All Rights Reserved. What each layer does The engineers who design physical layer (e.g. wireless) solutions focus on the problems of moving bits (1’s and 0’s) across their physical layer... with a specified probability of error, a specified data rate capability, and specified delay characteristics. E.g., wireless physical layer designers worry about the stuff we discussed in previous lectures

Copyright 1999, S.D. Personick. All Rights Reserved. What each layer does (cont’d) The engineers who design (and agree on standards for) link layer protocols are concerned with: - how to detect errors that occur when PDU’s are communicated across a physical layer; and how such detected errors might also be corrected (error detecting codes, error correcting codes, retransmission) -how to coordinate access to the physical layer by multiple computing appliances which are using the same physical layer medium at the same time (“media access control”)

Copyright 1999, S.D. Personick. All Rights Reserved. What each layer does (cont’d) Engineers who design (and agree on standards for) network layer protocols are concerned with: -how destination addresses (and possibly specific routing requests) are incorporated into PDU’s -how routers (network packet switches) coordinate to establish routes over which packets can be moved toward their intended destinations -how requests to reserve network capacity are specified and accepted (or denied)

Copyright 1999, S.D. Personick. All Rights Reserved. What each layer does (cont’d) Engineers who design (and agree on standards for) transport layer protocols are concerned with -how to ensure end-to-end PDU transport integrity by: detecting lost or duplicated packets; requesting retransmissions of lost packets; re-ordering packets that are received out-of-order; adjusting the rate at which packets are sent across the network to accommodate congestion and other problems; storing packets for retransmission or initial transmission, if required.

Copyright 1999, S.D. Personick. All Rights Reserved. The protocol “hour glass” , WWW, Telephony,... Wire pairs, Fiber, Coax, Wireless,... Fewer is better: TCP, UDP IP Token passing CSMA-CD CSMA-CA HDLC

Copyright 1999, S.D. Personick. All Rights Reserved. HDLC (see Tanenbaum pp ) | Address | Control | Data | Checksum | > or =

Copyright 1999, S.D. Personick. All Rights Reserved. HDLC Each packet data unit (frame) includes a “cyclic redundancy check” (CDC) sequence that allows for the detection of most single or multiple bit errors. Frames with detected errors are discarded. The header of each frame also includes a “frame sequence number” that is typically between 0-7, but could be between 0 and (2**n)-1, where n is between 3 and 7 Frames are acknowledged after they are correctly received The maximum number of outstanding, unacknowledged frames is: (2**n) -1 (e.g., 7 ) Retransmission is used to replace unacknowledged or rejected frames

Copyright 1999, S.D. Personick. All Rights Reserved. HDLC Frames (includes retransmissions) Acknowledgements 210 NR=3* *NR=3 indicates that the next expected frame sequence number = 3

Copyright 1999, S.D. Personick. All Rights Reserved. Cyclic Redundancy Check Examples of error detecting methods: Parity bit = sum of the binary digits in the part of the packet you want to protect ( modulo 2). A single bit error causes the parity bit not to match the parity calculated at the receiver CRC-16 or CRC-32: Divide the data field by a binary polynomial with either 2**16 or 2**32 as its most significant bit. The CRC is the remainder

Copyright 1999, S.D. Personick. All Rights Reserved. Cyclic Redundancy Check (cont’d) Example: At the transmitter…. Data sequence to be protected is: (4 byte example)… = DS Polynomial is: CRC- CCITT (16 bit CRC): = P Divide DS by P; the remainder is the CRC

Copyright 1999, S.D. Personick. All Rights Reserved. CRC (binary long division) | ________________ (First remainder + next digit) _________________ (Second remainder + next digit)

Copyright 1999, S.D. Personick. All Rights Reserved. Cyclic Redundancy Check (cont’d) Append CRC (remainder) to data being protected: [DS CRC] ……. At the receiver... Divide [DS CRC] by P; The result should be a zero remainder

Copyright 1999, S.D. Personick. All Rights Reserved. Media Access Protocols Sharing a physical link among multiple (simultaneous) users Objectives are: to minimize waiting time to obtain access to a link; to get a high level of achievable throughput on the link; and to provide a “fair” sharing of the link capacity among users. These objectives are sometimes at odds with each other

Copyright 1999, S.D. Personick. All Rights Reserved. Aloha* Protocol Transmit your packet, if it gets through…fine. If it collides with another packet, then try again. Used to share links with long end-to-end delay (vs. packet duration) *Early radio network in the Hawiian Islands

Copyright 1999, S.D. Personick. All Rights Reserved. Aloha Protocol (with fixed length packets) N users; each user sending k packets per second; fixed packet length = T (seconds). Channel bit rate = B (bits/sec) The probability that any transmitter packet does NOT experience a collision= exp [-2(N-1)kT]; I.e. none of the other N-1 users transmits a packet within T seconds (before or after) of the time I start sending my packet. Throughput = BT x Nk x exp [-2(N-1)kT] For N>>1, maximum throughput = B/(2e)

Copyright 1999, S.D. Personick. All Rights Reserved. Carrier Sense Multiple Access A variation on Ahola, where you listen to see if the “channel” is being used (e.g., listen for a “carrier”) before transmitting. If the end-to-end delays are short compared to the length of a transmitted packet, this can result in high utilization of the channel If the point-to-point (through the medium) delay between users is large compared to the duration of a transmitted packet, then this becomes the same as Aloha

Copyright 1999, S.D. Personick. All Rights Reserved. CSMA/CD CSMA with collision detection If a collision is detected, the colliding transmitters “back off” for a randomly selected amount of time, in order to try to prevent another collision when the re- transmit

Copyright 1999, S.D. Personick. All Rights Reserved. Token Passing Each transmitter has an opportunity (a “turn”) to send packets... defined as holding the “token”. After a predefined length of time or number of transmitted packets, it must pass the token to another transmitter.

