Download presentation
Presentation is loading. Please wait.
Published bySamson West Modified over 9 years ago
1
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) that you mention their source (after all, we’d like people to use our book!) If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Link Layer5-1
2
Link Layer5-2 Link layer, LAN s: outline 5.1 Introduction and services 5.2 Error detection and correction 5.3 Multiple access protocols 5.4 Link-layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request
3
Link Layer5-3 Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links layer-2 packet: frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to physically adjacent node over a link global ISP
4
Link Layer5-4 Link layer: context datagram transferred by different link protocols over different links: e.g., Ethernet on first link, frame relay on intermediate links, IEEE 802.11 on last link each link protocol provides different services e.g., may or may not provide rdt over link transportation analogy: trip from Princeton to Lausanne ( 로잔 ) limousine: Princeton to JFK plane: JFK to Geneva train: Geneva to Lausanne tourist = datagram tour transport segment = communication link tour transportation mode = link layer protocol tour agent = routing algorithm
5
Link Layer5-5 Link layer services framing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium “MAC” addresses used in frame headers to identify source, dest different from IP address! reliable delivery between adjacent nodes we learned how to do this already (chapter 3)! seldom used on low bit-error link (fiber, some twisted pair) wireless links: high error rates Q: why both link-level and end-end reliability?
6
Link Layer5-6 flow control: pacing between adjacent sending and receiving nodes error detection: errors caused by signal attenuation ( 감쇄 ), noise. receiver detects presence of errors: signals sender for retransmission or drops frame error correction: receiver identifies and corrects bit error(s) without resorting to retransmission half-duplex and full-duplex with half duplex, nodes at both ends of link can transmit, but not at same time Link layer services (more)
7
Link Layer5-7 Where is the link layer implemented? in each and every host link layer implemented in “adaptor” (aka network interface card NIC) and its driver software Ethernet card, 802.11 card; Ethernet chipset implements link, physical layer Recent: LAN on motherboard attaches into host’s system buses combination of hardware, software, firmware controller physical transmission cpu memory host bus (e.g., PCI) network adapter (= network interface card) application transport network link physical
8
Link Layer5-8 Adaptors communicating sending side: encapsulates datagram in frame adds error checking bits, rdt, flow control, etc. receiving side looks for errors, rdt, flow control, etc extracts datagram, passes to upper layer at receiving side controller sending host receiving host datagram frame
9
Link Layer5-9 Link layer, LAN s: outline 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request
10
Link Layer5-10 Error detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields Error detection not 100% reliable! protocol may miss some errors, but rarely larger EDC field yields better detection and correction otherwise
11
5: DataLink Layer5-11 There are three ways for error detection. 1)Parity Checking 2)Internet Checksum -Not strong mechanism. -Simple and Fast: implemented by software -Used at TCP and UDP (see Ch. 3.3) 3)CRC: Cyclic Redundancy Check -Mostly used at link-layer -Complex and Slow: implemented by hardware Error detection
12
Link Layer5-12 Parity checking [ 참고 ] http://ko.wikipedia.org/wiki/%ED%8C%A8%EB%A6 %AC%ED%8B%B0_%EB%B9%84%ED%8A%B8 Single Bit Parity: Detect single bit errors – 홀수 패리티, 짝수 패리티 짝수 (even) 패리티 - 전체 비트에서 1 의 개수가 짝수가 되도록 패리티 비트를 설정 - 예를 들어, 데이터 비트에서 1 의 개수가 홀수이면 패리티 비트를 1 로 설정 홀수 (odd) 패리티 - 전체 비트에서 1 의 개수가 홀수가 되도록 패리티 비트를 설정
13
Link Layer5-13 Parity checking Single Bit Parity: Detect single bit errors *** Burst Error A burst error means that 2 or more bits in the data unit have changed. Parity Checking 으로 검사 불가능
14
Link Layer5-14 Parity checking Two Dimensional Bit Parity: Detect and correct single bit errors 0 0 It is also called FEC (Forward Error Correction)
15
Link Layer5-15 Parity checking Two Dimensional Bit Parity: Detect and correct single bit errors
16
Link Layer5-16 Internet checksum (review) sender: treat segment contents as sequence of “16-bit integers (words)” checksum: addition (1’s complement sum) of segment contents sender puts checksum value into UDP checksum field receiver: compute checksum of received segment check if computed checksum equals checksum field value: NO - error detected YES - no error detected. goal: detect “errors” (e.g., flipped bits) in transmitted packet (note: used at transport layer only)
17
Link Layer5-17 Cyclic redundancy check more powerful error-detection coding view data bits, D, as a binary number choose r+1 bit pattern (generator), G Sender and Receiver share the same G goal: sender chooses r CRC bits, R, such that exactly divisible by G (modulo 2) receiver divides by G. If non-zero remainder: error detected! This CRC can detect all burst errors less than r+1 bits widely used in practice (Ethernet, 802.11 WiFi, ATM)
18
Link Layer5-18 Cyclic redundancy check CRC operation G D R
19
Link Layer5-19 CRC example want: D. 2 r XOR R = nG equivalently: D. 2 r = nG XOR R equivalently: if we divide D. 2 r by G, want remainder R to satisfy: R = remainder[ ] D.2rGD.2rG
20
Link Layer5-20 CRC usage ATM cell Generator (G): 8bits IEEE CRC-32 Generator (G CRC-32 ): 32bits 100000100110000010001110110110111 CRC is stronger than parity bit or checksum It can always detect a burst error less than r+1 bits With probability 1-0.5 r, it can detect a burst error more than r+1 bits
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.