Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith...
-
Upload
audrey-rogers -
Category
Documents
-
view
222 -
download
0
Transcript of Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith...
![Page 1: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/1.jpg)
Ch 5. Link layer and Local Area Networks
from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003.
Myungchul Kim
![Page 2: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/2.jpg)
2
A transmitting node encapsulates the datagram in a link-layer frame and transmits the frame into the link; and a receiving node receives the frame and extracts the datagram.
Error detection, retransmission, flow control, and random access A single link in the path A link-layer protocol includes
– Framing– Link access: multiple access problem– Reliable delivery– Flow control: frame buffering capacity– Error detection– Error correction– Half-duplex and full-duplex
Data link layer
![Page 3: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/3.jpg)
3
Adaptors: network interface cards (NICs) Fig 5.3
The link interface is responsible for implementing the link-layer protocol
![Page 4: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/4.jpg)
4
Point-to-point link: PPP, HDLC Broadcast link: multiple sending and receiving nodes all connected
to the same, single, shared broadcast channel. Fig 5.9
Multiple access protocol
![Page 5: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/5.jpg)
5
Multiple access protocols: channel partitioning protocols, random access protocols, and taking-turns protocols.
Channel partitioning protocols– TDM, FDM– Fig 5.10
![Page 6: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/6.jpg)
6
Code Division Multiple Access (CDMA)– Assigns a different code to each node– Allows different nodes to transmit simultaneously and yet have t
heir respective receivers correctly receive a sender’s encoded data bits in spite of interfering transmissions by other node.
– Partitions the codespace– Issues: 1. codes must be carefully chosen, 2. the received signal
strengths from various senders at a receiver are the same.
![Page 7: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/7.jpg)
7
Fig 5.11
![Page 8: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/8.jpg)
8
Random access protocols: slotted ALOHA, ALOHA, CSMA
Slotted ALOHA– Page 440.– Fig 5.13
– At best only 37 percent of the slots do useful work.
![Page 9: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/9.jpg)
9
CSMA– Listen before speaking: carrier sensing– If someone else begins talking at the same time, stop talking: col
lision detection.– CSMA vs CSMA/CD– The longer this propagation delay, the larger the chance that a c
arrier-sensing node is not yet able to sense a transmission that has already begun at another node in the network.
– When a node performs collision detection, it will cease transmission as soon as it detects a collision.
![Page 10: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/10.jpg)
10
Fig 5.15
![Page 11: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/11.jpg)
11
Fig 5.16
![Page 12: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/12.jpg)
12
Taking-turns protocol– Polling protocol– Token-passing protocol
![Page 13: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/13.jpg)
13
LAN address, physical address, Ethernet address, MAC address: six bytes in hexadecimal notation
Fig 5.18
LAN broadcast address: FF-FF-FF-FF-FF-FF
LAN addresses and ARP
![Page 14: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/14.jpg)
14
Address resolution protocol (ARP): an IP address to a LAN address
Fig 5.19
DNS? ARP query within a broadcast message and plug-and-
play using ARP table (Fig 5.20)
![Page 15: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/15.jpg)
15
Sending a datagram to a node off the LAN Fig 5.21
![Page 16: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/16.jpg)
16
Reasons for success– Deployed early– Simple and cheap– Producing competent versions
Use the same frame structure Fig 5.23
Data field (46 to 1500 bytes): carries the IP datagram, MTU
Ethernet
![Page 17: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/17.jpg)
17
Type fields (2bytes): IP, Novell IPX, AppleTalk, ARP, .. CRC: detect errors Preamble (8bytes): 10101010(7times) and 10101011 Unreliable connectionless service vs IP, TCP, UDP Baseband transmission Manchester encoding (physical layer) Fig 5.24
![Page 18: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/18.jpg)
18
CSMA/CD mechanisms1. An adaptor may begin to transmit at any time; that is, no slots
are used.
2. An adaptor never transmits a frame when it senses that some other adaptor is transmitting; that is, it uses carrier sensing.
3. A transmitting adapter aborts its transmission as soon as it detects that another adaptor is also transmitting; that is, it uses collision detection.
4. Before attempting a retransmission, an adaptor waits a random time that is typically small compared with the time to transmit a frame.
