2. GETTING CONNECTED (PART 2) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 26 January 2016 1.

Slides:



Advertisements
Similar presentations
Topic 7 Local Area Networks (LAN)
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Computer Networks Ethernet I Professor Hui Zhang
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
CSE331: Introduction to Networks and Security Lecture 5 Fall 2002.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Ethernet, ARP.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
10-01-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 3.1 Packet Switched Local Area Networks.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
Ethernet, MAC podvrstva
Chapter 13 Wired LANs: Ethernet
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
14-Oct-15Computer Networks1 Reliable Transmission.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 15.
Cisco 3 – Switching Concepts Perrine. J Page 16/1/2016 Module 4 The use of bridges and switches for segmentation results in ____? 1.Multiple broadcast.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
1 IEEE 802 LANs Following the success of CDMA technologies ALOHA & Ethernet, IEEE standardized CDMA/CD technology as IEEE LAN Also standardized are.
1 CS4550: Computer Networks II Review Data Link Layer.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
LAYER TWO AND BELOW 1 Rocky K. C. Chang 13 September 2010.
1 FIT1005 Topic 6 - Data Link Layer Reference: Chapter 7 -Stallings.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
1 Chapter 2: Direct Link Networks (Part Two) Dr. Rocky K. C. Chang 30 January 2004.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
Computer Networking Lecture 16 – Reliable Transport.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CS380 Int. to Comp. Networks Data Link Networks - Part II1 Reliable Transmission How to fix corrupted frames. –Error correcting codes too expensive –Should.
Getting Connected (Chapter 2 Part 3)
Data link layer (LLC).
2. Getting connected (part 2)
Data Link Issues Relates to Lab 2.
Getting Connected (Chapter 2 Part 3)
Reliable transmission
Protocol layering and data
7- chapter Seven Local Area Networks (LAN)
Protocol layering and data
Ethernet 16EC351 Computer networks unit II Mr.M.Jagadesh,AP/ECE.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet and Token Ring LAN Networks
Presentation transcript:

2. GETTING CONNECTED (PART 2) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 26 January

2 1. Automatic repeat request (ARQ) Approach to achieving link reliability: Ask for retransmission when a corrupted frame is detected. Mechanisms for asking a sender to retransmit: Receiver to send negative acknowledgments for corrupted frames, or Receiver to send positive acknowledgments for good frames. Which one is better?

3 1. Automatic repeat request (ARQ) Both approaches require a timeout mechanism. Negative-ack approach: A timer starts when a negative acknowledgment is sent out. Positive-ack approach: A timer starts when a message is sent out. Retransmissions take place when timeouts occur: Negative-ack approach: The receiver retransmits a negative acknowledgment. Positive-ack approach: The sender retransmits a frame.

4 1. Automatic repeat request (ARQ) The ARQ implements a positive acknowledgment approach. Only after an acknowledgment is received will a frame be removed from a send buffer. An acknowledgment can be piggybacked on a message sent to the other direction. An acknowledgment sometimes indicates the sequence number of the next expected frame. Positive acknowledgment is usually accumulative, e.g., receiving an acknowledgment for frame 4 implies that frames 1-3 are all received correctly.

5 1.1 Stop-and-wait ARQ The maximum number of unacknowledged frames is one. A sender cannot send a second frame before receiving an acknowledgment for the first frame. The minimum number of sequence numbers needed to identify the frames is two (0, 1), i.e., the first two in the send buffer. 0: for the frame sent and waiting for its acknowledgment. 1: for the frame to be sent after receiving an acknowledgment for the 0th frame.

6

7 1.1 Stop-and-wait ARQ Advantages: Very simple to implement, both on the sender and receiver sides. Disadvantages: Achieve a very low throughput, especially in a high-speed link (does not keep the pipe full). In the best case, only one frame can be sent in a round-trip time. In other cases, an additional number of round-trip times is required when errors occur.

8 1.2 Sliding-window (or go-back-n) ARQ The maximum number of unacknowledged frames may be more than one. A sender may continue to transmit frames even when acknowledgments for frames previously sent are not received. A sliding window is used to keep track of the sender’s state and receiver’s state. The window size determines the maximum number of unacknowledged frames allowed on the sender side.

