The document summarizes key concepts about the data link layer. It discusses the goals and services of the data link layer, including error detection and correction, sharing broadcast channels through multiple access protocols, link layer addressing, and reliable data transfer and flow control. It also provides an overview of common link layer technologies and implementation through instantiation of various data link layer protocols.
The document provides an overview of the data link layer and link layer technologies. It begins with an introduction to data link layer services such as framing, error detection, multiple access, and addressing. It then discusses various error detection and correction techniques as well as multiple access protocols including TDMA, FDMA, and random access protocols like ALOHA, slotted ALOHA, and CSMA. The document aims to help readers understand the principles behind data link layer services and different link layer technologies.
The document discusses data link layer protocols and multiple access protocols. It describes several protocols for sharing a broadcast channel, including slotted ALOHA, CSMA, CSMA/CD, and token passing. It also discusses error detection techniques like parity checking and cyclic redundancy checks used at the data link layer. The goal of the data link layer is to reliably transfer data frames between adjacent nodes over a link using addressing, error detection, flow control and other services.
- The document is a chapter from a textbook on computer networking that discusses the network layer. It covers topics like virtual circuit networks, datagram networks, the operation of routers, IP, routing algorithms, and routing in the Internet.
- Routers examine header fields to forward packets to the appropriate output port based on the destination address and routing tables. Routing algorithms determine the path packets take between source and destination.
- Virtual circuit networks use call setup and connection state in routers to provide guaranteed services, while datagram networks like the Internet forward packets based only on destination addresses for simple operation.
This chapter discusses different techniques for interconnecting networks, including switching, bridging, and routing. It covers store-and-forward switching using switches to connect networks. There are two main approaches for switching - connectionless switching using datagrams and connection-oriented switching using virtual circuits. Connectionless switching forwards each packet independently based on the destination address, while connection-oriented switching establishes paths through the network before transmitting data packets.
The document provides an overview of Chapter 3 from the textbook "Computer Networking: A Top Down Approach" by Jim Kurose and Keith Ross. It discusses the goals and outline of the chapter which covers transport layer services, multiplexing and demultiplexing, UDP, principles of reliable data transfer, TCP, and congestion control. Specifically, it describes transport layer services, multiplexing and demultiplexing of data between applications, UDP as a connectionless transport protocol, and outlines the topics to be covered related to reliable data transfer and TCP.
Point to point protocol | PPP - Nitish JadiaNitish Jadia
This slide covers point to point protocol and takes most of the points straight from the RFC. This slide covers in-depth flags and headers used in PPP.
This document discusses the link layer and local area networks. It begins with an introduction to link layer services including framing, link access, reliable delivery, flow control, and error detection and correction. It then covers topics like multiple access protocols, including random access protocols like ALOHA and CSMA, and controlled access protocols. Local area network technologies are discussed next, focusing on Ethernet, switches, and addressing protocols like ARP. The document concludes with sections on link virtualization using MPLS and data center networking.
This document discusses the seven layers of the OSI model. It describes each layer in detail, including their functions and protocols. The physical layer is responsible for transmitting raw bits over a communication channel. The data link layer handles framing and accessing the physical medium. The network layer handles logical addressing and routing. The transport layer provides reliable data transmission and flow control. The session layer manages connections between applications. The presentation layer converts between different data representations. The application layer contains protocols for common network applications and interacts directly with software.
The document provides an overview of the data link layer and link layer technologies. It begins with an introduction to data link layer services such as framing, error detection, multiple access, and addressing. It then discusses various error detection and correction techniques as well as multiple access protocols including TDMA, FDMA, and random access protocols like ALOHA, slotted ALOHA, and CSMA. The document aims to help readers understand the principles behind data link layer services and different link layer technologies.
The document discusses data link layer protocols and multiple access protocols. It describes several protocols for sharing a broadcast channel, including slotted ALOHA, CSMA, CSMA/CD, and token passing. It also discusses error detection techniques like parity checking and cyclic redundancy checks used at the data link layer. The goal of the data link layer is to reliably transfer data frames between adjacent nodes over a link using addressing, error detection, flow control and other services.
- The document is a chapter from a textbook on computer networking that discusses the network layer. It covers topics like virtual circuit networks, datagram networks, the operation of routers, IP, routing algorithms, and routing in the Internet.
- Routers examine header fields to forward packets to the appropriate output port based on the destination address and routing tables. Routing algorithms determine the path packets take between source and destination.
- Virtual circuit networks use call setup and connection state in routers to provide guaranteed services, while datagram networks like the Internet forward packets based only on destination addresses for simple operation.
This chapter discusses different techniques for interconnecting networks, including switching, bridging, and routing. It covers store-and-forward switching using switches to connect networks. There are two main approaches for switching - connectionless switching using datagrams and connection-oriented switching using virtual circuits. Connectionless switching forwards each packet independently based on the destination address, while connection-oriented switching establishes paths through the network before transmitting data packets.
The document provides an overview of Chapter 3 from the textbook "Computer Networking: A Top Down Approach" by Jim Kurose and Keith Ross. It discusses the goals and outline of the chapter which covers transport layer services, multiplexing and demultiplexing, UDP, principles of reliable data transfer, TCP, and congestion control. Specifically, it describes transport layer services, multiplexing and demultiplexing of data between applications, UDP as a connectionless transport protocol, and outlines the topics to be covered related to reliable data transfer and TCP.
Point to point protocol | PPP - Nitish JadiaNitish Jadia
This slide covers point to point protocol and takes most of the points straight from the RFC. This slide covers in-depth flags and headers used in PPP.
This document discusses the link layer and local area networks. It begins with an introduction to link layer services including framing, link access, reliable delivery, flow control, and error detection and correction. It then covers topics like multiple access protocols, including random access protocols like ALOHA and CSMA, and controlled access protocols. Local area network technologies are discussed next, focusing on Ethernet, switches, and addressing protocols like ARP. The document concludes with sections on link virtualization using MPLS and data center networking.
