This document discusses the link layer and local area networks. It begins with an introduction to link layer services including framing, link access, reliable delivery, flow control, and error detection and correction. It then covers topics like multiple access protocols, including random access protocols like ALOHA and CSMA, and controlled access protocols. Local area network technologies are discussed next, focusing on Ethernet, switches, and addressing protocols like ARP. The document concludes with sections on link virtualization using MPLS and data center networking.
The document provides an overview of the link layer. It discusses the goals and services of the link layer, including error detection, correction, and sharing access to broadcast channels through multiple access protocols. It describes various link layer technologies like Ethernet, switches, and VLANs. It also covers topics like link layer addressing using MAC addresses, the Address Resolution Protocol (ARP) for mapping IP addresses to MAC addresses, and examples of multiple access protocols including Carrier Sense Multiple Access with Collision Detection (CSMA/CD) used in Ethernet networks.
The document discusses data link layer protocols and multiple access protocols. It describes several protocols for sharing a broadcast channel, including slotted ALOHA, CSMA, CSMA/CD, and token passing. It also discusses error detection techniques like parity checking and cyclic redundancy checks used at the data link layer. The goal of the data link layer is to reliably transfer data frames between adjacent nodes over a link using addressing, error detection, flow control and other services.
The document summarizes key concepts about the data link layer. It discusses the goals and services of the data link layer, including error detection and correction, sharing broadcast channels through multiple access protocols, link layer addressing, and reliable data transfer and flow control. It also provides an overview of common link layer technologies and implementation through instantiation of various data link layer protocols.
This document provides an overview of various topics related to the network layer, including IPv4, IPv6, ARP, RARP, mobile IP, routing algorithms, and routing protocols. It begins with basics of IPv4 such as its addressing scheme and role in interconnecting networks. IPv6 is then introduced, along with reasons for its development and key features like its large 128-bit addresses. Address Resolution Protocol (ARP) and Reverse ARP (RARP) are also covered. The document concludes by discussing routing algorithms like link-state and distance-vector, as well as protocols including RIP, OSPF, and BGP.
PPP and HDLC are point-to-point protocols used at the data link layer. PPP provides connection management, parameter negotiation, and supports multiple network layer protocols. It is commonly used for dial-up and broadband connections. HDLC also supports point-to-point and multi-point connections with frame formatting and error detection. Both protocols provide reliable data transfer through mechanisms like sequence numbers, acknowledgments, and error checking.
This document discusses the seven layers of the OSI model. It describes each layer in detail, including their functions and protocols. The physical layer is responsible for transmitting raw bits over a communication channel. The data link layer handles framing and accessing the physical medium. The network layer handles logical addressing and routing. The transport layer provides reliable data transmission and flow control. The session layer manages connections between applications. The presentation layer converts between different data representations. The application layer contains protocols for common network applications and interacts directly with software.
This document provides an overview of Point-to-Point Protocol (PPP) including how it is used to encapsulate TCP/IP and other network layer protocols over dial-up connections. PPP uses the Link Control Protocol (LCP) to establish and configure connections, and the Network Control Protocol (NCP) to establish specific network layer protocols. The document discusses how to configure PPP encapsulation on an interface and assign IP addresses to remote users. It also covers PPP authentication using PAP and CHAP as well as other PPP features negotiated by LCP such as compression and Multilink PPP.
The document discusses the network layer and routing. It begins by stating the goals of understanding network layer services like routing, dealing with scale, and router functionality. It then provides an overview of network layer services, routing principles, hierarchical routing, IP, routing protocols, and functions of routers. The key abstraction provided by the network layer is the service model, which can be either virtual circuits or datagrams. Routing determines the path between source and destination, and algorithms like Dijkstra's algorithm are used to find the least cost path through a graph of routers and links.
The document provides an overview of the link layer. It discusses the goals and services of the link layer, including error detection, correction, and sharing access to broadcast channels through multiple access protocols. It describes various link layer technologies like Ethernet, switches, and VLANs. It also covers topics like link layer addressing using MAC addresses, the Address Resolution Protocol (ARP) for mapping IP addresses to MAC addresses, and examples of multiple access protocols including Carrier Sense Multiple Access with Collision Detection (CSMA/CD) used in Ethernet networks.
The document discusses data link layer protocols and multiple access protocols. It describes several protocols for sharing a broadcast channel, including slotted ALOHA, CSMA, CSMA/CD, and token passing. It also discusses error detection techniques like parity checking and cyclic redundancy checks used at the data link layer. The goal of the data link layer is to reliably transfer data frames between adjacent nodes over a link using addressing, error detection, flow control and other services.
The document summarizes key concepts about the data link layer. It discusses the goals and services of the data link layer, including error detection and correction, sharing broadcast channels through multiple access protocols, link layer addressing, and reliable data transfer and flow control. It also provides an overview of common link layer technologies and implementation through instantiation of various data link layer protocols.
This document provides an overview of various topics related to the network layer, including IPv4, IPv6, ARP, RARP, mobile IP, routing algorithms, and routing protocols. It begins with basics of IPv4 such as its addressing scheme and role in interconnecting networks. IPv6 is then introduced, along with reasons for its development and key features like its large 128-bit addresses. Address Resolution Protocol (ARP) and Reverse ARP (RARP) are also covered. The document concludes by discussing routing algorithms like link-state and distance-vector, as well as protocols including RIP, OSPF, and BGP.
PPP and HDLC are point-to-point protocols used at the data link layer. PPP provides connection management, parameter negotiation, and supports multiple network layer protocols. It is commonly used for dial-up and broadband connections. HDLC also supports point-to-point and multi-point connections with frame formatting and error detection. Both protocols provide reliable data transfer through mechanisms like sequence numbers, acknowledgments, and error checking.
This document discusses the seven layers of the OSI model. It describes each layer in detail, including their functions and protocols. The physical layer is responsible for transmitting raw bits over a communication channel. The data link layer handles framing and accessing the physical medium. The network layer handles logical addressing and routing. The transport layer provides reliable data transmission and flow control. The session layer manages connections between applications. The presentation layer converts between different data representations. The application layer contains protocols for common network applications and interacts directly with software.
This document provides an overview of Point-to-Point Protocol (PPP) including how it is used to encapsulate TCP/IP and other network layer protocols over dial-up connections. PPP uses the Link Control Protocol (LCP) to establish and configure connections, and the Network Control Protocol (NCP) to establish specific network layer protocols. The document discusses how to configure PPP encapsulation on an interface and assign IP addresses to remote users. It also covers PPP authentication using PAP and CHAP as well as other PPP features negotiated by LCP such as compression and Multilink PPP.
