1 Link Layer 3 Mozafar Bag-Mohammadi University of Ilam.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

1 ICS 156: Lecture 2 (part 2) Data link layer protocols Address resolution protocol Notes on lab 2.
CS Direct Link Networks (Continued) Slide Set 6.
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Point-to-Point Protocol
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Wireless LANs and Introduction to IP Slide Set 7.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
Network Technology CSE Network Technology CSE3020 Week 9.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
ECE544: Communication Networks-II, Spring 2006 D. Raychaudhuri & Max Ott Lecture II Includes teaching materials from L. Peterson.
Wireless Networking So we talked about wired networks. What about wireless?
CSS 4321 CSS432 Shared Access Networks Textbook Ch2.6, 2.7, and Professor: Munehiro Fukuda.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Spring 2003CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
HDLC and PPP. The Data Link Layer in the Internet A home personal computer acting as an internet host. Technology like Ethernet cannot provide “high-level”
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 7 – February 2, 2010.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Local Area Networks Chapter 17, Exploring the Digital Domain.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
8-Oct-154/598N: Computer Networks Shared Access Networks Token Ring ATM Fibre channel Myrinet.
14-Oct-15Computer Networks1 Reliable Transmission.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
1 Other LANs Token Rings Wireless –Wireless LAN (802.11, WiFi) –Broadband Wireless (802.16) –Bluetooth.
1 IEEE 802 LANs Following the success of CDMA technologies ALOHA & Ethernet, IEEE standardized CDMA/CD technology as IEEE LAN Also standardized are.
1 Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr. Nasser Yazdani Direct Link Networks.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Mozafar Bag-Mohammadi University of Ilam
Point to Point connections
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
1 Shared Access Networks: Token ring, Wireless Sections 2.7 & 2.8.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Data Link Protocols Relates to Lab 2.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Point-Point Protocol (PPP) by William F. Widulski.
The University of Adelaide, School of Computer Science
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
PPP PROTOCOL The First semester
Hubs Hubs are essentially physical-layer repeaters:
Medium Access Control (MAC) Sub-layer
Hubs Hubs are essentially physical-layer repeaters:
CS 457 – Lecture 7 Wireless Networks
Token Ring Overview Examples
EEC-484/584 Computer Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
Overview Yesterday we looked at Ethernet: CSMA/CD network
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
EEC-484/584 Computer Networks
Mozafar Bag-Mohammadi University of Ilam
Presentation transcript:

1 Link Layer 3 Mozafar Bag-Mohammadi University of Ilam

2 Token Ring Overview Examples 16Mbps IEEE (based on earlier IBM ring) 100Mbps Fiber Distributed Data Interface (FDDI)

3 Token Ring (cont) Idea Frames flow in one direction: upstream to downstream special bit pattern (token) rotates around ring must capture token before transmitting release token after done transmitting immediate release delayed release remove your frame when it comes back around stations get round-robin service Frame Format Control CRC Start of frame End of frame Dest addr Body 48 Src addr Status 32

4 Timed Token Algorithm Token Holding Time (THT) upper limit on how long a station can hold the token Token Rotation Time (TRT) how long it takes the token to traverse the ring. TRT <= ActiveNodes x THT + RingLatency Target Token Rotation Time (TTRT) agreed-upon upper bound on TRT

5 Algorithm (cont) Each node measures TRT between successive tokens if measured-TRT > TTRT: token is late so don’t send if measured-TRT < TTRT: token is early so OK to send Two classes of traffic synchronous: can always send asynchronous: can send only if token is early

6 Token Maintenance Lost Token no token when initializing ring bit error corrupts token pattern node holding token crashes Generating a Token (and agreeing on TTRT) execute when join ring or suspect a failure send a claim frame that includes the node’s TTRT bid when receive claim frame, update the bid and forward if your claim frame makes it all the way around the ring: your bid was the lowest everyone knows TTRT you insert new token

7 Maintenance (cont) Monitoring for a Valid Token should periodically see valid transmission (frame or token) maximum gap = ring latency + max frame < = 2.5ms set timer at 2.5ms and send claim frame if it fires