This document discusses the seven layers of the OSI model. It describes each layer in detail, including their functions and protocols. The physical layer is responsible for transmitting raw bits over a communication channel. The data link layer handles framing and accessing the physical medium. The network layer handles logical addressing and routing. The transport layer provides reliable data transmission and flow control. The session layer manages connections between applications. The presentation layer converts between different data representations. The application layer contains protocols for common network applications and interacts directly with software.
This document provides an overview of various topics related to the network layer, including IPv4, IPv6, ARP, RARP, mobile IP, routing algorithms, and routing protocols. It begins with basics of IPv4 such as its addressing scheme and role in interconnecting networks. IPv6 is then introduced, along with reasons for its development and key features like its large 128-bit addresses. Address Resolution Protocol (ARP) and Reverse ARP (RARP) are also covered. The document concludes by discussing routing algorithms like link-state and distance-vector, as well as protocols including RIP, OSPF, and BGP.
This document discusses fundamentals and link layer concepts in computer networks including:
- Network requirements, layering, protocols, and Internet architecture
- Link layer services such as framing, error detection, and flow control
- Performance metrics including bandwidth, latency, and the relationship between delay and bandwidth
- Common communication patterns like client-server and examples of TCP and UDP socket programming in C
With statistical multiplexing, the total bandwidth available can be utilized more fully since the links are not idle when only one host is transmitting. The statistical multiplexing allows aggregation of variable bit rate traffic streams.
Transport layer protocols provide services like reliable data transfer and connection establishment between applications on networked devices. They address this need through protocols like TCP and UDP. TCP provides reliable, ordered data streams using mechanisms like three-way handshake, sequence numbers, acknowledgments, retransmissions, flow control via sliding windows, and connection termination handshaking. UDP provides simple datagram transmissions without reliability or flow control.
The document discusses the link layer and its services. It introduces key link layer concepts like framing, link access, error detection, flow control, and multiple access protocols. It describes different types of multiple access protocols including channel partitioning protocols like TDMA and FDMA as well as random access protocols like ALOHA and CSMA. It also discusses error detection techniques like parity checking, checksums, and cyclic redundancy checks (CRCs). The document provides examples and comparisons of protocols to convey their tradeoffs and how they address the challenges of sharing communication channels.
The document discusses the data link layer, including its functions such as providing a service interface to the network layer, dealing with transmission errors, and regulating data flow. It describes various data link protocols like HDLC, protocols using sliding windows, and protocols for error detection. It also discusses data framing, error correction codes, checksum calculations, and finite state machine and Petri net models for analyzing protocols.
The document discusses the transport layer and key protocols TCP and UDP. It outlines the chapter which covers transport layer services like multiplexing and demultiplexing, connectionless transport with UDP, principles of reliable data transfer, connection-oriented transport with TCP including segment structure, reliable data transfer, flow control, and connection management, and principles of congestion control including TCP congestion control. It provides details on multiplexing and demultiplexing to direct segments to the appropriate socket, UDP using port numbers but providing unreliable delivery, and TCP using a 4-tuple to identify connections and providing reliable in-order byte stream delivery with congestion control and flow control.
The document discusses various topics related to network layer in computer networks including network layer services, packet switching, IP addressing, forwarding of IP packets, routing algorithms, and IP protocols. Specifically, it covers logical addressing, services provided at different nodes, forwarding methods based on destination address and labels, IP version 4 addressing including classes and subnetting, and processing of packets at routers and destination computers.
The document discusses the transport layer of the OSI model. It describes how the transport layer is responsible for end-to-end communication over a network by managing error correction and reliability. The two main protocols of the transport layer are UDP and TCP. UDP provides unreliable data transmission while TCP establishes connections and provides reliable in-order delivery through mechanisms like acknowledgments and flow control.
This document provides an overview of a course on broadband and TCP/IP fundamentals. It discusses the topics that will be covered in each of the four sessions, including basics of TCP/IP networks, switching and scheduling, routing and transport, and applications and security. It also lists some recommended textbooks and references for the course.
This document summarizes a faculty development program on computer networks held from April 24-30, 2019. On April 25, Dr. A. Kathirvel from MNM Jain Engineering College gave a lecture covering various topics related to the data link layer, including data link protocols, media access control, encoding, framing, and error detection techniques. Specific protocols and concepts discussed include HDLC, PPP, Manchester encoding, 4B/5B encoding, byte-oriented and bit-oriented framing, CRC, checksums, and two-dimensional parity.
This document discusses the implementation of a multi-channel HDLC transceiver using an FPGA. It describes the HDLC protocol and frame structure. The transceiver is used to transmit and receive HDLC frames. At the receiver, a single bit error can be detected using Hamming code and corrected. Implementing the multi-channel HDLC transceiver in FPGA provides flexibility, upgradability and customization.
The document discusses the Transport layer protocols TCP and UDP. It describes TCP as a connection-oriented protocol that provides reliable, ordered delivery of streams of data through mechanisms like sequencing, acknowledgment, flow control and error checking. UDP is described as a simpler connectionless protocol that provides best-effort delivery without checking for errors or lost packets. The key concepts of ports, sockets, multiplexing and demultiplexing are also covered, as well as the header formats and functions of TCP and UDP.
Overview of transport protocols.
The transport layer (OSI layer 4) is the interface between the network and application (network API).
The transport layer provides data transport service and some level of quality of service (QoS) to the application.
While all transport protocols offer data transport services, they have varying levels of quality of service in terms of error detection and correction, packet ordering and packet delay.
Simple transport protocols like UDP are often connectionless while connection-oriented transport protocols like TCP provide many quality of service properties.
The document discusses the network layer and routing. It begins by stating the goals of understanding network layer services like routing, dealing with scale, and router functionality. It then provides an overview of network layer services, routing principles, hierarchical routing, IP, routing protocols, and functions of routers. The key abstraction provided by the network layer is the service model, which can be either virtual circuits or datagrams. Routing determines the path between source and destination, and algorithms like Dijkstra's algorithm are used to find the least cost path through a graph of routers and links.