The document discusses the network layer and routing. It begins by stating the goals of understanding network layer services like routing, dealing with scale, and router functionality. It then provides an overview of network layer services, routing principles, hierarchical routing, IP, routing protocols, and functions of routers. The key abstraction provided by the network layer is the service model, which can be either virtual circuits or datagrams. Routing determines the path between source and destination, and algorithms like Dijkstra's algorithm are used to find the least cost path through a graph of routers and links.
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
The document provides an overview of concepts related to the data link layer. It discusses functions of the data link layer including framing, flow control, and error detection. It also covers topics such as HDLC, PPP, channel allocation problems, multiple access protocols including ALOHA, CSMA, CSMA/CD, and channelization techniques like FDMA, TDMA, and CDMA. Specific standards for wired LANs like Ethernet and wireless LANs like IEEE 802.11 are also mentioned. Finally, it briefly discusses technologies like token bus, token ring, and virtual LANs.
The document discusses the transport layer and key protocols TCP and UDP. It outlines the chapter which covers transport layer services like multiplexing and demultiplexing, connectionless transport with UDP, principles of reliable data transfer, connection-oriented transport with TCP including segment structure, reliable data transfer, flow control, and connection management, and principles of congestion control including TCP congestion control. It provides details on multiplexing and demultiplexing to direct segments to the appropriate socket, UDP using port numbers but providing unreliable delivery, and TCP using a 4-tuple to identify connections and providing reliable in-order byte stream delivery with congestion control and flow control.
Multi-Protocol Label Switching has become by far one of the most important Internet technologies of the last 15 years. From humble beginnings back in 1996-97, it is literally the defacto standard in a large majority of service provider networks today. This presentation, delivered to executives at MTNL, Mumbai (a large regional carrier in India), explains the key operational principles behind MPLS, and its significant applications.
This document provides an outline and overview of key topics in the transport layer chapter of a computer networking textbook. It introduces the goals of understanding transport layer services like multiplexing and demultiplexing, reliable data transfer, and congestion control. It summarizes the two main Internet transport protocols - UDP, which provides a connectionless unreliable service, and TCP, which provides connection-oriented reliable delivery along with congestion control. It also outlines the process of developing a reliable data transfer protocol incrementally to handle an unreliable channel.
The document discusses key concepts about the network layer, including:
1) The network layer is responsible for transporting data segments from the sending host to the receiving host by encapsulating segments into datagrams. Network layer protocols exist in every host and router.
2) The main functions of the network layer are forwarding, which moves packets through routers from input to output, and routing, which determines the best path from source to destination using routing algorithms.
3) Network layers can provide either a connection-oriented service using virtual circuits, which require call setup, or a connectionless service using datagrams as in the Internet protocol.
A brief explanation of how the web request works. The smooth process can be hard to understand at first, but as you go through the slide it will become more clearer than earlier.
The document discusses several topics related to computer network models and protocols. It describes the OSI model which consists of seven layers and was developed by ISO to ensure worldwide data communication. It also discusses the TCP/IP model. The network layer is described in detail, covering functions like routing packets between networks and logical to physical address translation. Store-and-forward packet switching is explained. The transport layer provides services like port addressing, segmentation and reassembly, and connection-oriented and connectionless transmission. IP addressing schemes like classful and classless are summarized. Network protocols such as ARP, DHCP, ICMP, and RIP are also mentioned briefly.
PPP is a protocol for point-to-point connections that defines how two devices can establish a link and exchange data. It uses byte stuffing to allow data transparency and defines the format of frames exchanged. PPP uses three protocols - LCP for link establishment and termination, authentication protocols like PAP and CHAP for verifying identities, and NCP like IPCP to encapsulate network layer data for transmission.
The document provides an overview of MPLS (Multi-Protocol Label Switching) concepts and components. It discusses how MPLS separates routing from forwarding by using labels to forward packets based on the label rather than the IP address. It describes MPLS components like edge label switching routers (ELSR or PE), label switching routers (LSR or P), and the label distribution protocol (LDP). It also provides examples of MPLS forwarding and MPLS VPN operation.
- The document is a chapter from a textbook on computer networking that discusses the network layer. It covers topics like virtual circuit networks, datagram networks, the operation of routers, IP, routing algorithms, and routing in the Internet.
- Routers examine header fields to forward packets to the appropriate output port based on the destination address and routing tables. Routing algorithms determine the path packets take between source and destination.
- Virtual circuit networks use call setup and connection state in routers to provide guaranteed services, while datagram networks like the Internet forward packets based only on destination addresses for simple operation.
The document discusses Point-to-Point Protocol (PPP) and its roles in both wired and wireless internet access. PPP is used to establish and configure connections between two nodes and encapsulate network layer protocol packets for transmission over serial links. It consists of a Link Control Protocol (LCP) for link configuration and establishment and Network Control Protocols (NCPs) like IPCP for network layer configuration. The document examines how PPP is used for dial-up connections, WAP over CSD and GPRS, and using mobile phones as modems through PPP dial-in. Protocol analysis of an MMS transmission over HTTP, TCP, IP and PPP over CSD is also presented.
This document provides an overview of the key topics covered in Chapter 4 of the textbook "Computer Networking: A Top Down Approach" including:
- The network layer principles of forwarding versus routing, how routers work, routing algorithms, and scaling techniques.
- Network layer service models including best effort, guaranteed delivery, and quality of service guarantees.
- Virtual circuit and datagram networks and how connections are established in each.
- The internal components and functions of routers including routing algorithms, forwarding tables, switching fabrics, input/output port queuing.
- The Internet network layer protocols including IP for addressing, datagrams, and fragmentation/reassembly, ICMP for error reporting, and routing protocols.
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
The document discusses data link layer framing and protocols. It describes:
1) Two main approaches to framing - byte-oriented (using sentinel characters) and bit-oriented (using bit stuffing). Protocols discussed include BISYNC, DDCMP, and HDLC.
2) Features of PPP framing including negotiated field sizes and use of LCP control messages.
3) Functions of data link layer including framing, flow control, error control, and media access control. The relationship between the logical link control and media access control sublayers is also covered.
This document contains slides summarizing key concepts about network layer control planes from the textbook "Computer Networking: A Top Down Approach". The slides cover traditional routing algorithms like link state (e.g. Dijkstra's algorithm) and distance vector (e.g. Bellman-Ford), as well as software defined networking control planes. Specific routing protocols discussed include OSPF, BGP, OpenFlow and SDN controllers. The document also mentions ICMP and network management using SNMP.
This document discusses the User Datagram Protocol (UDP) which provides a connectionless mode of communication between applications on hosts in an IP network. It describes the format of UDP packets, how UDP checksums are calculated, and UDP's operation including encapsulation, queuing, and demultiplexing. Examples are provided to illustrate how a UDP control block table and queues are used to handle incoming and outgoing UDP packets. The document also discusses when UDP is an appropriate protocol to use compared to TCP.