8 Wireless LANs IEEE Physical Media spread spectrum radio (2.4GHz) diffused infrared (10m)

9 Spread Spectrum Idea spread signal over wider frequency band than required originally designed to thwart jamming Frequency Hopping Direct Sequence

10 Frequency Hopping transmit over random sequence of frequencies sender and receiver share… pseudorandom number generator seed uses 79 x 1MHz-wide frequency bands

11 Direct Sequence for each bit, send XOR of that bit and n random bits random sequence known to both sender and receiver called n-bit chipping code defines an 11-bit chipping code Random sequence: Data stream: 1010 XOR of the two:

12 Glossary of Wireless Terms Station (STA): A computer or device with a wireless network interface. Access Point (AP): Device used to bridge the wireless-wired boundary, or to increase distance as a wireless packet repeater. Ad Hoc Network: A temporary one made up of stations in mutual range. Infrastructure Network: One with one or more Access Points. Channel: A radio frequency band, or Infrared, used for shared communication. Basic Service Set (BSS): A set of stations communicating wirelessly on the same channel in the same area, Ad Hoc or Infrastructure. Extended Service Set (ESS): A set BSSs and wired LANs with Access Points that appear as a single logical BSS.

13 Supporting Mobility Case 1: ad hoc networking Case 2: access points (AP) tethered each mobile node associates with an AP

14 Overview, Architecture STA AP ESS BSS Existing Wired LAN Infrastructure Network Ad Hoc Network

15 Mobility (cont) Scanning (selecting an AP) node sends Probe frame all AP’s w/in reach reply with ProbeResponse frame node selects one AP; sends it AssociateRequest frame AP replies with AssociationResponse frame new AP informs old AP via tethered network When active: when join or move passive: AP periodically sends Beacon frame

16 MACAW Sender transmits RequestToSend (RTS) frame Receiver replies with ClearToSend (CTS) frame Neighbors… see CTS: keep quiet see RTS but not CTS: ok to transmit Receiver sends ACK when it has frame neighbors silent until see ACK Collisions no collisions detection known when don’t receive CTS exponential backoff

17 Hidden & Exposed nodes

18 Collisions Avoidance Similar to Ethernet Problem: hidden and exposed nodes Hidden node Exposed node Sending node ABCD

19 Point to Point Data Link Control one sender, one receiver, one link: easier than broadcast link: no Media Access Control no need for explicit MAC addressing e.g., dialup link, ISDN line popular point-to-point Data Link Control protocols: PPP (point-to-point protocol) Protocol choice for dialup link.

20 Point-to-Point (serial) links Many data link connections are point-to-point serial links: Dial-in or DSL access connects hosts to access routers Routers are connected by high-speed point-to-point links IP hosts and routers are connected by a serial cable Data link layer protocols for point- to-point links are simple: Main role is encapsulation of IP datagrams No media access control needed

21 Data Link Protocols for Point-to-Point links SLIP (Serial Line IP) First protocol for sending IP datagrams over dial-up links (from 1988) Encapsulation, not much else PPP (Point-to-Point Protocol): Successor to SLIP (1992), with added functionality Used for dial-in and for high-speed routers HDLC (High-Level Data Link) : Widely used and influential standard (1979) Default protocol for serial links on Cisco routers Actually, PPP is based on a variant of HDLC

22 PPP - IP encapsulation The frame format of PPP is similar to HDLC and the LLC frame format: PPP assumes a duplex circuit Note: PPP does not use addresses Usual maximum frame size is 1500

23 Additional PPP functionality In addition to encapsulation, PPP supports: multiple network layer protocols (protocol multiplexing) Link configuration Link quality testing Error detection Option negotiation Address notification Authentication The above functions are supported by helper protocols: LCP PAP, CHAP NCP

24 PPP Support protocols Link management: The link control protocol (LCP) is responsible for establishing, configuring, and negotiating a data-link connection. LCP also monitors the link quality and is used to terminate the link. Authentication: Authentication is optional. PPP supports two authentication protocols: Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). Network protocol configuration: PPP has network control protocols (NCPs) for numerous network layer protocols. The IP control protocol (IPCP) negotiates IP address assignments and other parameters when IP is used as network layer.