This document is an assignment submitted by four MBA students - Md. Sazedul Ekab, Md. Habibur Rahman, Nur Mohammad, and Md. Sanowar Hossain - for their International Business course at the Institute of Business Administration of Rajshahi University in Bangladesh. The assignment focuses on analyzing the economic, political, and legal environment of Japan and was submitted to their professor Mr. Md. Shariful Islam on November 5, 2015.
The document discusses wireless and mobile networks. It notes that the number of wireless phone subscribers now exceeds wired phone subscribers, and more devices are gaining wireless Internet access. There are two main challenges for wireless networks: communicating over wireless links, and handling users that change their point of connection to the network as they move. The chapter outlines topics like wireless link characteristics, cellular network architecture and standards, addressing and routing for mobile users, and how mobility is handled in different network types. It also describes elements of wireless networks like wireless hosts, base stations, and infrastructure for connecting mobiles to wired networks.
This document provides an overview of various topics related to the network layer, including IPv4, IPv6, ARP, RARP, mobile IP, routing algorithms, and routing protocols. It begins with basics of IPv4 such as its addressing scheme and role in interconnecting networks. IPv6 is then introduced, along with reasons for its development and key features like its large 128-bit addresses. Address Resolution Protocol (ARP) and Reverse ARP (RARP) are also covered. The document concludes by discussing routing algorithms like link-state and distance-vector, as well as protocols including RIP, OSPF, and BGP.
This document discusses fundamentals and link layer concepts in computer networks including:
- Network requirements, layering, protocols, and Internet architecture
- Link layer services such as framing, error detection, and flow control
- Performance metrics including bandwidth, latency, and the relationship between delay and bandwidth
- Common communication patterns like client-server and examples of TCP and UDP socket programming in C
With statistical multiplexing, the total bandwidth available can be utilized more fully since the links are not idle when only one host is transmitting. The statistical multiplexing allows aggregation of variable bit rate traffic streams.
Transport layer protocols provide services like reliable data transfer and connection establishment between applications on networked devices. They address this need through protocols like TCP and UDP. TCP provides reliable, ordered data streams using mechanisms like three-way handshake, sequence numbers, acknowledgments, retransmissions, flow control via sliding windows, and connection termination handshaking. UDP provides simple datagram transmissions without reliability or flow control.
The document discusses the link layer and its services. It introduces key link layer concepts like framing, link access, error detection, flow control, and multiple access protocols. It describes different types of multiple access protocols including channel partitioning protocols like TDMA and FDMA as well as random access protocols like ALOHA and CSMA. It also discusses error detection techniques like parity checking, checksums, and cyclic redundancy checks (CRCs). The document provides examples and comparisons of protocols to convey their tradeoffs and how they address the challenges of sharing communication channels.
The document discusses the data link layer, including its functions such as providing a service interface to the network layer, dealing with transmission errors, and regulating data flow. It describes various data link protocols like HDLC, protocols using sliding windows, and protocols for error detection. It also discusses data framing, error correction codes, checksum calculations, and finite state machine and Petri net models for analyzing protocols.
The document discusses the transport layer and key protocols TCP and UDP. It outlines the chapter which covers transport layer services like multiplexing and demultiplexing, connectionless transport with UDP, principles of reliable data transfer, connection-oriented transport with TCP including segment structure, reliable data transfer, flow control, and connection management, and principles of congestion control including TCP congestion control. It provides details on multiplexing and demultiplexing to direct segments to the appropriate socket, UDP using port numbers but providing unreliable delivery, and TCP using a 4-tuple to identify connections and providing reliable in-order byte stream delivery with congestion control and flow control.
The document discusses various topics related to network layer in computer networks including network layer services, packet switching, IP addressing, forwarding of IP packets, routing algorithms, and IP protocols. Specifically, it covers logical addressing, services provided at different nodes, forwarding methods based on destination address and labels, IP version 4 addressing including classes and subnetting, and processing of packets at routers and destination computers.
The document discusses the transport layer of the OSI model. It describes how the transport layer is responsible for end-to-end communication over a network by managing error correction and reliability. The two main protocols of the transport layer are UDP and TCP. UDP provides unreliable data transmission while TCP establishes connections and provides reliable in-order delivery through mechanisms like acknowledgments and flow control.
This document provides an overview of a course on broadband and TCP/IP fundamentals. It discusses the topics that will be covered in each of the four sessions, including basics of TCP/IP networks, switching and scheduling, routing and transport, and applications and security. It also lists some recommended textbooks and references for the course.
This document summarizes a faculty development program on computer networks held from April 24-30, 2019. On April 25, Dr. A. Kathirvel from MNM Jain Engineering College gave a lecture covering various topics related to the data link layer, including data link protocols, media access control, encoding, framing, and error detection techniques. Specific protocols and concepts discussed include HDLC, PPP, Manchester encoding, 4B/5B encoding, byte-oriented and bit-oriented framing, CRC, checksums, and two-dimensional parity.
This document discusses the implementation of a multi-channel HDLC transceiver using an FPGA. It describes the HDLC protocol and frame structure. The transceiver is used to transmit and receive HDLC frames. At the receiver, a single bit error can be detected using Hamming code and corrected. Implementing the multi-channel HDLC transceiver in FPGA provides flexibility, upgradability and customization.
The document discusses the Transport layer protocols TCP and UDP. It describes TCP as a connection-oriented protocol that provides reliable, ordered delivery of streams of data through mechanisms like sequencing, acknowledgment, flow control and error checking. UDP is described as a simpler connectionless protocol that provides best-effort delivery without checking for errors or lost packets. The key concepts of ports, sockets, multiplexing and demultiplexing are also covered, as well as the header formats and functions of TCP and UDP.
Overview of transport protocols.
The transport layer (OSI layer 4) is the interface between the network and application (network API).
The transport layer provides data transport service and some level of quality of service (QoS) to the application.
While all transport protocols offer data transport services, they have varying levels of quality of service in terms of error detection and correction, packet ordering and packet delay.