Tutorial about MPLS Implementation with Cisco Router, this second of two chapter discuss about MPLS Configuration, LDP Configuration, VPN Services, L2VPN (VLL & VPLS) and L3VPN (VPRN).
it also contain case study and implementation of VLL, VPLS, and VPRN
The document provides an overview of Chapter 3 from the textbook "Computer Networking: A Top Down Approach" by Jim Kurose and Keith Ross. It discusses the goals and outline of the chapter which covers transport layer services, multiplexing and demultiplexing, UDP, principles of reliable data transfer, TCP, and congestion control. Specifically, it describes transport layer services, multiplexing and demultiplexing of data between applications, UDP as a connectionless transport protocol, and outlines the topics to be covered related to reliable data transfer and TCP.
The document discusses various topics related to network layer in computer networks including network layer services, packet switching, IP addressing, forwarding of IP packets, routing algorithms, and IP protocols. Specifically, it covers logical addressing, services provided at different nodes, forwarding methods based on destination address and labels, IP version 4 addressing including classes and subnetting, and processing of packets at routers and destination computers.
The document discusses the link layer and provides an overview of its services and functions. It describes multiple access protocols for shared mediums including ALOHA, slotted ALOHA, CSMA, CSMA/CD. CSMA/CD is used in Ethernet and detects collisions to reduce wasted bandwidth. The document outlines error detection methods like parity checking, cyclic redundancy checks, and discusses how the link layer is implemented in network interface cards.
The document discusses the link layer and provides an overview of its goals and services including error detection, multiple access protocols, and local area networks. It outlines the topics that will be covered in the chapter including error detection and correction, multiple access protocols like CSMA/CD, addressing in LANs, Ethernet, switches, and VLANs. The slides are being made freely available for educational use provided proper attribution is given.
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
The document provides an overview of concepts related to the data link layer. It discusses functions of the data link layer including framing, flow control, and error detection. It also covers topics such as HDLC, PPP, channel allocation problems, multiple access protocols including ALOHA, CSMA, CSMA/CD, and channelization techniques like FDMA, TDMA, and CDMA. Specific standards for wired LANs like Ethernet and wireless LANs like IEEE 802.11 are also mentioned. Finally, it briefly discusses technologies like token bus, token ring, and virtual LANs.
The document discusses the transport layer and key protocols TCP and UDP. It outlines the chapter which covers transport layer services like multiplexing and demultiplexing, connectionless transport with UDP, principles of reliable data transfer, connection-oriented transport with TCP including segment structure, reliable data transfer, flow control, and connection management, and principles of congestion control including TCP congestion control. It provides details on multiplexing and demultiplexing to direct segments to the appropriate socket, UDP using port numbers but providing unreliable delivery, and TCP using a 4-tuple to identify connections and providing reliable in-order byte stream delivery with congestion control and flow control.
Multi-Protocol Label Switching has become by far one of the most important Internet technologies of the last 15 years. From humble beginnings back in 1996-97, it is literally the defacto standard in a large majority of service provider networks today. This presentation, delivered to executives at MTNL, Mumbai (a large regional carrier in India), explains the key operational principles behind MPLS, and its significant applications.
This document provides an outline and overview of key topics in the transport layer chapter of a computer networking textbook. It introduces the goals of understanding transport layer services like multiplexing and demultiplexing, reliable data transfer, and congestion control. It summarizes the two main Internet transport protocols - UDP, which provides a connectionless unreliable service, and TCP, which provides connection-oriented reliable delivery along with congestion control. It also outlines the process of developing a reliable data transfer protocol incrementally to handle an unreliable channel.
The document discusses key concepts about the network layer, including:
1) The network layer is responsible for transporting data segments from the sending host to the receiving host by encapsulating segments into datagrams. Network layer protocols exist in every host and router.
2) The main functions of the network layer are forwarding, which moves packets through routers from input to output, and routing, which determines the best path from source to destination using routing algorithms.
3) Network layers can provide either a connection-oriented service using virtual circuits, which require call setup, or a connectionless service using datagrams as in the Internet protocol.
A brief explanation of how the web request works. The smooth process can be hard to understand at first, but as you go through the slide it will become more clearer than earlier.
The document discusses several topics related to computer network models and protocols. It describes the OSI model which consists of seven layers and was developed by ISO to ensure worldwide data communication. It also discusses the TCP/IP model. The network layer is described in detail, covering functions like routing packets between networks and logical to physical address translation. Store-and-forward packet switching is explained. The transport layer provides services like port addressing, segmentation and reassembly, and connection-oriented and connectionless transmission. IP addressing schemes like classful and classless are summarized. Network protocols such as ARP, DHCP, ICMP, and RIP are also mentioned briefly.
PPP is a protocol for point-to-point connections that defines how two devices can establish a link and exchange data. It uses byte stuffing to allow data transparency and defines the format of frames exchanged. PPP uses three protocols - LCP for link establishment and termination, authentication protocols like PAP and CHAP for verifying identities, and NCP like IPCP to encapsulate network layer data for transmission.
The document provides an overview of MPLS (Multi-Protocol Label Switching) concepts and components. It discusses how MPLS separates routing from forwarding by using labels to forward packets based on the label rather than the IP address. It describes MPLS components like edge label switching routers (ELSR or PE), label switching routers (LSR or P), and the label distribution protocol (LDP). It also provides examples of MPLS forwarding and MPLS VPN operation.
- The document is a chapter from a textbook on computer networking that discusses the network layer. It covers topics like virtual circuit networks, datagram networks, the operation of routers, IP, routing algorithms, and routing in the Internet.
- Routers examine header fields to forward packets to the appropriate output port based on the destination address and routing tables. Routing algorithms determine the path packets take between source and destination.
- Virtual circuit networks use call setup and connection state in routers to provide guaranteed services, while datagram networks like the Internet forward packets based only on destination addresses for simple operation.
The document discusses Point-to-Point Protocol (PPP) and its roles in both wired and wireless internet access. PPP is used to establish and configure connections between two nodes and encapsulate network layer protocol packets for transmission over serial links. It consists of a Link Control Protocol (LCP) for link configuration and establishment and Network Control Protocols (NCPs) like IPCP for network layer configuration. The document examines how PPP is used for dial-up connections, WAP over CSD and GPRS, and using mobile phones as modems through PPP dial-in. Protocol analysis of an MMS transmission over HTTP, TCP, IP and PPP over CSD is also presented.
This document provides an overview of the key topics covered in Chapter 4 of the textbook "Computer Networking: A Top Down Approach" including:
- The network layer principles of forwarding versus routing, how routers work, routing algorithms, and scaling techniques.
- Network layer service models including best effort, guaranteed delivery, and quality of service guarantees.
- Virtual circuit and datagram networks and how connections are established in each.
- The internal components and functions of routers including routing algorithms, forwarding tables, switching fabrics, input/output port queuing.