![Page 19: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/19.jpg)
19
10Base2, 10BaseT, 100BaseT, Gigabit Ethernet Repeater: a physical-layer device acts on individual bits
rather than on frames. Fig 5.25
![Page 20: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/20.jpg)
20
A hub is a repeater Fig 5.26
![Page 21: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/21.jpg)
21
The hub simply broadcasts the bit on all the other interfaces.
The same collision domain Fig 5.27
Hubs
![Page 22: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/22.jpg)
22
Limitations– Larger collision domain– Same Ethernet technologies– Max allowable number of nodes in a collision domain
![Page 23: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/23.jpg)
23
Layer-2 devices Isolated collision domain, different LAN, no limit on the
size of LAN Filtering and forwarding using bridge table Fig 5.28
Bridges
![Page 24: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/24.jpg)
24
Self-learning: a bridge table is build automatically. Plug-and-play device
Bridges vs Routers– Plug-and-play or not– Layer 2 or 3– Broadcast– Flat vs hierarchical addressing– Network size
![Page 25: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/25.jpg)
25
Fig 5.32
![Page 26: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/26.jpg)
26
Bridge (a small number of interfaces) switches (dozens of interfaces)
Full-duplex mode Fig 5.34
Neither collision detection nor carrier sending No medium-access protocol
Switches
![Page 27: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/27.jpg)
27
Cut-through switching: if the buffer becomes empty before the entire packet has arrived, the switch can start to transmit the front of the packet while the back of the packet continues to arrive.
Table 5.1
![Page 28: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/28.jpg)
28
Ubiquitous computing IEEE 802.11b: wireless Ethernet, Wi-Fi
– 2.4 GHz– 11 Mbps– Physical layer: Direct Sequence Spread Spectrum (DSSS)– MAC layer
802.11a: 5-6GHz, 54Mbps 802.11g: 2.4GHZ, 54Mbps All of the 802.11 standards have the same architecture a
nd use the same MAC protocol
Wireless Links
![Page 29: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/29.jpg)
29
Basic service set (BSS): a cell, Access point (AP) ad hoc network Fig 5.36
![Page 30: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/30.jpg)
30
802.11 Media access protocol– An explicit ack from back to the sender– Fig 5.38
![Page 31: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/31.jpg)
31
No collision detection– Costly– A collision still occur at the receiver, why
Hidden terminal problem and fading– Fig 5.39
![Page 32: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/32.jpg)
32
To avoid collisions (CSMA/CA)– A duration field indicating the length of time that its frame will be
transmitting on the channel, network allocation vector (NAV)– RTS and CTS to reserve access to the channel
CTS frame helps avoid both the hidden station problem and the fading problem
The RTS and CTS frames are short.
![Page 33: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/33.jpg)
33
– Fig 5.40
![Page 34: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/34.jpg)
34
Bluetooth– 2.45GHz– 721-64kbps– 10 – 100 meter– Replacement of cable– Cf. infrared technology
![Page 35: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/35.jpg)
35
Data link layer protocol– Packet framing– Transparency– Multiple network-layer protocols– Multiple types of links– Error detection– Connection liveness– Network-layer address negotiation– Simplicity
Not required to implement– Error correction– Flow control– Sequencing– Multipoint links
PPP
![Page 36: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/36.jpg)
36
PPP data framing– Address and control fields not used– Fig 5.41
![Page 37: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/37.jpg)
37
Byte stuffing– Forbid the upper-layer protocol from sending data containing the
flag field bit pattern.– Control escape byte, 01111101– Fig 5.43
![Page 38: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/38.jpg)
38
characteristics– From an application-level API to the physical layer– CBR, VBR, ABR and UBR– Cell: 5 + 48 bytes– Virtual circuits: virtual channel identifier (VCI)– No retransmission on a link-by-link basis– Congestion control only within the ATM ABR – Run over any physical layer
ATM
![Page 39: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/39.jpg)
39
Fig 5.44 and 5.45
![Page 40: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/40.jpg)
40
Fig 5.47
![Page 41: Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, 2003. Myungchul Kim mckim@icu.ac.kr.](https://reader035.fdocuments.in/reader035/viewer/2022062308/56649e605503460f94b5b45c/html5/thumbnails/41.jpg)
41
IP over ATM– Dynamic vs Permanent virtual channel– pp. 503-504– Fig 5.52