Simple transport protocols like UDP are often connectionless while connection-oriented transport protocols like TCP provide many quality of service properties.
The document discusses the network layer and routing. It begins by stating the goals of understanding network layer services like routing, dealing with scale, and router functionality. It then provides an overview of network layer services, routing principles, hierarchical routing, IP, routing protocols, and functions of routers. The key abstraction provided by the network layer is the service model, which can be either virtual circuits or datagrams. Routing determines the path between source and destination, and algorithms like Dijkstra's algorithm are used to find the least cost path through a graph of routers and links.
This document is an assignment submitted by four MBA students - Md. Sazedul Ekab, Md. Habibur Rahman, Nur Mohammad, and Md. Sanowar Hossain - for their International Business course at the Institute of Business Administration of Rajshahi University in Bangladesh. The assignment focuses on analyzing the economic, political, and legal environment of Japan and was submitted to their professor Mr. Md. Shariful Islam on November 5, 2015.
The document discusses wireless and mobile networks. It notes that the number of wireless phone subscribers now exceeds wired phone subscribers, and more devices are gaining wireless Internet access. There are two main challenges for wireless networks: communicating over wireless links, and handling users that change their point of connection to the network as they move. The chapter outlines topics like wireless link characteristics, cellular network architecture and standards, addressing and routing for mobile users, and how mobility is handled in different network types. It also describes elements of wireless networks like wireless hosts, base stations, and infrastructure for connecting mobiles to wired networks.
Here are some potential responses students could provide:
1. Describe your role and responsibilities in the organization.
- I was an intern in the accounting department. My main responsibilities included assisting with monthly financial reporting, analyzing variances between budget and actual results, and preparing forecasts.
2. What types of managerial accounting information did you use in your role?
- I used budget reports, income statements, balance sheets, and cash flow statements to analyze financial performance and identify areas for improvement. I also looked at cost reports and analyzed overhead allocation.
3. How did the managerial accounting information help managers make decisions?
- The financial reports helped identify areas where costs were higher than expected so managers could take
This document reviews previous research on factors influencing the successful implementation of Activity-Based Costing (ABC) systems between 1995-2008. It identifies some key gaps in the past research. Specifically, early studies focused mainly on technical factors, but more recent research found behavioral, organizational, and contextual factors to be more important predictors of ABC success. However, there has been little examination of the roles of organizational culture and structure. The paper concludes by proposing a new research framework to address these gaps and better understand the factors influencing successful ABC implementation.
This chapter discusses the network layer, including:
1) The key functions of the network layer including forwarding, routing, and connection setup.
2) Network layer service models such as best effort, connection-oriented, and guaranteed services.
3) The differences between virtual circuit and datagram networks, and how routers implement virtual circuits using forwarding tables and connection state information.
This document contains instructions and examples for 7 problems involving forecasting and smoothing methods. It includes instructions to copy data from external sources into templates to solve forecasting problems. The problems cover a variety of forecasting techniques including naive, moving averages, exponential smoothing, and trend analysis. Seasonal adjustment is demonstrated through examples calculating seasonal relatives for sales, customers, grain shipments and other time-series data. Forecasts are generated and compared to historical data for evaluation.
This document discusses the link layer and provides an overview of its services and context. It describes how the link layer is implemented in network interface cards and how these cards encapsulate datagrams into frames. It also outlines the topics to be covered, including error detection and correction, multiple access protocols, local area networks, and link virtualization.
The document discusses the link layer and provides an overview of its services and functions. It describes multiple access protocols for shared mediums including ALOHA, slotted ALOHA, CSMA, CSMA/CD. CSMA/CD is used in Ethernet and detects collisions to reduce wasted bandwidth. The document outlines error detection methods like parity checking, cyclic redundancy checks, and discusses how the link layer is implemented in network interface cards.
Data centers architecture and design guideMattPeci
Data center architecture, as an architectural design that establishes connections between switches and servers, is typically created during the data center design and construction phases
This document discusses data center network architectures. It begins by noting that data centers contain tens to hundreds of thousands of closely coupled hosts in close proximity, posing challenges around load management and avoiding bottlenecks. It then describes common data center network components like server racks, top-of-rack switches, core switches, and load balancers. Load balancers direct external client requests and hide the internal data center structure. The network uses a rich interconnection of switches and racks for increased throughput and redundancy. Broad questions are raised around networking massive numbers of machines, virtualization resource management, and reducing operational costs like power.
The document discusses the link layer and provides an overview of its goals and services including error detection, multiple access protocols, and local area networks. It outlines the topics that will be covered in the chapter including error detection and correction, multiple access protocols like CSMA/CD, addressing in LANs, Ethernet, switches, and VLANs. The slides are being made freely available for educational use provided proper attribution is given.
The document provides an introduction to the OSI 7 layer model and describes the data link layer in detail. It discusses the basic design principles of the data link layer, including how it provides communication between two directly connected nodes and deals with problems like errors. It also describes how real networks like Ethernet work at the data link layer and provides a Wireshark demo to show live network packet data and decoding.
Lecture 25 Link Layer - Error detection and Multiple Access.pptxHanzlaNaveed1
The document discusses principles of link layer services including error detection, correction, and sharing a broadcast channel through multiple access protocols. It provides an overview of topics like link layer addressing, local area networks including Ethernet and VLANs. Specific link layer services covered are error detection using techniques like parity checking and cyclic redundancy check (CRC). The document also distinguishes between point-to-point and broadcast links, and describes multiple access protocols for shared broadcast channels including TDMA, FDMA, and random access protocols like slotted ALOHA and CSMA.
The document discusses link layer protocols and multiple access protocols. It provides examples of channel partitioning protocols like TDMA and FDMA that divide the channel into time slots or frequency bands. It also discusses random access protocols like ALOHA, slotted ALOHA, and CSMA/CD that do not partition the channel and can result in collisions. CSMA/CD improves on CSMA by allowing nodes to detect collisions and abort transmissions to reduce wasted bandwidth. "Taking turns" protocols like polling and token passing allocate channel access by turning to control which node can transmit.
