LAYER TWO AND BELOW 1 Rocky K. C. Chang 13 September 2010.

Slides:



Advertisements
Similar presentations
Computer Networks Ethernet I Professor Hui Zhang
Advertisements

DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY Ethernet Fundamentals.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
Introduction to Network-2-. Network types Local Area Network (LAN) High speed, low error data networks that covers small geographic area. There are different.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 20.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Review on Networking Technologies Linda Wu (CMPT )
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
1 Announcements Prelim and submission for 3 rd CS 415 project Homework 4 graded.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
Chapter 5 outline 5.1 Introduction and services
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Final Review Focus- Chapter 4: Network layer Chapter 5: Data link layer Notes: Physical layer Understand previous chapters covered in class. Final exam.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
1 Chapter 2: Direct Link Networks (Part Two) Dr. Rocky K. C. Chang 30 January 2004.
1 Chapter 2: Direct Link Networks (Part One) Dr. Rocky K. C. Chang 30 January 2004.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
2. GETTING CONNECTED (PART 2) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 26 January
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CS380 Int. to Comp. Networks Data Link Networks - Part II1 Reliable Transmission How to fix corrupted frames. –Error correcting codes too expensive –Should.
Chapter 5 Link Layer and LANs
Getting Connected (Chapter 2 Part 1)
Chapter 5 Link Layer and LANs
2. Getting connected (part 2)
OSI Protocol Stack Given the post man exemple.
Hubs Hubs are essentially physical-layer repeaters:
University of Pittsburgh
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
CS 457 – Lecture 6 Ethernet Spring 2012.
Hubs Hubs are essentially physical-layer repeaters:
CT1303 LAN Rehab AlFallaj.
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
Link Layer and LANs Its not about how hard you hit... It's about how hard you can get hit and keep moving forward 5: DataLink Layer.
2. Getting connected (part 1)
Protocol layering and data
Computer Network Overview
Networking CS 3470, Section 1 Sarah Diesburg
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Ethernet 16EC351 Computer networks unit II Mr.M.Jagadesh,AP/ECE.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Link Layer 5.1 Introduction and services
Open System Interconnect (OSI).
LEARNING COMPUTER NETWORKS OSI Model (layers). Why a layered model?  Easier to teach communication process.  Speeds development, changes in one layer.
Presentation transcript:

LAYER TWO AND BELOW 1 Rocky K. C. Chang 13 September 2010

The services at layers  The lowest two layers: Physical layer Datalink layer Provide a virtual (unreliable) bit pipe to above Provide a virtual link for (unreliable) packets to above

An example (from Fujitsu) 3

An example (cont’d) 4

Another example (from BT’s 21CN) 5 IP ATM PSTN DSL KStream PSTN DPCN PDH Fibre Copper DWSS ASDH End User ~5k nodes ~2k nodes ~400 nodes ~100 nodes ~15 nodes MSH -SDH ~1k nodes Mesh -SDH Inter-node transmission provided by SDH/PDH platforms CWSS

Another example (cont’d) 6 IP-MPLS-WDM DSL Fibre & Copper Agg Box End User ~5k nodes ~100 nodes Class 5 Call Server Content WWW ISP PSTN MigrationConverged Core

Hosts and routers 7  Switches and routers (highly specialized hardware)  Hosts (general-purpose computers)  Network adaptors and device drivers  Unparalleled performance improvement of memory latency and processor speed

A simplified architecture 8 CPU Cache Memory I/O bus Network adaptor (To network)

Network links 9  A network link is a physical medium carrying signals in the form of electromagnetic waves.  Point-to-point vs broadcast (or shared medium)  Wired (copper, optical fiber, OC-N) vs wireless (licensed or unlicensed)  Broadband vs narrowband (link capacity/ bandwidth)  Symmetric or asymmetric  Long haul (satellite, submarine cables) or short haul  Error rates

10

11

The five problems 12  Bit synchronization (need additional encoding data, such as from Manchester encoding, to delineate bits)  Frame synchronization (need additional protocols to delineate frames)  Error detection (need additional algorithms to detect errors, if occurred)  Reliable link service (need additional schemes to recover from errors)  Multiple access control problem (for shared media only; need additional protocols to share the medium)