Copyright 1999, S.D. Personick. All Rights Reserved. Internetworking Protocol (IP) Networking Layer Issues are: Addressing Creating routing tables (in routers) Segmentation and re-assembly of IP packets Domain name service

Copyright 1999, S.D. Personick. All Rights Reserved. IP Addressing (IPv4) 0-255, 0-255, 0-255, bytes of address: e.g., Class A: 1 byte network/ 3 bytes subnet Class B: 2 bytes network/ 2 bytes subnet Class C: 3 bytes network/ 1 byte subnet

Copyright 1999, S.D. Personick. All Rights Reserved. Routing Source Host (computer) Destination Host (computer) local router backbone router Drexel.edu Bellatlantic.net

Copyright 1999, S.D. Personick. All Rights Reserved. Setting Up Routing Tables Each router (packet switch) communicates with its neighbors, using a complex protocol to determine where it should route packets to Routing tables are continuously updated When an incoming packet arrives, the router compares the destination address of the packet to the listings in its routing table to determine which output to route the packet to

Copyright 1999, S.D. Personick. All Rights Reserved. Domain Name Service The domain name service complements IP routing by providing a mechanism for translating domain “names” into IP addresses ece.drexel.edu =>

Copyright 1999, S.D. Personick. All Rights Reserved. TCP (Transport Layer) Keeps track of incoming packets to detect lost packets Stores transmitted packets for possible retransmission Acknowledges (or NACKS) receipt of packets Adjusts window size to accommodate end- to-end packet loss and delay conditions

Copyright 1999, S.D. Personick. All Rights Reserved. Ethernet Standards (802.3) see Tanenbaum pp is an IEEE standard for the use of CSMD/CD on a shared medium (e.g., coaxial cable, wire pairs cable, fiber optic cable, wireless) “Ethernet” is the commonly used name for LANs; but it really refers to a specific product that was developed at Xerox PARC

Copyright 1999, S.D. Personick. All Rights Reserved Layer is specified for various types of cable: -10Base5: Thick coax, 500m per segment* -10Base2: Thin coax, 200m per segment* -10BaseT: Twisted pair, 100m per segment -10BaseF: Fiber optics, 2000m per segment -higher speed versions of *electronic repeaters, bridges or hubs allow concatenation of segments

Copyright 1999, S.D. Personick. All Rights Reserved Layer 1 (cont’d) Manchester bipolar coding is used to avoid ambiguities between 0 volts and a logical “0”, and also to produce “d.c. balance”, which is helpful for designing the transceivers that interface to LANs Binary “1” => high-low (+.85v, -.85v) Binary “0” => low-high (-.85v, +.85v)

Copyright 1999, S.D. Personick. All Rights Reserved Layer 2 Layer 2 frames consist of: -7 bytes of preamble to allow for transceiver synchronization ( x 7) -1 byte “start of frame” ( ) -6 byte (48 bit) destination (global) address -6 byte (48 bit) source (global) address -2 byte “length of frame” - Between 0 and 1500 bytes of data -Up to 46 bytes of “pad” (if needed) - 4 byte (16 bit) checksum (CRC)

Copyright 1999, S.D. Personick. All Rights Reserved Layer 2 (cont’d) When a station detects a collision, it sends out a 48 bit “noise burst” to warn all other stations As per CSMD-CD definition, stations listen before they transmit. In the event of a detected collision, stations “back off” and wait a random amount of time before sending again. Frames must be longer than 2T, where T is the maximum 1-way delay. Minimum frame duration = 51,200 ns

Copyright 1999, S.D. Personick. All Rights Reserved. Token Ring Standards (802.5) see Tanenbaum pp Physical layer is formed by point-to-point links between adjacent stations, connected to form a closed ring -Each received bit is buffered, examined, possibly changed, and re-transmitted by each station The token consists of a 3-byte pattern. Changing one bit of this pattern converts it to the first 3 bytes of a normal data frame

Copyright 1999, S.D. Personick. All Rights Reserved (continued) In “listen mode” each node on the ring inserts 1 bit of buffer delay as part of the total delay around the ring In “transmit mode” a node inserts its frames into the ring, and removes its inserted bits as they come back around the ring. When finished transmitting, a transmitter reinserts the token on to the ring

Copyright 1999, S.D. Personick. All Rights Reserved Physical layer 1, 4 or 16 Mbps on shielded twisted pairs Differential Manchester bipolar coding: +/ volts “Bypass center” (central hub) can be used to bypass failed nodes (star-shaped ring)

Copyright 1999, S.D. Personick. All Rights Reserved Layer 2 Token holding time is 10 msec (100, Mbps) The data field of a frame has no byte number limit (except as limited by the allowed token holding time) Frames are acknowledged by the receiving station by changing a bit in the “frame status” byte (after the CRC)