The document summarizes Chapter 5 of the textbook "Computer Networking: A Top Down Approach" which covers the link layer. It discusses the goals and outline of the chapter, including understanding link layer services like error detection and correction. It then covers various topics within the link layer such as error detection techniques, multiple access protocols for shared mediums, and examples like Ethernet, switches, and VLANs.
Chapter_6_v8.2.pptx osi model powerpointjunkmailus22
This document provides an overview of a chapter from the textbook "Computer Networking: A Top-Down Approach" by Jim Kurose and Keith Ross. It discusses the use of PowerPoint slides from the textbook and asks that users cite the source if using the slides and note any copyrighted material. The document contains brief summaries of several slides covering topics in the chapter on the link layer and local area networks, including error detection techniques like parity checking and cyclic redundancy checks, and multiple access protocols like TDMA.
Networking lecture 4 Data Link Layer by Mamun sirsharifbdp
The document summarizes key aspects of the data link layer. It discusses how the data link layer provides a well-defined interface to the network layer, deals with frame transmission and errors, and regulates frame flow. It also describes common data link layer functions like framing, error detection, flow control, and link management. Finally, it discusses different data link protocols and how they handle issues like channel access, error handling, and window flow control.
The document discusses link layer concepts including link layer addressing, MAC addresses, ARP, Ethernet frames, CSMA/CD, hubs, and switches. It explains that MAC addresses are used to deliver frames within a local area network, while IP addresses are used between networks. ARP is used to map IP addresses to MAC addresses on the same network. Ethernet uses CSMA/CD for media access and frames include source and destination MAC addresses. Hubs operate at the physical layer while switches operate at the data link layer and can reduce collisions by isolating segments.
The document provides an overview of the link layer. It discusses the goals and services of the link layer, including error detection, correction, and sharing access to broadcast channels through multiple access protocols. It describes various link layer technologies like Ethernet, switches, and VLANs. It also covers topics like link layer addressing using MAC addresses, the Address Resolution Protocol (ARP) for mapping IP addresses to MAC addresses, and examples of multiple access protocols including Carrier Sense Multiple Access with Collision Detection (CSMA/CD) used in Ethernet networks.
This document provides an overview and outline of topics to be covered in a chapter about the link layer and local area networks (LANs). It discusses the goals of understanding link layer services like error detection and correction as well as sharing bandwidth on a broadcast channel. It also outlines the key sections to be covered, including multiple access protocols, LAN addressing, Ethernet, switches, and virtual LANs. Sample slides are provided on topics like link layer services, error detection techniques, and multiple access protocols. The document is intended for educational use and asks that the source be cited if used for teaching.
This document provides an overview and summary of a chapter on link layers and local area networks (LANs) from the textbook "Computer Networking: A Top-Down Approach". It discusses the goals of understanding link layer services and technologies. It also provides an outline of the chapter topics which include error detection and correction, multiple access protocols, LAN addressing, Ethernet, switches, and virtual LANs. The document is intended for educational use and free modification with attribution required.
The document provides an overview of the data link layer (DLL). It discusses how the DLL transforms the physical layer into a link responsible for node-to-node communication. The DLL is responsible for framing, addressing, flow control, error control, and media access control. It provides services like transferring data packets between network layers on different machines with options for unacknowledged connectionless, acknowledged connectionless, and acknowledged connection-oriented services. Key DLL functions include framing data into frames, error control using acknowledgements and retransmissions, and flow control to regulate data transmission rates.
The document provides an overview of the data link layer. It discusses how the data link layer transforms the physical layer into a link responsible for node-to-node communication. Specific responsibilities include framing, addressing, flow control, error control, and media access control. It then describes various data link layer services, design issues, error detection and correction techniques like parity checks, cyclic redundancy checks, and flow control mechanisms.
1. Chapter 5: The Data Link Layer
Our goals:
understand principles behind data link layer
services:
error detection, correction
sharing a broadcast channel: multiple access
link layer addressing
reliable data transfer, flow control: done!
instantiation and implementation of various link
layer technologies
5: DataLink Layer 5-1
Link Layer
5.1 Introduction and 5.6 Hubs and switches
services 5.7 PPP
5.2 Error detection 5.8 Link Virtualization:
and correction ATM and MPLS
5.3Multiple access
protocols
5.4 Link-Layer
Addressing
5.5 Ethernet
5: DataLink Layer 5-2
1
2. Link Layer: Introduction “link”
Some terminology:
hosts and routers are nodes
communication channels that
connect adjacent nodes along
communication path are links
wired links
wireless links
LANs
layer-2 packet is a frame,
encapsulates datagram
data-link layer has responsibility of
transferring datagram from one node
to adjacent node over a link
5: DataLink Layer 5-3
Link layer: context
Datagram transferred by transportation analogy
different link protocols trip from Princeton to
Lausanne
over different links:
limo: Princeton to JFK
e.g., Ethernet on first link,
plane: JFK to Geneva
frame relay on
intermediate links, 802.11 train: Geneva to Lausanne
on last link tourist = datagram
Each link protocol transport segment =
provides different communication link
services transportation mode =
e.g., may or may not link layer protocol
provide rdt over link
travel agent = routing
algorithm
5: DataLink Layer 5-4
2
3. Link Layer Services
Framing, link access:
encapsulate datagram into frame, adding header, trailer
channel access if shared medium
“MAC” addresses used in frame headers to identify
source, dest
• different from IP address!
Reliable delivery between adjacent nodes
we learned how to do this already (chapter 3)!
seldom used on low bit error link (fiber, some twisted
pair)
wireless links: high error rates
• Q: why both link-level and end-end reliability?