- The Internet network layer protocols including IP for addressing, datagrams, and fragmentation/reassembly, ICMP for error reporting, and routing protocols.
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
The document discusses data link layer framing and protocols. It describes:
1) Two main approaches to framing - byte-oriented (using sentinel characters) and bit-oriented (using bit stuffing). Protocols discussed include BISYNC, DDCMP, and HDLC.
2) Features of PPP framing including negotiated field sizes and use of LCP control messages.
3) Functions of data link layer including framing, flow control, error control, and media access control. The relationship between the logical link control and media access control sublayers is also covered.
This document contains slides summarizing key concepts about network layer control planes from the textbook "Computer Networking: A Top Down Approach". The slides cover traditional routing algorithms like link state (e.g. Dijkstra's algorithm) and distance vector (e.g. Bellman-Ford), as well as software defined networking control planes. Specific routing protocols discussed include OSPF, BGP, OpenFlow and SDN controllers. The document also mentions ICMP and network management using SNMP.
This document discusses the User Datagram Protocol (UDP) which provides a connectionless mode of communication between applications on hosts in an IP network. It describes the format of UDP packets, how UDP checksums are calculated, and UDP's operation including encapsulation, queuing, and demultiplexing. Examples are provided to illustrate how a UDP control block table and queues are used to handle incoming and outgoing UDP packets. The document also discusses when UDP is an appropriate protocol to use compared to TCP.
Tutorial about MPLS Implementation with Cisco Router, this second of two chapter discuss about MPLS Configuration, LDP Configuration, VPN Services, L2VPN (VLL & VPLS) and L3VPN (VPRN).
it also contain case study and implementation of VLL, VPLS, and VPRN
The document provides an overview of Chapter 3 from the textbook "Computer Networking: A Top Down Approach" by Jim Kurose and Keith Ross. It discusses the goals and outline of the chapter which covers transport layer services, multiplexing and demultiplexing, UDP, principles of reliable data transfer, TCP, and congestion control. Specifically, it describes transport layer services, multiplexing and demultiplexing of data between applications, UDP as a connectionless transport protocol, and outlines the topics to be covered related to reliable data transfer and TCP.
The document discusses various topics related to network layer in computer networks including network layer services, packet switching, IP addressing, forwarding of IP packets, routing algorithms, and IP protocols. Specifically, it covers logical addressing, services provided at different nodes, forwarding methods based on destination address and labels, IP version 4 addressing including classes and subnetting, and processing of packets at routers and destination computers.
The document discusses the link layer and provides an overview of its services and functions. It describes multiple access protocols for shared mediums including ALOHA, slotted ALOHA, CSMA, CSMA/CD. CSMA/CD is used in Ethernet and detects collisions to reduce wasted bandwidth. The document outlines error detection methods like parity checking, cyclic redundancy checks, and discusses how the link layer is implemented in network interface cards.
The document discusses the link layer and provides an overview of its goals and services including error detection, multiple access protocols, and local area networks. It outlines the topics that will be covered in the chapter including error detection and correction, multiple access protocols like CSMA/CD, addressing in LANs, Ethernet, switches, and VLANs. The slides are being made freely available for educational use provided proper attribution is given.
Data centers architecture and design guideMattPeci
Data center architecture, as an architectural design that establishes connections between switches and servers, is typically created during the data center design and construction phases
This document discusses data center network architectures. It begins by noting that data centers contain tens to hundreds of thousands of closely coupled hosts in close proximity, posing challenges around load management and avoiding bottlenecks. It then describes common data center network components like server racks, top-of-rack switches, core switches, and load balancers. Load balancers direct external client requests and hide the internal data center structure. The network uses a rich interconnection of switches and racks for increased throughput and redundancy. Broad questions are raised around networking massive numbers of machines, virtualization resource management, and reducing operational costs like power.
This document discusses the link layer and provides an overview of its services and context. It describes how the link layer is implemented in network interface cards and how these cards encapsulate datagrams into frames. It also outlines the topics to be covered, including error detection and correction, multiple access protocols, local area networks, and link virtualization.
The document discusses link layer concepts including link layer addressing, MAC addresses, ARP, Ethernet frames, CSMA/CD, hubs, and switches. It explains that MAC addresses are used to deliver frames within a local area network, while IP addresses are used between networks. ARP is used to map IP addresses to MAC addresses on the same network. Ethernet uses CSMA/CD for media access and frames include source and destination MAC addresses. Hubs operate at the physical layer while switches operate at the data link layer and can reduce collisions by isolating segments.
The document discusses the link layer and its services. It introduces key link layer concepts like framing, link access, error detection, flow control, and multiple access protocols. It describes different types of multiple access protocols including channel partitioning protocols like TDMA and FDMA as well as random access protocols like ALOHA and CSMA. It also discusses error detection techniques like parity checking, checksums, and cyclic redundancy checks (CRCs). The document provides examples and comparisons of protocols to convey their tradeoffs and how they address the challenges of sharing communication channels.
Lecture 25 Link Layer - Error detection and Multiple Access.pptxHanzlaNaveed1
The document discusses principles of link layer services including error detection, correction, and sharing a broadcast channel through multiple access protocols. It provides an overview of topics like link layer addressing, local area networks including Ethernet and VLANs. Specific link layer services covered are error detection using techniques like parity checking and cyclic redundancy check (CRC). The document also distinguishes between point-to-point and broadcast links, and describes multiple access protocols for shared broadcast channels including TDMA, FDMA, and random access protocols like slotted ALOHA and CSMA.
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTANirfan sami
1. The document discusses medium access control (MAC) protocols for shared broadcast links at the link layer. It covers three main classes of MAC protocols: channel partitioning, random access, and "taking turns" protocols.
2. Channel partitioning protocols like TDMA and FDMA divide the channel into time or frequency slots and allocate slots to nodes. Random access protocols like ALOHA, CSMA, and CSMA/CD allow nodes to transmit randomly and include mechanisms to detect and handle collisions. "Taking turns" protocols such as polling and token passing coordinate channel access by having nodes take turns transmitting.
3. The ideal MAC protocol allows single or multiple nodes to transmit at the maximum channel rate, is fully decentralized, requires
This document discusses various networking devices used to connect local area networks (LANs) and backbone networks. It describes repeaters, hubs, bridges, switches, routers, and gateways. Repeaters and hubs operate at the physical layer, while bridges and switches operate at the data link layer. Routers operate at the network layer and are used to connect different LANs and wide area networks. The document provides details on how each device functions, including how switches learn MAC addresses to filter traffic and prevent loops using spanning tree protocols.
The document discusses link layer protocols and multiple access protocols. It provides examples of channel partitioning protocols like TDMA and FDMA that divide the channel into time slots or frequency bands. It also discusses random access protocols like ALOHA, slotted ALOHA, and CSMA/CD that do not partition the channel and can result in collisions. CSMA/CD improves on CSMA by allowing nodes to detect collisions and abort transmissions to reduce wasted bandwidth. "Taking turns" protocols like polling and token passing allocate channel access by turning to control which node can transmit.
