Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer5-1.

Slides:



Advertisements
Similar presentations
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
Advertisements

1 Ethernet EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 22.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 21.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 5 Link Layer Link Layer5-1. Link Layer5-2 Link layer: introduction terminology:  hosts and routers: nodes  communication channels that connect.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Link Layer5-1 Chapter 5: Link layer our goals:  understand principles behind link layer services:  error detection, correction  sharing a broadcast.
Data Link Layer5-1 Chapter 5 Link Layer and LANs (Part I) SCSC 512.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, Feb 2012.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
Network LayerII-1 RSC Part II: Network Layer 4. IP in operation Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Data Link Layer5-1 Link Layer: Introduction Terminology:  hosts and routers are nodes  communication channels that connect adjacent nodes along communication.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 4: Link Layer addressing Ethernet Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Chapter 5: Link layer our goals:
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Data Link Layer5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Chapter 5 Link Layer Link Layer5-1 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Chapter5_2.
Link Layer Fundamentals NWEN302 Computer Network Design.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer LANs.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
CS 1652 Jack Lange University of Pittsburgh 1. 5: DataLink Layer5-2 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram.
Link layer, LANs: outline
EEC-484 Computer Networks Lecture 13 Wenbing Zhao 12/6/20151.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Link Layer5-1 Link layer, LAN s: outline  5.1 Introduction and services  5.2 Error detection and correction  5.3Multiple access protocols  5.4 Link-layer.
Lecture 22 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks Prof. Shamik Sengupta.
Lecture 22 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks Prof. Shamik Sengupta.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Transport Layer 3-1 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
5: DataLink Layer5-1 Link-layer switches. 5: DataLink Layer5-2 Hubs … physical-layer (“dumb”) repeaters: m bits coming in one link go out all other links.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
CSEN 404 Data Link Layer Amr El Mougy Lamia AlBadrawy.
CPSC 441: Link Layer1 Link Layer Addressing Slides originally from Carey Williamson Notes derived from “ Computer Networking: A Top Down Approach”, by.
CHAPTER 5. Data Link Layer5-2 Link Layer: Introduction Terminology: hosts and routers are nodes communication channels that connect adjacent nodes along.
Data Link Layer5-1 Chapter 5 Link Layer and LANs (Part I) SCSC 512.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Chapter 5 Link Layer and LANs
Link Layer 5.1 Introduction and services
Link Layer 5.1 Introduction and services
Chapter 5 Link Layer and LANs
MAC Addresses and ARP 32-bit IP address:
University of Pittsburgh
ARP: Address Resolution Protocol
Session 16 INST 346 Technologies, Infrastructure and Architecture
Lecture 11: Link Layer Slides derived from those available on the site of the book “Computer Networking”, by Kurose and Ross, PEARSON.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer.
Presentation transcript:

Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer5-1

Link Layer5-2 Link layer: introduction global ISP

Link Layer5-3 Where is the link layer implemented? controller physical transmission cpu memory host bus (e.g., PCI) network adapter card application transport network link physical

Link Layer5-4 Adaptors communicating controller sending host receiving host datagram frame

Link Layer5-5 Error detection otherwise

Link Layer5-6 Parity checking single bit parity:  detect single bit errors two-dimensional bit parity:  detect and correct single bit errors 0 0

Link Layer5-7 Cyclic redundancy check

Link Layer5-8 CRC example want: D. 2 r XOR R = nG equivalently: D. 2 r = nG XOR R equivalently: if we divide D. 2 r by G, want remainder R to satisfy: R = remainder[ ] D.2rGD.2rG D G R r = 3

Link Layer5-9 An ideal multiple access protocol given: broadcast channel of rate R bps desiderata: 1. when one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M 3. fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4. simple

Link Layer5-10 Channel partitioning MAC protocols: TDMA slot frame 6-slot frame

Link Layer5-11 frequency bands time FDM cable Channel partitioning MAC protocols: FDMA

Link Layer5-12 Slotted ALOHA node 1 node 2 node 3 C CCSS SE EE

Link Layer5-13 Pure (unslotted) ALOHA

Link Layer5-14 CSMA collisions spatial layout of nodes

Link Layer5-15 CSMA/CD (collision detection) spatial layout of nodes

Link Layer5-16 Ethernet CSMA/CD algorithm 1. NIC receives datagram from network layer, creates frame 2. If NIC senses channel idle, starts frame transmission. If NIC senses channel busy, waits until channel idle, then transmits. 3. If NIC transmits entire frame without detecting another transmission, NIC is done with frame ! 4. If NIC detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, NIC enters binary (exponential) backoff:  after mth collision, NIC chooses K at random from {0,1,2, …, 2 m -1}. NIC waits K · 512 bit times, returns to Step 2  longer backoff interval with more collisions

Link Layer5-17 primary secondary poll data “Taking turns” MAC protocols

Link Layer5-18 T data (nothing to send) T “Taking turns” MAC protocols

Link Layer5-19 LAN addresses and ARP each adapter on LAN has unique LAN address adapter 1A-2F-BB AD D7-FA-20-B0 0C-C4-11-6F-E F7-2B LAN (wired or wireless)

Link Layer5-20 ARP: address resolution protocol 1A-2F-BB AD D7-FA-20-B0 0C-C4-11-6F-E F7-2B LAN