5: DataLink Layer 5-5
Link Layer Services (more)
Flow Control:
pacing between adjacent sending and receiving nodes
Error Detection:
errors caused by signal attenuation, noise.
receiver detects presence of errors:
• signals sender for retransmission or drops frame
Error Correction:
receiver identifies and corrects bit error(s) without
resorting to retransmission
Half-duplex and full-duplex
with half duplex, nodes at both ends of link can transmit,
but not at same time
5: DataLink Layer 5-6
3
4. Adaptors Communicating
datagram
link layer protocol rcving
sending node
node
frame frame
adapter adapter
link layer implemented in receiving side
“adaptor” (aka NIC) looks for errors, rdt, flow
Ethernet card, PCMCI control, etc
card, 802.11 card extracts datagram, passes
to rcving node
sending side:
encapsulates datagram in adapter is semi-
a frame autonomous
adds error checking bits, link & physical layers
rdt, flow control, etc.
5: DataLink Layer 5-7
Link Layer
5.1 Introduction and 5.6 Hubs and switches
services 5.7 PPP
5.2 Error detection 5.8 Link Virtualization:
and correction ATM
5.3Multiple access
protocols
5.4 Link-Layer
Addressing
5.5 Ethernet
5: DataLink Layer 5-8
4
5. Error Detection
EDC= Error Detection and Correction bits (redundancy)
D = Data protected by error checking, may include header fields
• Error detection not 100% reliable!
• protocol may miss some errors, but rarely
• larger EDC field yields better detection and correction
5: DataLink Layer 5-9
Parity Checking
Single Bit Parity: Two Dimensional Bit Parity:
Detect single bit errors Detect and correct single bit errors
0 0
5: DataLink Layer 5-10
5
6. Internet checksum
Goal: detect “errors” (e.g., flipped bits) in transmitted
segment (note: used at transport layer only)
Sender: Receiver:
compute checksum of received
treat segment contents segment
as sequence of 16-bit
check if computed checksum
integers equals checksum field value:
checksum: addition (1’s NO - error detected
complement sum) of YES - no error detected. But
segment contents maybe errors nonetheless?
sender puts checksum More later ….
value into UDP checksum
field
5: DataLink Layer 5-11
Checksumming: Cyclic Redundancy Check
view data bits, D, as a binary number
choose r+1 bit pattern (generator), G
goal: choose r CRC bits, R, such that
<D,R> exactly divisible by G (modulo 2)
receiver knows G, divides <D,R> by G. If non-zero remainder:
error detected!
can detect all burst errors less than r+1 bits
widely used in practice (ATM, HDCL)
5: DataLink Layer 5-12
6
7. CRC Example
Want:
D.2r XOR R = nG
equivalently:
D.2r = nG XOR R
equivalently:
if we divide D.2r by
G, want remainder R
D.2r
R = remainder[ ]
G
5: DataLink Layer 5-13
Link Layer
5.1 Introduction and 5.6 Hubs and switches
services 5.7 PPP
5.2 Error detection 5.8 Link Virtualization:
and correction ATM
5.3Multiple access
protocols
5.4 Link-Layer
Addressing
5.5 Ethernet
5: DataLink Layer 5-14
7
8. Multiple Access Links and Protocols
Two types of “links”:
point-to-point
PPP for dial-up access
point-to-point link between Ethernet switch and host
broadcast (shared wire or medium)
traditional Ethernet
upstream HFC
802.11 wireless LAN
5: DataLink Layer 5-15
Multiple Access protocols
single shared broadcast channel
two or more simultaneous transmissions by nodes:
interference
collision if node receives two or more signals at the same time
multiple access protocol
distributed algorithm that determines how nodes
share channel, i.e., determine when node can transmit
communication about channel sharing must use channel
itself!
no out-of-band channel for coordination
5: DataLink Layer 5-16
8
9. Ideal Mulitple Access Protocol
Broadcast channel of rate R bps
1. When one node wants to transmit, it can send at
rate R.
2. When M nodes want to transmit, each can send at
average rate R/M
3. Fully decentralized:
no special node to coordinate transmissions
no synchronization of clocks, slots
4. Simple
5: DataLink Layer 5-17
MAC Protocols: a taxonomy
Three broad classes:
Channel Partitioning
divide channel into smaller “pieces” (time slots,
frequency, code)
allocate piece to node for exclusive use
Random Access
channel not divided, allow collisions
“recover” from collisions
“Taking turns”
Nodes take turns, but nodes with more to send can take
longer turns
5: DataLink Layer 5-18
9
10. Channel Partitioning MAC protocols: TDMA
TDMA: time division multiple access
access to channel in "rounds"
each station gets fixed length slot (length = pkt
trans time) in each round
unused slots go idle
example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6
idle
5: DataLink Layer 5-19
Channel Partitioning MAC protocols: FDMA
FDMA: frequency division multiple access
channel spectrum divided into frequency bands
each station assigned fixed frequency band
unused transmission time in frequency bands go idle
example: 6-station LAN, 1,3,4 have pkt, frequency
bands 2,5,6 idle
time
frequency bands
5: DataLink Layer 5-20
10
11. Random Access Protocols
When node has packet to send
transmit at full channel data rate R.
no a priori coordination among nodes
two or more transmitting nodes ➜ “collision”,
random access MAC protocol specifies:
how to detect collisions
how to recover from collisions (e.g., via delayed
retransmissions)
Examples of random access MAC protocols:
slotted ALOHA
ALOHA
CSMA, CSMA/CD, CSMA/CA
5: DataLink Layer 5-21
Slotted ALOHA
Assumptions Operation
all frames same size when node obtains fresh
time is divided into frame, it transmits in next
equal size slots, time to slot
transmit 1 frame no collision, node can send
nodes start to transmit new frame in next slot
frames only at if collision, node
beginning of slots retransmits frame in each
nodes are synchronized subsequent slot with prob.
if 2 or more nodes p until success
transmit in slot, all
nodes detect collision
5: DataLink Layer 5-22
11
12. Slotted ALOHA
Pros Cons
single active node can collisions, wasting slots
continuously transmit idle slots
at full rate of channel nodes may be able to
highly decentralized: detect collision in less
only slots in nodes than time to transmit
packet
need to be in sync
clock synchronization
simple
5: DataLink Layer 5-23
Slotted Aloha efficiency
Efficiency is the long-run For max efficiency
fraction of successful slots with N nodes, find p*
when there are many nodes, that maximizes
each with many frames to send Np(1-p)N-1
For many nodes, take
Suppose N nodes with limit of Np*(1-p*)N-1
many frames to send, as N goes to infinity,
each transmits in slot gives 1/e = .37
with probability p
prob that node 1 has At best: channel
success in a slot used for useful
= p(1-p)N-1 transmissions 37%
prob that any node has of time!
a success = Np(1-p)N-1
5: DataLink Layer 5-24
12
13. Pure (unslotted) ALOHA
unslotted Aloha: simpler, no synchronization
when frame first arrives
transmit immediately
collision probability increases:
frame sent at t0 collides with other frames sent in [t0-1,t0+1]
5: DataLink Layer 5-25
Pure Aloha efficiency
P(success by given node) = P(node transmits) .