The document provides an introduction to the OSI 7 layer model and describes the data link layer in detail. It discusses the basic design principles of the data link layer, including how it provides communication between two directly connected nodes and deals with problems like errors. It also describes how real networks like Ethernet work at the data link layer and provides a Wireshark demo to show live network packet data and decoding.
- A switch is a multi-input, multi-output device that transfers packets from an input to one or more outputs, allowing links to be interconnected to form a larger network.
- There are two main types of switching: circuit switching establishes a dedicated end-to-end path before information transfer, while packet switching involves intermediate nodes storing incoming data blocks and retransmitting them along the path to the destination.
- X.25 is a widely used packet switching protocol that defines how a terminal connects to a packet network and how packets are exchanged over that network using devices like modems and packet switches.
This document provides an overview and summary of a chapter on link layers and local area networks (LANs) from the textbook "Computer Networking: A Top-Down Approach". It discusses the goals of understanding link layer services and technologies. It also provides an outline of the chapter topics which include error detection and correction, multiple access protocols, LAN addressing, Ethernet, switches, and virtual LANs. The document is intended for educational use and free modification with attribution required.
This document provides an overview and outline of topics to be covered in a chapter about the link layer and local area networks (LANs). It discusses the goals of understanding link layer services like error detection and correction as well as sharing bandwidth on a broadcast channel. It also outlines the key sections to be covered, including multiple access protocols, LAN addressing, Ethernet, switches, and virtual LANs. Sample slides are provided on topics like link layer services, error detection techniques, and multiple access protocols. The document is intended for educational use and asks that the source be cited if used for teaching.
The document compares MAC protocols in wired and wireless systems. In wired systems, protocols like Ethernet use CSMA/CD, allowing nodes to detect collisions. In wireless systems, hidden and exposed terminal problems occur, requiring protocols like MACA, MACAW, and 802.11 CSMA/CA to use RTS/CTS handshaking or polling to avoid interference between transmissions. The IEEE 802.11 standard defines distributed and point coordination function MAC methods for wireless LANs.
The document discusses the OSI model, which defines 7 layers of network architecture: physical, data link, network, transport, session, presentation, and application. Each layer performs communication functions, with lower layers focusing on physical delivery and higher layers on software interoperability. The TCP/IP model is also examined, which has 5 layers that correspond to OSI but are organized differently. Network devices like hubs, switches, routers, and gateways are described along with their roles within the OSI layers. Examples are provided to illustrate addressing schemes and data flow between layers and devices.
This document provides an overview of the network layer and how routers function. It discusses the data plane of routers, including input and output ports, switching fabrics, buffer management, scheduling, and forwarding. It also covers the Internet Protocol (IP) including the datagram format, addressing, and subnets. Key concepts explained are longest prefix matching, input and output port queuing, switching fabrics like bus, memory and interconnection networks, and scheduling algorithms like priority, round robin, and weighted fair queueing.
The document discusses physical layer data transmission and signals. It covers topics like analog vs digital signals, periodic vs non-periodic signals, properties of signals like amplitude, frequency, period, phase, and bandwidth. It also discusses signal representation and analysis in the time and frequency domains, including Fourier analysis which shows how composite signals can be decomposed into simpler sine waves.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
3. Link Layer 5-3
Link layer: introduction
terminology:
hosts and routers: nodes
communication channels that
connect adjacent nodes along
communication path: links
wired links
wireless links
LANs
layer-2 packet: frame,
encapsulates datagram
data-link layer has responsibility of
transferring datagram from one node
to physically adjacent node over a link
global ISP
4. Link Layer 5-4
Link layer: context
datagram transferred by
different link protocols over
different links:
e.g., Ethernet on first link,
frame relay on
intermediate links, 802.11
on last link
each link protocol provides
different services
e.g., may or may not
provide rdt over link
transportation analogy:
trip from Princeton to Lausanne
limo: Princeton to JFK
plane: JFK to Geneva
train: Geneva to Lausanne
tourist = datagram
transport segment =
communication link
transportation mode = link
layer protocol
travel agent = routing
algorithm
5. Link Layer 5-5
Link layer services
framing, link access:
encapsulate datagram into frame, adding header, trailer
channel access if shared medium
“MAC” addresses used in frame headers to identify
source, dest
• different from IP address!
reliable delivery between adjacent nodes
seldom used on low bit-error link (fiber, some twisted
pair)
wireless links: high error rates
6. Link Layer 5-6
flow control:
pacing between adjacent sending and receiving nodes
error detection:
errors caused by signal attenuation, noise.
receiver detects presence of errors:
• signals sender for retransmission or drops frame
error correction:
receiver identifies and corrects bit error(s) without resorting to
retransmission
half-duplex and full-duplex
with half duplex, nodes at both ends of link can transmit, but not
at same time
Link layer services (more)
7. Link Layer 5-7
Where is the link layer implemented?
in each and every host
link layer implemented in
“adaptor” (aka network
interface card NIC) or on a
chip
Ethernet card, 802.11
card; Ethernet chipset
implements link, physical
layer
attaches into host’s system
buses
combination of hardware,
software, firmware
8. Link Layer 5-8
Link layer, LANs: outline
5.1 introduction, services
5.2 error detection,
correction
5.3 multiple access
protocols
5.4 LANs
addressing, ARP
Ethernet
switches
VLANS
5.5 link virtualization:
MPLS
5.6 data center
networking
5.7 a day in the life of a
web request
13. 13
Error Detection
Data transmission can contain errors
Single-bit
Burst errors of length n
(n: distance between the first and last errors in data
block)
How to detect errors
If only data is transmitted, errors cannot be detected
Send more information with data that satisfies a
special relationship
Add redundancy
16. 16
Error Detection Methods
Vertical Redundancy Check (VRC)
Append a single bit at the end of data block such that
the number of ones is even
Even Parity (odd parity is similar)
0110011 01100110
0110001 01100011
VRC is also known as Parity Check
Performance:
• Detects all odd-number errors in a data block
17. Winter 2005
ECE
ECE 766 17
Error Detection Methods
Longitudinal Redundancy Check (LRC)
Organize data into a table and create a parity for each
column
11100111 11011101 00111001 10101001
11100111
11011101
00111001
10101001
10101010
11100111 11011101 00111001 10101001 10101010
Original Data LRC
18. Winter 2005
ECE
ECE 766 18
Error Detection Methods
Performance:
• Detects all burst errors up to length n
(number of columns)
• Misses burst errors of length n+1 if there are n-1 uninverted
bits between the first and last bit
• If the block is badly garbled, the probability of acceptance is
( )n
2
1
35. Link Layer 5-35
Multiple access protocols
It avoids two or more nodes from transmitting at
the same time over a broadcast channel.