9 1.2 Sliding-window (or go-back-n) ARQ On the sender side: Frames are labeled by a sequence number of integer values, starting from 1. A static parameter: send window size (SWS) Two variable parameters: The maximum sequence number being acknowledged by the receiver (LAR) The maximum sequence number sent by the sender (LFS) Note that LFS  LAR LFS = LAR: All frames sent have been acknowledged. LFS > LAR: LFS  LAR frames are yet to be acknowledged.

Sliding-window (or go-back-n) ARQ Also note that LFS  SWS + LAR. When LFS = SWS + LAR, the window is said to be full, and no more new frames can be sent before (LAR+1)th frame is acknowledged. How do the values of LFS and LAR change? LFS is initialized to 0, and it is incremented after each new frame is sent. LAR is initialized to 0, and it is shifted to the right according to the new sequence number(s) acknowledged by the receiver.

Sliding-window (or go-back-n) ARQ Sender side: Receiver side: = SWS LAR LFS ……  RWS NFE ……

Sliding-window (or go-back-n) ARQ On the receiver side: A static parameter: receive window size (RWS) RWS is the maximum number of out-of-order frames that the receiver is willing to accept. A variable parameter: Sequence number of the next frame expected (NFE) If a frame, whose sequence number is larger than NFE+RWS, is received, the frame will be discarded; otherwise, it will be buffered in a receive buffer. When a frame is received correctly, NFE is either updated or unchanged.

Three uses of ARQs Provide reliable service Provide in-order service The original order of the frames is preserved even when out-of- order frames are received. Provide flow control Prevent the sender from flooding the receiver. The sender needs to vary the value of SWS by taking into account of the state of the receive buffer.

14 2. Local area networks (LANs) Early 1980s IBM’s token ring vs. DIX (Digital, Intel, and Xerox) Ethernet IEEE (logical link control), (Ethernet), (Token Bus), (Token Ring) Late 1980s Fiber Distributed Data Interface (FDDI) Distributed Queue Dual Bus (DQDB) Early 1990s ATM LANs vs Fast Ethernet (switched Ethernet)

15 2. Local area networks (LANs) Mid-1990s IEEE (wireless LAN) Now and future (who knows?) Gigabit Ethernet vs ATM LANs Optical Ethernet, wireless Ethernet Development trends: From shared medium to switched LANs From router-based backbone to switched backbone From wired to wireless From single-medium to multi-media

Ethernet LAN: physical connectivity Components: Cable (passive) Transceivers (transmitter + receiver) Adaptor (active). Each adaptor card is uniquely identified by a 48-bit (physical or MAC) address, e.g., 00:40:26:5A:67:88. Design principles: Cost-effective resource sharing Reliability Inexpensive

Ethernet LAN: physical connectivity Adaptor Transceiver Host Ethernet cable

Ethernet LAN: physical connectivity Both DIX and IEEE Ethernets do not require switching elements. Hosts are connected to a cable (10base2/5/T) through network adaptors. Several segments may be connected (horizontally) to another segment (vertically) through hubs, which serve as repeaters.

Ethernet LAN: physical connectivity Repeater Host … … … …

Ethernet LAN: physical connectivity from the datalink layer and up

Ethernet LAN: Datalink sublayers A new multiple access control (MAC) problem: How do multiple hosts share a single transmission medium efficiently? This problem occurs in token ring, FDDI, and wireless LAN. An additional MAC sublayer was created for this purpose. A logical link control (LLC) sublayer: Provide similar services as a datalink layer except that error detection is provided at the MAC sublayer.

Ethernet LAN: Datalink sublayers Provide three types of services: Unacknowledged connectionless (datagram) service: Basically no additional service. Acknowledged connectionless service: Reliability through a stop-and- wait-ARQ-like mechanism. Connection-mode service: A connection is set up between two hosts with flow control and reliability services.