P(no other node transmits in [p0-1,p0] .
P(no other node transmits in [p0-1,p0]
= p . (1-p)N-1 . (1-p)N-1
= p . (1-p)2(N-1)
… choosing optimum p and then letting n -> infty ...
= 1/(2e) = .18
Even worse !
5: DataLink Layer 5-26
13
14. CSMA (Carrier Sense Multiple Access)
CSMA: listen before transmit:
If channel sensed idle: transmit entire frame
If channel sensed busy, defer transmission
Human analogy: don’t interrupt others!
5: DataLink Layer 5-27
CSMA collisions spatial layout of nodes
collisions can still occur:
propagation delay means
two nodes may not hear
each other’s transmission
collision:
entire packet transmission
time wasted
note:
role of distance & propagation
delay in determining collision
probability
5: DataLink Layer 5-28
14
15. CSMA/CD (Collision Detection)
CSMA/CD: carrier sensing, deferral as in CSMA
collisions detected within short time
colliding transmissions aborted, reducing channel
wastage
collision detection:
easy in wired LANs: measure signal strengths,
compare transmitted, received signals
difficult in wireless LANs: receiver shut off while
transmitting
human analogy: the polite conversationalist
5: DataLink Layer 5-29
CSMA/CD collision detection
5: DataLink Layer 5-30
15
16. “Taking Turns” MAC protocols
channel partitioning MAC protocols:
share channel efficiently and fairly at high load
inefficient at low load: delay in channel access,
1/N bandwidth allocated even if only 1 active
node!
Random access MAC protocols
efficient at low load: single node can fully
utilize channel
high load: collision overhead
“taking turns” protocols
look for best of both worlds!
5: DataLink Layer 5-31
“Taking Turns” MAC protocols
Polling: Token passing:
master node control token passed from
“invites” slave nodes one node to next
to transmit in turn sequentially.
concerns: token message
polling overhead concerns:
latency token overhead
single point of latency
failure (master) single point of failure (token)
5: DataLink Layer 5-32
16
17. Summary of MAC protocols
What do you do with a shared media?
Channel Partitioning, by time, frequency or code
• Time Division, Frequency Division
Random partitioning (dynamic),
• ALOHA, S-ALOHA, CSMA, CSMA/CD
• carrier sensing: easy in some technologies (wire), hard
in others (wireless)
• CSMA/CD used in Ethernet
• CSMA/CA used in 802.11
Taking Turns
• polling from a central site, token passing
5: DataLink Layer 5-33
LAN technologies
Data link layer so far:
services, error detection/correction, multiple
access
Next: LAN technologies
addressing
Ethernet
hubs, switches
PPP
5: DataLink Layer 5-34
17
18. Link Layer
5.1 Introduction and 5.6 Hubs and switches
services 5.7 PPP
5.2 Error detection 5.8 Link Virtualization:
and correction ATM
5.3Multiple access
protocols
5.4 Link-Layer
Addressing
5.5 Ethernet
5: DataLink Layer 5-35
MAC Addresses and ARP
32-bit IP address:
network-layer address
used to get datagram to destination IP subnet
MAC (or LAN or physical or Ethernet)
address:
used to get frame from one interface to another
physically-connected interface (same network)
48 bit MAC address (for most LANs)
burned in the adapter ROM
5: DataLink Layer 5-36
18
19. LAN Addresses and ARP
Each adapter on LAN has unique LAN address
1A-2F-BB-76-09-AD Broadcast address =
FF-FF-FF-FF-FF-FF
LAN
(wired or = adapter
wireless)
71-65-F7-2B-08-53
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
5: DataLink Layer 5-37
LAN Address (more)
MAC address allocation administered by IEEE
manufacturer buys portion of MAC address space
(to assure uniqueness)
Analogy:
(a) MAC address: like Social Security Number
(b) IP address: like postal address
MAC flat address ➜ portability
can move LAN card from one LAN to another
IP hierarchical address NOT portable
depends on IP subnet to which node is attached
5: DataLink Layer 5-38
19
20. ARP: Address Resolution Protocol
Question: how to determine Each IP node (Host,
MAC address of B Router) on LAN has
knowing B’s IP address? ARP table
ARP Table: IP/MAC
237.196.7.78
address mappings for
1A-2F-BB-76-09-AD
some LAN nodes
237.196.7.23
237.196.7.14 < IP address; MAC address; TTL>
TTL (Time To Live): time
LAN after which address
71-65-F7-2B-08-53 mapping will be forgotten
58-23-D7-FA-20-B0
(typically 20 min)
0C-C4-11-6F-E3-98
237.196.7.88
5: DataLink Layer 5-39
ARP protocol: Same LAN (network)
A wants to send datagram
to B, and B’s MAC address A caches (saves) IP-to-
not in A’s ARP table. MAC address pair in its
A broadcasts ARP query ARP table until information
packet, containing B's IP becomes old (times out)
address soft state: information
Dest MAC address = that times out (goes
FF-FF-FF-FF-FF-FF away) unless refreshed
all machines on LAN ARP is “plug-and-play”:
receive ARP query nodes create their ARP
B receives ARP packet, tables without
replies to A with its (B's) intervention from net
MAC address administrator
frame sent to A’s MAC
address (unicast)
5: DataLink Layer 5-40
20
21. Routing to another LAN
walkthrough: send datagram from A to B via R
assume A know’s B IP address
A
R
B
Two ARP tables in router R, one for each IP
network (LAN)
5: DataLink Layer 5-41
A creates datagram with source A, destination B
A uses ARP to get R’s MAC address for 111.111.111.110
A creates link-layer frame with R's MAC address as dest,
frame contains A-to-B IP datagram
A’s adapter sends frame
R’s adapter receives frame
R removes IP datagram from Ethernet frame, sees its
destined to B
R uses ARP to get B’s MAC address
R creates frame containing A-to-B IP datagram sends to B
A
R
B
5: DataLink Layer 5-42
21
22. Link Layer
5.1 Introduction and 5.6 Hubs and switches
services 5.7 PPP
5.2 Error detection 5.8 Link Virtualization:
and correction ATM
5.3Multiple access
protocols
5.4 Link-Layer
Addressing
5.5 Ethernet
5: DataLink Layer 5-43
Ethernet
“dominant” wired LAN technology:
cheap $20 for 100Mbs!