If different nodes send data at the same time
collisions occurs and the receiver will not be able
to understand the signal.
Classes of MAP
Partitioning the channel eg. FDM & TDM
Taking turns eg. Token based, polling based &
reservation based
Contention based protocol e.g. ALOHA and Ethernet
36. Link Layer 5-36
Multiple access protocols
Different multiple access protocols..
Random access protocols-
channel not divided, allow collisions
“recover” from collisions
Controlled access protocols-
Nodes take turns, but nodes with more to send can
take longer turns.
Channelization protocols-
divide channel into smaller “pieces” (time slots,
frequency, code)
allocate piece to node for exclusive use
38. Link Layer 5-38
Multiple access links,
two types of “links”:
point-to-point
PPP for dial-up access
point-to-point link between Ethernet switch, host
broadcast (shared wire or medium)
old-fashioned Ethernet
upstream HFC
802.11 wireless LAN
shared wire (e.g.,
cabled Ethernet) (e.g., 802.11 WiFi)
39. Link Layer 5-39
An ideal multiple access protocol
given: broadcast channel of rate R bps
desiderata:
1. when one node wants to transmit, it can send at rate R.
2. when M nodes want to transmit, each can send at average
rate R/M
3. fully decentralized:
• no special node to coordinate transmissions
• no synchronization of clocks, slots
4. simple
40. Link Layer 5-40
Channel partitioning MAC protocols: TDMA
TDMA: time division multiple access
access to channel in "rounds"
each station gets fixed length slot (length = pkt
trans time) in each round
unused slots go idle
example: 6-station LAN, 1,3,4 have pkt, slots
2,5,6 idle
1 3 4 1 3 4
6-slot
frame
6-slot
frame
41. Link Layer 5-41
FDMA: frequency division multiple access
channel spectrum divided into frequency bands
each station assigned fixed frequency band
unused transmission time in frequency bands go idle
example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6
idle
frequencybands
time
FDM cable
Channel partitioning MAC protocols: FDMA
42. Link Layer 5-42
Random access protocols
when node has packet to send
transmit at full channel data rate R.
no a priori coordination among nodes
two or more transmitting nodes ➜ “collision”,
random access MAC protocol specifies:
how to detect collisions
how to recover from collisions (e.g., via delayed
retransmissions)
examples of random access MAC protocols:
Pure (Unslotted )ALOHA
slotted ALOHA
CSMA, CSMA/CD, CSMA/CA
43. Link Layer 5-43
ALOHA
It signifies a simple communications schemes in
which each transmitter within a network sends
data whenever there is a frame to send.
Next frame is sent only if the previous frame
successfully reaches the destination.
If frame fails to reach at the destination , it is sent
again.
Types of ALOHA
Pure ALOHA
Slotted ALOHA
44. Link Layer 5-44
Pure (unslotted) ALOHA
unslotted Aloha: simpler, no synchronization
when frame first arrives
transmit immediately
collision probability increases:
frame sent at t0 collides with other frames sent in [t0-1,t0+1]
45. Link Layer 5-45
Pure (unslotted) ALOHA
unslotted Aloha: simpler, no synchronization
when frame first arrives
transmit immediately
collision probability increases:
frame sent at t0 collides with other frames sent in [t0-1,t0+1]
46. Link Layer 5-46
Pure ALOHA efficiency
P(success by given node) = P(node transmits) .
P(no other node transmits in [t0-1,t0] .
P(no other node transmits in [t0-1,t0]
= p . (1-p)N-1 . (1-p)N-1
= p . (1-p)2(N-1)
… choosing optimum p and then letting n
= 1/(2e) = .18
47. Link Layer 5-47
Slotted ALOHA
assumptions:
all frames same size
time divided into equal size
slots (time to transmit 1
frame)
nodes start to transmit
only slot beginning
nodes are synchronized
if 2 or more nodes transmit
in slot, all nodes detect
collision
operation:
when node obtains fresh
frame, transmits in next slot
if no collision: node can send
new frame in next slot
if collision: node retransmits
frame in each subsequent
slot with prob. p until
success
48. Link Layer 5-48
Pros:
single active node can
continuously transmit at
full rate of channel
highly decentralized: only
slots in nodes need to be
in sync
simple
Cons:
collisions, wasting slots
idle slots
nodes may be able to
detect collision in less
than time to transmit
packet
clock synchronization
Slotted ALOHA
1 1 1 1
2
3
2 2
3 3
node 1
node 2
node 3
C C CS S SE E E
49. Link Layer 5-49
suppose: N nodes with
many frames to send,
each transmits in slot with
probability p
prob that given node has
success in a slot = p(1-p)N-
1
prob that any node has a
success = Np(1-p)N-1
max efficiency: find p* that
maximizes
Np(1-p)N-1
for many nodes, take limit
of Np*(1-p*)N-1
as N goes
to infinity, gives:
max efficiency = 1/e = .37
efficiency: long-run
fraction of successful slots
(many nodes, all with many
frames to send)
at best: channel
used for useful
transmissions 37%
of time! !
Slotted ALOHA: efficiency
50. Link Layer 5-50
CSMA (carrier sense multiple access)
CSMA: listen before transmit:
if channel sensed idle: transmit entire frame
if channel sensed busy, defer transmission
human analogy: don’t interrupt others!
51. Link Layer 5-51
CSMA (carrier sense multiple access)
• Non-persistent CSMA
• 1-persistent CSMA
• P-persistent CSMA
52. Link Layer 5-52
CSMA (carrier sense multiple access)
• Non-persistent CSMA
• In this , if a station wants to transmit a frame and it
finds that the channel is busy then it will wait for fixed
interval of time.
• After some time ,it again checks the status of the
channel
• If channel is free it will transmit
• 1-persistent CSMA
• P-persistent CSMA
53. Link Layer 5-53
CSMA (carrier sense multiple access)
• Non-persistent CSMA
• 1-persistent CSMA
• The station which wants to transmit , continuously
monitors the channel until it is idle and then transmits
immediately.
• If two are waiting then they will transmit
simultaneously and collision take place then require
retransmission
• P-persistent CSMA
54. Link Layer 5-54
CSMA (carrier sense multiple access)
• Non-persistent CSMA
• 1-persistent CSMA
• P-persistent CSMA
• All the waiting stations are not allowed to transmit
simultaneously as soon as the channel become idle
• Possibility of collision and retransmission is reduced
• A station is assumed to be transmitted with a
probability p
56. Link Layer 5-56
CSMA/CD (collision detection)
CSMA/CD: carrier sensing, deferral as in CSMA
collisions detected within short time
colliding transmissions aborted, reducing channel wastage
collision detection:
easy in wired LANs: measure signal strengths, compare
transmitted, received signals
difficult in wireless LANs: received signal strength
overwhelmed by local transmission strength
human analogy: the polite conversationalist
58. Link Layer 5-58
CSMA/CD efficiency
Tprop = max prop delay between 2 nodes in LAN
ttrans = time to transmit max-size frame
so ttrans >= 2Tprop
iL/R>=2*D/S
L>=2DR/S so of less than frame length then
collision detection mechanism not
possible
efficiency goes to 1
as tprop goes to 0
as ttrans goes to infinity
transprop /tt
efficiency
51
1
+
=
59. Station ready to transmit, senses the the line by
using one of persistent technique.