Ethernet LAN: Datalink sublayers The datalink layer consists of LLC sublayer and MAC sublayer IEEE Logical Link Control (LLC) Sublayer IEEE IEEE IEEE ANSI FDDI IEEE IEEE

Ethernet LAN: frames DIX Ethernet frame structure: The 7-byte preamble is sent before the frame to allow the receiver to synchronize with the signal. IEEE Ethernet frame structure: 4-byte CRC dest address src address lenData DSAP AA SSAP AA cntl 03 org code 00 type MAC802.2 LLC802.2 SNAP 4-byte CRC 6-byte dest address 6-byte src address Data type 0800 IP datagram 2-byte type 7-byte preamble 1-byte start frame delimiter Preamble

Ethernet LAN: MAC protocol Types of MAC addresses: Unicast address: hardwired into ROM Broadcast address: all 1 bits Multicast address: First bit set to 1 and configurable. Promiscuous mode CSMA/CD (carrier sense multiple access with collision detection) Each adaptor is able to distinguish a busy link from an idle link. Each adaptor is able to detect “frame collisions,” if occurred, as it transmits.

Ethernet LAN: MAC protocol To send a frame, transmits it immediately when the link is detected idle. The maximum length of the payload is 1500 bytes for a 10-Mbps DIX Ethernet. To receive a frame, Every adaptor attached to the link will receive a copy of a frame transmitted on the link. The frame will be discarded if the destination address does not match its unicast address, broadcast address, and any configured multicast addresses.

Ethernet LAN: MAC protocol Carrier sense is not sufficient for avoiding frame collisions. A frame must be long enough to detect collisions: A sufficient condition: A frame occupies the entire pipe back and forth. For example, for a 10-Mbps Ethernet segment of 2500m long (a round- trip propagation delay of 51.2  s): Minimum frame length = 51.2  s  10Mbps = 512 bits (64 bytes), or a 14-byte header + a 46-byte payload + a 4-byte CRC.

Ethernet LAN: MAC protocol AB (a) AB (b) AB (c) AB (d)

Ethernet LAN: MAC protocol When more than one adaptor transmits frames “almost at the same time,” The frames are “collided” and can be detected by the adaptors involved. The adaptors involved then send a 32-bit jamming sequence, and stop transmission. The adaptors use exponential backoff for retransmission (up to a limited number of attempts). After first collision: either 0 or 51.2  s. After second collision: 0, 51.2, 102.4,  s. After nth collision: k  51.2  s for k = 0..2 n  1.

Ethernet’s performance Throughput decreases with a and the number of hosts, where a = propagation delay/transmission delay. Implications: Limit on the number of stations and the maximum length of the Ethernet segment Effect of increasing link’s data rate Support for delay-sensitive data Methods of improving its performance Each collision domain consists of only one host.

4. Wireless Links Wireless links transmit electromagnetic signals Radio, microwave, infrared Wireless links all share the same “wire” (so to speak) The challenge is to share it efficiently without unduly interfering with each other Most of this sharing is accomplished by dividing the “wire” along the dimensions of frequency and space Exclusive use of a particular frequency in a particular geographic area may be allocated to an individual entity such as a corporation

4. Wireless Links A wireless network using a base station

4. Wireless Links Mesh or Ad-hoc network Nodes are peers Messages may be forwarded via a chain of peer nodes A wireless ad-hoc or mesh network

4.1 Wireless LAN (IEEE ) Also known as Wi-Fi Like its Ethernet and token ring siblings, is designed for use in a limited geographical area (homes, office buildings, campuses) Primary challenge is to mediate access to a shared communication medium – in this case, signals propagating through space supports additional features power management and security mechanisms

Wireless LAN (IEEE ) MAC problem: Hidden node (terminal) problem: Frame collision occurs but the senders involved are unaware of it. A  B and C  B (A and C are not connected) Exposed node problem: A node is unnecessarily prevented from transmitting frames. B  A and C  D (A and D are not connected) Both problems are due to the fact that, unlike Ethernet, the nodes are not always connected together.

Wireless LAN (IEEE ) Multiple Access with Collision Avoidance (MACA) To send a frame, the sender first sends a Request to Send (RTS) frame to the receiver.

Wireless LAN (IEEE ) The receiver then replies with a Clear to Send (CTS) frame back to the sender. Any node that sees the CTS frame will refrain from sending any frames (for the hidden node problem). Any node that sees the RTS frame but not the CTS frame is free to transmit (for the exposed node problem). When two or more nodes transmit an RTS frame at the same time, their RTS frames collide. Retransmission of RTS frames takes place after the nodes involved do not receive the CTS frames, i.e. no direct collision detection supported.