Problem 1: Bit synchronization (BS) 13  Problem: How does a receiver synchronize with a sender, so that bits can be decoded correctly from the signals?  Solution: requires encoding (e.g., Solutions: NRZ, NRZI, Manchester, and 4B/5B). Signalling component Signal Bits Node Adaptor

Problem 2: Frame synchronization 14  Problem: Given that a receiver can synchronize bits sent by a sender, how does the receiver recognize bits belonging to the same frame? Frames Signalling component Signal Bits Node Adaptor

Several solutions 15  Byte-oriented protocols (e.g. PPP)  Data unit in terms of bytes (ASCII, EBCDIC)  Sentinel approach vs. byte counting approach  Bit-oriented protocols (e.g. HDLC, Ethernet)  Sentinel approach  PPP’s approach: CRC Flag 7E Addr FF Control 03 Information IP datagram Protocol Flag 7E Protocol 0021

Example: Ethernet 16

Problem 3: Error detection 17  Transmission errors do occur, with different probabilities in different media.  Two general approaches:  Error correction code (forward error correction)  Error detection code + an error correction mechanism when errors are detected.  Insert redundancy for error correction or detection.  Common error detection methods:  Cyclic redundancy check (CRC)  Checksum

Examples 18  Error detection codes are usually inserted in more than one layer, e.g.  HTTP  TCP (16-bit checksum for the TCP header and data)  IPv4 (16-bit checksum for the IP header)  PPP/Ethernet (CRC-16, CRC-32 for the whole frame)  Why don’t we just have CRCs on the data-link layer?

Problem 4: Reliable link service 19  Recovering from transmission errors.  Solutions: error correction codes, retransmissions  Retransmissions based on positive/negative acknowledgements.  Automatic repeat request (ARQ): stop-and-wait, go- back-N, and selective repeat

Problem 5: Multiple access control problem 20  Coordinate the access to the channel from different users.  Solutions:  ALOHA protocols  Carrier sense MAC protocols (Ethernet, )  Collision-free protocols (polling, token ring, reservation)  Subchannels (frequencies, time, code)

Ethernet 21

22 Physical connectivity  Components:  Cable (passive)  Transceivers (transmitter + receiver)  Adaptor (active). Each adaptor card is uniquely identified by a 48-bit (physical or MAC) address, e.g., 00:40:26:5A:67:88.  Design principles:  Cost-effective resource sharing  Reliability  Inexpensive

23 lease12.0_5_xp/swcfg/kiintro.html

24 Switched Ethernets  Both DIX and IEEE Ethernets do not require switching elements.  Hosts are connected to a cable (10base2/5/T) through network adaptors.  Several segments may be connected (horizontally) to another segment (vertically) through hubs, which serve as repeaters.  Switched Ethernets  10G Ethernets, Optical Ethernets, Wireless Ethernets, Metro Ethernets, Carrier Ethernets

25 Ethernet frames  DIX Ethernet frame structure:  IEEE Ethernet frame structure: 4-byte CRC dest address src address lenData DSAP AA SSAP AA cntl 03 org code 00 type MAC802.2 LLC802.2 SNAP 4-byte CRC 6-byte dest address 6-byte src address Data type 0800 IP datagram 2-byte type 7-byte preamble 1-byte start frame delimiter Preamble

An example 26

27 Ethernet’s MAC protocol  Types of MAC addresses:  Unicast address: hardwired into ROM  Broadcast address: all 1 bits  Multicast address: First bit set to 1 and configurable.  Promiscuous mode  CSMA/CD (carrier sense multiple access with collision detection)  Each adaptor is able to distinguish a busy link from an idle link.  Each adaptor is able to detect “frame collisions,” if occurred, as it transmits.

Summary 28  The services at the first two layers  The five main problems at the data link layers  Solutions to the problems  The Ethernet

Acknowledgements 29  Thanks to all the sources where the diagrams were extracted from.