As soon as it find the line to be idle , the station
waits for a time equal to an IFG(Interframe Gap).
It then wait for some random time and sends the
frame.
After sending the frame . It sets a timer and waits
for the ack from the receiver.
If the ack is received before expiry of the timer ,
then the transmitter is successful.
But if the transmitting station does not receive
the expected ack before the timer expiry then
the increments the back off parameter , waits for
the back off time and senses the line again.
Data Link Layer 5-59
CSMA/CA (Collision Avoidance)
62. Link Layer 5-62
• It requires one of the nodes to be designated as
a master node.
• The master node polls each of the nodes in a
round-robin fashion.
• the master node first sends a message to node
1, saying that it (node 1) can transmit up to
some maximum number of frames.
• After node 1 transmits some frames, the master
node tells node 2 it (node 2) can transmit up to
the maximum number of frames.
Controlled access protocols-Polling
63. Link Layer 5-63
• The master node can determine when a node has
finished sending its frames by observing the lack
of a signal on the channel.
The procedure continues in this manner, with the
master node polling each of the nodes in a cyclic
manner.
It eliminates the collisions and allows polling to
achieve a much higher efficiency
Controlled access protocols-Polling
master
slaves
poll
data
data
64. Link Layer 5-64
Disadvantage -
•Polling delay—the amount of time required to notify
a node that it can transmit.
•if the master node fails, the entire channel becomes
inoperative.
Controlled access protocols-Polling
65. 5-65
In this protocol there is
no master node.
A small, special-purpose
frame known as a token
is exchanged among the
nodes in some fixed
order.
When a node receives a
token, it holds onto the
token only if it has some
frames to transmit
otherwise, it immediately
forwards the token to
the next node.
Controlled access protocols-Token Passing
T
data
(nothing
to send)
T
66. Link Layer 5-66
• If a node does have frames to transmit when it
receives the token, it sends up to a maximum
number of frames and then forwards the token
to the next node.
• It is decentralized and highly efficient.
Disadvantage-
The failure of one node can crash the entire
channel.
if a node accidentally neglects to release the
token, then some recovery procedure must be
invoked to get the token back in circulation.
Controlled access protocols-Token Passing
68. Link Layer 5-68
MAC addresses and ARP
32-bit IP address:
network-layer address for interface
used for layer 3 (network layer) forwarding
MAC (or LAN or physical or Ethernet) address:
function: used ‘locally” to get frame from one interface to
another physically-connected interface (same network, in IP-
addressing sense)
48 bit MAC address (for most LANs) burned in NIC
ROM, also sometimes software settable
e.g.: 1A-2F-BB-76-09-AD
hexadecimal (base 16) notation
(each “number” represents 4 bits)
69. Link Layer 5-69
LAN addresses and ARP
each adapter on LAN has unique LAN address
adapter
1A-2F-BB-76-09-AD
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
71-65-F7-2B-08-53
LAN
(wired or
wireless)
70. Link Layer 5-70
LAN addresses (more)
MAC address allocation administered by IEEE
manufacturer buys portion of MAC address space
(to assure uniqueness)
analogy:
MAC address: like Social Security Number
IP address: like postal address
MAC flat address ➜ portability
can move LAN card from one LAN to another
IP hierarchical address not portable
address depends on IP subnet to which node is
attached
71. Link Layer 5-71
ARP: address resolution protocol
ARP table: each IP node (host,
router) on LAN has table
IP/MAC address
mappings for some LAN
nodes:
< IP address; MAC address; TTL>
TTL (Time To Live):
time after which address
mapping will be
forgotten (typically 20
min)
Question: how to determine
interface’s MAC address,
knowing its IP address?
1A-2F-BB-76-09-AD
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
71-65-F7-2B-08-53
LAN
137.196.7.23
137.196.7.78
137.196.7.14
137.196.7.88
72. Link Layer 5-72
ARP protocol: same LAN
A wants to send datagram
to B
B’s MAC address not in A’s
ARP table.
A broadcasts ARP query
packet, containing B's IP
address
dest MAC address = FF-FF-
FF-FF-FF-FF
all nodes on LAN receive
ARP query
B receives ARP packet,
replies to A with its (B's)
MAC address
frame sent to A’s MAC
address (unicast)
A caches (saves) IP-to-
MAC address pair in its
ARP table until
information becomes old
(times out)
soft state: information that
times out (goes away)
unless refreshed
ARP is “plug-and-play”:
nodes create their ARP
tables without intervention
from net administrator
73. Link Layer 5-73
walkthrough: send datagram from A to B via R
focus on addressing – at IP (datagram) and MAC layer (frame)
assume A knows B’s IP address
assume A knows IP address of first hop router, R
assume A knows R’s MAC address
Addressing: routing to another LAN
R
1A-23-F9-CD-06-9B
222.222.222.220
111.111.111.110
E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.221
88-B2-2F-54-1A-0F
B
80. Link Layer 5-80
Ethernet 802.3
• IEEE 802.3 (CSMA/CD - Ethernet) standard –
originally 2Mbps
• IEEE 802.3u standard for 100Mbps Ethernet
• IEEE 802.3z standard for 1,000Mbps Ethernet
Most popular packet-switched LAN technology
Bandwidths: 10Mbps, 100Mbps, 1Gbps
Max bus length: 2500m
500m segments with 4 repeaters
Bus and Star topologies are used to connect host.
For transmission 802.3 LAN , it make use of 1-
persistant CSMA/CD protocol.
When collision they wait for random time, to
select random time Ethernet use Binary
Exponential Backoff Algo
81. Link Layer 5-81
Ethernet CSMA/CD algorithm
1. NIC receives datagram
from network layer,
creates frame
2. If NIC senses channel
idle, starts frame
transmission. If NIC
senses channel busy,
waits until channel idle,
then transmits.
3. If NIC transmits entire
frame without detecting
another transmission,
NIC is done with frame !
4. If NIC detects another
transmission while
transmitting, aborts and
sends jam signal
5. After aborting, NIC
enters binary (exponential)
backoff:
after mth collision, NIC
chooses K at random
from {0,1,2, …, 2m
-1}.
