Data Link Layer Moving Frames. Link Layer Protocols: ethernet, 802.11 wireless, 802.5 Token Ring and PPP Has node-to-node job of moving network layer.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
1 Ethernet EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken.
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Link-layer Addressing r Ethernet.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
5: DataLink Layer5-1 Link Layer r Link layer services r Error detection and correction r Multiple access protocols r 5.4 Link-Layer Addressing r 5.5 Ethernet.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
5: DataLink Layer – Ethernet, Hubs and Switches.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
1 CSE401N: COMPUTER NetworkS LAN address & ARP Ethernet Basics.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Chapter 4: Managing LAN Traffic
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
1 Random Access Protocols r When node has packet to send m transmit at full channel data rate R. m no a priori coordination among nodes  two or more transmitting.
Links Mike Freedman COS 461: Computer Networks Lectures: MW 10-10:50am in CS 104
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 4: Link Layer addressing Ethernet Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, Myungchul Kim
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 Data Link Layer Lecture 17 Imran Ahmed University of Management & Technology.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Ch 5. Link layer and Local Area Networks Myungchul Kim
Cisco 3 – Switching Concepts Perrine. J Page 16/1/2016 Module 4 The use of bridges and switches for segmentation results in ____? 1.Multiple broadcast.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer5-1.
5: DataLink Layer5-1 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame r If channel sensed.
CS 1652 Jack Lange University of Pittsburgh 1. 5: DataLink Layer5-2 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
Ch 5. Link layer and Local Area Networks Myungchul Kim
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Link Layer 5.1 Introduction and services
Random Access Protocols
Computer Communication Networks
University of Pittsburgh
CS 457 – Lecture 6 Ethernet Spring 2012.
Data Link Issues Relates to Lab 2.
Mac Addressing, Ethernet, and Interconnections
Data Link Issues Relates to Lab 2.
Protocol layering and data
Protocol layering and data
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Link Layer 5.1 Introduction and services
Presentation transcript:

Data Link Layer Moving Frames

Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer datagrams over a single link in the path Protocol implemented in adapter/NIC

Possible services Framing: encapsulate network datagram into frame Link Access: Medium Access Control protocol describes who gets access when Reliable delivery: wireless links need this Flow control: response to limited buffering Error detection: done in hardware Half-duplex and full-duplex

Error Detection Parity check: use one bit; detects odd number of errors (even number undetected) Two dimensional parity: can detect and correct any one error

Error Detection

Cyclic Redundancy Check CRC codes also known as polynomial codes Agree on generator, G For given data D, choose r additional bits such that the resulting d+r bit pattern is exactly divisible by G

Multiple Access Protocols Broadcast link: more than one node on the (shared) channel wants to use the channel Categories: –Channel partitioning –Random access –Taking-turns S

Channel Partitioning TDM divides time into sections and further divides sections into (N) time slots; channel rate is R bps Eliminates collisions and is perfectly fair But: a node is limited to an average rate of R/N even if only node transmitting But: a node must always wait for its turn, even if only node transmitting

Code Division Multiple Access CDMA Assign a different code to each transmitting node; encode data bits; receiver can sort out correct transmission Used in wireless channels

Random Access Transmitting node at full channel rate If collision, retransmit packet until packet gets through without collision Slotted ALOHA –Node waits for beginning of next slot; transmits packet –No collision; transmit another packet –Collision; retransmit [randomly] until success 1970

8 After all the math, the maximum efficiency of the protocol is 37% of Slots do useful work In pure ALOHA, efficiency drops to 18%

Carrier Sense Multiple Access Listen before sending (carrier sensing) If collision, stop sending (collision detection) There are a lot of these that have been proposed

Taking-Turns Protocols Polling Protocol –Master node –Master polls each node in round-robin fashion –If master fails, the whole channel goes down Token-passing protocol –Small, special purpose frame = token –Can send frames if node has the token –Decentralized and highly efficient

MAC addresses Not the node, but the (NIC) adapter that has a link-layer address –LAN address –Physical Address –MAC address Permanent – burned into ROM 6 bytes long; 3 for manufacturer, 3 for adapter – expressed in Hex notation IEEE manages address space

Addressing Frame includes destination MAC address Each adapter on LAN sees each frame –If address is a match, adapter sends frame up the protocol stack in parent node –If address is not a match, adapter discards frame Broadcast address is all ones (FF FF…)

Address Resolution Protocol We have both network addresses (IP) and link addresses (MAC); ARP does translation On same LAN ARP table stored in RAM TTL typically 20 minutes ARP query sent in broadcast frame; response in a standard frame

A B We want to get a frame from A to B If our link address is 49-BD … we will never get out of 111 subnet We have to use router’s E6-E9 address first (with IP )

Dynamic Host Configuration Protocol DHCP is a client/server protocol –Client is newly arriving host DHCP server discovery –UDP packet to port 67 –Destination address and source 0.0 (this host) –Frame has FF-FF destination address DHCP server offer(s) –Includes lease time –Link layer frame containing the IP datagram containing the UDP segment containing the DHCP offer message is then sent DHCP request by client DHCP ACK to client

Ethernet Ethernet has taken over the wired LAN market Bob Metcalf’s original bar napkin:

Ethernet Frame The sending adapter encapsulates the IP datagram within an ethernet frame and passes the frame to the physical layer… Preamble: 8 bytes, seven of and one of Destination address: 6 bytes Source address: 6 bytes (MAC address) Type: IP, IPX, AppleTalk, ARP Data: bytes Cyclic Redundancy Check: 4 bytes

Ethernet Uses baseband transmission Connectionless service (like IP’s datagram and UDP’s segment) Unreliable service: adapter B runs CRC check; if pass frame handed to network layer; if fail, frame is discarded; no message back to adapter A

CSMA/CD An adapter may begin to transmit at any time (provided the channel is clear) Adapter never transmits when it senses that some other adapter is (carrier sense) Adapter aborts transmission as soon as it detects another adapter transmitting (collision detection) – sends 48-bit jam signal Before attempting retransmission, adapter waits a random time (typically small) [exponential backoff]

Ethernet Technologies Most common are 10BaseT and 100BaseT which use twisted pair copper wire in a star/bus topology Two wires for transmit; two for receive T is for twisted pair Maximum cable length is 100 meters

Hubs Physical layer device: simply senses bits and amplifies the signal to all ports Extends the collision domain Can also extend the reach of a LAN by 100 meters each Can only connect similar-speed LANs (10- or 100BaseT)

Switches Operate on ethernet frames – layer 2 devices Forward frames based on LAN destination addresses Switch does not have MAC addresses Thanks to buffers, can connect differing technologies (10Base2, 10BaseT, 100BaseT) Switches are self-learning

Now have three collision domains, thanks to switch

A to A’ at 10 B to B’ at 10 C to C’ at 10 for total of 30Mbps

Point-to-Point Protocol Used between modem and ISP; still have a lot of that Flag field Address field (only ) Control field (only 11) Protocol field (IP, AppleTalk, DECnet) Information (packet) Checksum (2 or 4 byte CRC)