Link Layer5-21 walkthrough: send datagram from A to B via R  focus on addressing – at IP (datagram) and MAC layer (frame)  assume A knows B’s IP address  assume A knows IP address of first hop router, R (how?)  assume A knows R’s MAC address (how?) Addressing: routing to another LAN R 1A-23-F9-CD-06-9B E6-E BB-4B CC-49-DE-D0-AB-7D C-E8-FF-55 A BD-D2-C7-56-2A B2-2F-54-1A-0F B

R 1A-23-F9-CD-06-9B E6-E BB-4B CC-49-DE-D0-AB-7D C-E8-FF-55 A BD-D2-C7-56-2A B2-2F-54-1A-0F B Link Layer5-22 Addressing: routing to another LAN IP Eth Phy IP src: IP dest:  A creates IP datagram with IP source A, destination B  A creates link-layer frame with R's MAC address as dest, frame contains A-to-B IP datagram MAC src: C-E8-FF-55 MAC dest: E6-E BB-4B

R 1A-23-F9-CD-06-9B E6-E BB-4B CC-49-DE-D0-AB-7D C-E8-FF-55 A BD-D2-C7-56-2A B2-2F-54-1A-0F B Link Layer5-23 Addressing: routing to another LAN IP Eth Phy  frame sent from A to R IP Eth Phy  frame received at R, datagram removed, passed up to IP MAC src: C-E8-FF-55 MAC dest: E6-E BB-4B IP src: IP dest: IP src: IP dest:

R 1A-23-F9-CD-06-9B E6-E BB-4B CC-49-DE-D0-AB-7D C-E8-FF-55 A BD-D2-C7-56-2A B2-2F-54-1A-0F B Link Layer5-24 Addressing: routing to another LAN IP src: IP dest:  R forwards datagram with IP source A, destination B  R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP Eth Phy IP Eth Phy

R 1A-23-F9-CD-06-9B E6-E BB-4B CC-49-DE-D0-AB-7D C-E8-FF-55 A BD-D2-C7-56-2A B2-2F-54-1A-0F B Link Layer5-25 Addressing: routing to another LAN  R forwards datagram with IP source A, destination B  R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram IP src: IP dest: MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP Eth Phy IP Eth Phy

R 1A-23-F9-CD-06-9B E6-E BB-4B CC-49-DE-D0-AB-7D C-E8-FF-55 A BD-D2-C7-56-2A B2-2F-54-1A-0F B Link Layer5-26 Addressing: routing to another LAN  R forwards datagram with IP source A, destination B  R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram IP src: IP dest: MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP Eth Phy

Link Layer5-27 Ethernet Metcalfe’s Ethernet sketch

Link Layer5-28 Ethernet: physical topology switch bus: coaxial cable star

Link Layer5-29 Ethernet frame structure sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame dest. address source address data (payload) CRC preamble type

Link Layer Ethernet standards: link & physical layers  many different Ethernet standards  common MAC protocol and frame format  different speeds: 2 Mbps, 10 Mbps, 100 Mbps, 1Gbps, 10G bps  different physical layer media: fiber, cable application transport network link physical MAC protocol and frame format 100BASE-TX 100BASE-T4 100BASE-FX 100BASE-T2 100BASE-SX 100BASE-BX fiber physical layer copper (twister pair) physical layer

Link Layer5-31 Switch: multiple simultaneous transmissions switch with six interfaces (1,2,3,4,5,6) A A’A’ B B’B’C C’C’

A A’A’ B B’B’C C’C’ Link Layer5-32 Switch: self-learning A A’ Source: A Dest: A’ MAC addr interface TTL Switch table (initially empty) A 1 60

Link Layer5-33 Switch: frame filtering/forwarding when frame received at switch: 1. record incoming link, MAC address of sending host 2. index switch table using MAC destination address 3. if entry found for destination then { if destination on segment from which frame arrived then drop frame else forward frame on interface indicated by entry } else flood /* forward on all interfaces except arriving interface */

A A’A’ B B’B’C C’C’ Link Layer5-34 Self-learning, forwarding: example A A’ Source: A Dest: A’ MAC addr interface TTL switch table (initially empty) A 1 60 A A’  frame destination, A’, location unknown: flood A’ A  destination A location known: A’A’ 4 60 selectively send on just one link

Link Layer5-35 Institutional network to external network router IP subnet mail server web server

Link Layer5-36 Switches vs. routers both are store-and-forward:  routers: network-layer devices (examine network- layer headers)  switches: link-layer devices (examine link-layer headers) both have forwarding tables:  routers: compute tables using routing algorithms, IP addresses  switches: learn forwarding table using flooding, learning, MAC addresses application transport network link physical network link physical link physical switch datagram application transport network link physical frame datagram

Link Layer5-37 VLANs port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) 15 … Electrical Engineering (VLAN ports 1-8) … … Computer Science (VLAN ports 9-16) … operates as multiple virtual switches

Link Layer5-38 Data center networks Inside a 40-ft Microsoft container, Chicago data center

Link Layer5-39 Server racks TOR switches Tier-1 switches Tier-2 switches Load balancer Load balancer B A C Border router Access router Internet Data center networks load balancer: application-layer routing  receives external client requests  directs workload within data center  returns results to external client (hiding data center internals from client)

Server racks TOR switches Tier-1 switches Tier-2 switches Data center networks  rich interconnection among switches, racks:  increased throughput between racks (multiple routing paths possible)  increased reliability via redundancy