NIC waits K·512 bit
times, returns to Step 2
longer backoff interval
with more collisions
82. Link Layer 5-82
Ethernet frame structure
sending adapter encapsulates IP datagram (or other
network layer protocol packet) in Ethernet frame
preamble:
7 bytes with pattern 10101010 followed by one
byte with pattern 10101011
used to synchronize receiver, sender clock rates
dest.
address
source
address
data
(payload) CRCpreamble
type
83. CS 640 83
Ethernet Frames
Preamble is a sequence of 7 bytes, each set to “10101010”
Used to synchronize receiver before actual data is sent
Addresses
unique, 48-bit unicast address assigned to each adapter
• example: 8:0:e4:b1:2
• Each manufacturer gets their own address range
broadcast: all 1s
multicast: first bit is 1
Type field is a demultiplexing key used to determine which
higher level protocol the frame should be delivered to
Body can contain up to 1500 bytes of data
84. Link Layer 5-84
Ethernet frame structure (more)
addresses: 6 byte source, destination MAC addresses
if adapter receives frame with matching destination
address, or with broadcast address (e.g. ARP packet), it
passes data in frame to network layer protocol
otherwise, adapter discards frame
type: indicates higher layer protocol key (mostly IP
but others possible)
CRC: cyclic redundancy check at receiver
error detected: frame is dropped
dest.
address
source
address
data
(payload) CRCpreamble
type
85. Link Layer 5-85
Ethernet: physical topology
bus:
all nodes in same collision domain (can collide with each
other)
star: prevails today
active switch in center
each “spoke” runs a (separate) Ethernet protocol (nodes
do not collide with each other)
switch
bus: coaxial cable
star
86. CS 640 86
Ethernet Technologies: 10Base2
10: 10Mbps; 2: under 185 (~200) meters cable length
Thin coaxial cable in a bus topology
87. CS 640 87
10BaseT and 100BaseT
10/100 Mbps rate
T stands for Twisted Pair
Hub(s) connected by twisted pair facilitate “star topology”
Distance of any node to hub must be < 100M
88. CS 640 88
Physical Layer Configurations for 802.3
Physical layer configurations are specified in three parts
Data rate (10, 100, 1,000)
10, 100, 1,000Mbps
Signaling method (base, broad)
Baseband
• Digital signaling
Broadband
• Analog signaling
Cabling (2, 5, T, F, S, L)
5 - Thick coax (original Ethernet cabling)
F – Optical fiber
S – Short wave laser over multimode fiber
L – Long wave laser over single mode fiber
89. CS 640 89
Fast and Gigabit Ethernet
Fast Ethernet (100Mbps) has technology very similar to
10Mbps Ethernet
Uses different physical layer encoding (4B5B)
Many NIC’s are 10/100 capable
• Can be used at either speed
Gigabit Ethernet (1,000Mbps)
Compatible with lower speeds
Uses standard framing and CSMA/CD algorithm
Distances are severely limited
Typically used for backbones and inter-router connectivity
Becoming cost competitive
How much of this bandwidth is realizable?
90. CS 640 90
Experiences with Ethernet
Ethernets work best under light loads
Utilization over 30% is considered heavy
• Network capacity is wasted by collisions
Most networks are limited to about 200 hosts
Specification allows for up to 1024
Most networks are much shorter
5 to 10 microsecond RTT
92. Switch
Device that channels incoming data from any of
multiple input ports to the specific output port.
Example-traditional telephone network.
In Internet, a switch determines from the IP
address in each packet which output port to use
for the next part of its trip to the intended
destination.
93. Link Layer 5-93
Ethernet switch
link-layer device: takes an active role
store, forward Ethernet frames
examine incoming frame’s MAC address,
selectively forward frame to one-or-more
outgoing links when frame is to be forwarded on
segment, uses CSMA/CD to access segment
transparent
hosts are unaware of presence of switches
plug-and-play, self-learning
switches do not need to be configured
94. Link Layer 5-94
Switch: multiple simultaneous transmissions
hosts have dedicated, direct
connection to switch
switches buffer packets
Ethernet protocol used on each
incoming link, but no collisions;
full duplex
each link is its own collision
domain
switching: A-to-A’ and B-to-B’
can transmit simultaneously,
without collisions switch with six interfaces
(1,2,3,4,5,6)
A
A’
B
B’ C
C’
1 2
345
6
95. Link Layer 5-95
Switch forwarding table
Q: how does switch know A’
reachable via interface 4, B’
reachable via interface 5?
switch with six interfaces
(1,2,3,4,5,6)
A
A’
B
B’ C
C’
1 2
345
6 A: each switch has a switch
table, each entry:
(MAC address of host, interface to
reach host, time stamp)
looks like a routing table!
Q: how are entries created,
maintained in switch table?
something like a routing protocol?
96. A
A’
B
B’ C
C’
1 2
345
6
Link Layer 5-96
Switch: self-learning
switch learns which hosts
can be reached through
which interfaces
when frame received,
switch “learns”
location of sender:
incoming LAN segment
records sender/location
pair in switch table
A A’
Source: A
Dest: A’
MAC addr interface TTL
Switch table
(initially empty)
A 1 60
97. Link Layer 5-97
Switch: frame filtering/forwarding
when frame received at switch:
1. record incoming link, MAC address of sending host
2. index switch table using MAC destination address
3. if entry found for destination
then {
if destination on segment from which frame arrived
then drop frame
else forward frame on interface indicated by entry
}
else flood /* forward on all interfaces except arriving
interface */
98. A
A’
B
B’ C
C’
1 2
345
6
Link Layer 5-98
Self-learning, forwarding: example
A A’
Source: A
Dest: A’
MAC addr interface TTL
switch table
(initially empty)
A 1 60
A A’A A’A A’A A’A A’
frame destination, A’,
locaton unknown: flood
A’ A
destination A location
known:
A’ 4 60
selectively send
on just one link
99. Link Layer 5-99
Interconnecting switches
switches can be connected together
Q: sending from A to G - how does S1 know to
forward frame destined to F via S4 and S3?
A: self learning! (works exactly the same as in single-
switch case!)
A
B
S1
C D
E
F
S2
S4
S3
H
I
G
100. Link Layer5-100
Self-learning multi-switch example
Suppose C sends frame to I, I responds to C
Q: show switch tables and packet forwarding in S1, S2, S3,
S4
A
B
S1
C D
E
F
S2
S4
S3
H
I
G
102. Link Layer5-102
Switches vs. routers
both are store-and-forward:
routers: network-layer
devices (examine network-
layer headers)
switches: link-layer devices
(examine link-layer headers)
both have forwarding tables:
routers: compute tables using
routing algorithms, IP
addresses
switches: learn forwarding
table using flooding, learning,
MAC addresses
application
transport
network
link
physical
network
link
physical
link
physical
switch
datagram
application
transport
network
link
physical
frame
frame
frame
datagram