first widely used LAN technology
Simpler, cheaper than token LANs and ATM
Kept up with speed race: 10 Mbps – 10 Gbps
Metcalfe’s Ethernet
sketch
5: DataLink Layer 5-44
22
23. Star topology
Bus topology popular through mid 90s
Now star topology prevails
Connection choices: hub or switch (more later)
hub or
switch
5: DataLink Layer 5-45
Ethernet Frame Structure
Sending adapter encapsulates IP datagram (or other
network layer protocol packet) in Ethernet frame
Preamble:
7 bytes with pattern 10101010 followed by one
byte with pattern 10101011
used to synchronize receiver, sender clock rates
5: DataLink Layer 5-46
23
24. Ethernet Frame Structure
(more)
Addresses: 6 bytes
if adapter receives frame with matching destination
address, or with broadcast address (eg ARP packet), it
passes data in frame to net-layer protocol
otherwise, adapter discards frame
Type: indicates the higher layer protocol (mostly
IP but others may be supported such as Novell
IPX and AppleTalk)
CRC: checked at receiver, if error is detected, the
frame is simply dropped
5: DataLink Layer 5-47
Unreliable, connectionless service
Connectionless: No handshaking between sending
and receiving adapter.
Unreliable: receiving adapter doesn’t send acks or
nacks to sending adapter
stream of datagrams passed to network layer can have
gaps
gaps will be filled if app is using TCP
otherwise, app will see the gaps
5: DataLink Layer 5-48
24
25. Ethernet uses CSMA/CD
No slots Before attempting a
adapter doesn’t transmit retransmission,
if it senses that some adapter waits a
other adapter is random time, that is,
transmitting, that is, random access
carrier sense
transmitting adapter
aborts when it senses
that another adapter is
transmitting, that is,
collision detection
5: DataLink Layer 5-49
Ethernet CSMA/CD algorithm
1. Adaptor receives 4. If adapter detects
datagram from net layer & another transmission while
creates frame transmitting, aborts and
2. If adapter senses channel sends jam signal
idle, it starts to transmit 5. After aborting, adapter
frame. If it senses enters exponential
channel busy, waits until backoff: after the mth
channel idle and then collision, adapter chooses
transmits a K at random from
3. If adapter transmits {0,1,2,…,2m-1}. Adapter
entire frame without waits K·512 bit times and
detecting another returns to Step 2
transmission, the adapter
is done with frame ! 5: DataLink Layer 5-50
25
26. Ethernet’s CSMA/CD (more)
Jam Signal: make sure all Exponential Backoff:
other transmitters are Goal: adapt retransmission
aware of collision; 48 bits attempts to estimated
Bit time: .1 microsec for 10 current load
Mbps Ethernet ; heavy load: random wait
for K=1023, wait time is will be longer
about 50 msec first collision: choose K
from {0,1}; delay is K· 512
bit transmission times
after second collision:
See/interact with Java choose K from {0,1,2,3}…
applet on AWL Web site:
after ten collisions, choose
highly recommended !
K from {0,1,2,3,4,…,1023}
5: DataLink Layer 5-51
CSMA/CD efficiency
Tprop = max prop between 2 nodes in LAN
ttrans = time to transmit max-size frame
1
efficiency =
1 + 5t prop / ttrans
Efficiency goes to 1 as tprop goes to 0
Goes to 1 as ttrans goes to infinity
Much better than ALOHA, but still decentralized,
simple, and cheap
5: DataLink Layer 5-52
26
27. 10BaseT and 100BaseT
10/100 Mbps rate; latter called “fast ethernet”
T stands for Twisted Pair
Nodes connect to a hub: “star topology”; 100 m
max distance between nodes and hub
twisted pair
hub
5: DataLink Layer 5-53
Hubs
Hubs are essentially physical-layer repeaters:
bits coming from one link go out all other links
at the same rate
no frame buffering
no CSMA/CD at hub: adapters detect collisions
provides net management functionality
twisted pair
hub
5: DataLink Layer 5-54
27
28. Manchester encoding
Used in 10BaseT
Each bit has a transition
Allows clocks in sending and receiving nodes to
synchronize to each other
no need for a centralized, global clock among nodes!
Hey, this is physical-layer stuff!
5: DataLink Layer 5-55
Gbit Ethernet
uses standard Ethernet frame format
allows for point-to-point links and shared
broadcast channels
in shared mode, CSMA/CD is used; short distances
between nodes required for efficiency
uses hubs, called here “Buffered Distributors”
Full-Duplex at 1 Gbps for point-to-point links
10 Gbps now !
5: DataLink Layer 5-56
28
29. Link Layer
5.1 Introduction and 5.6 Interconnections:
services Hubs and switches
5.2 Error detection 5.7 PPP
and correction 5.8 Link Virtualization:
5.3Multiple access ATM
protocols
5.4 Link-Layer
Addressing
5.5 Ethernet
5: DataLink Layer 5-57
Interconnecting with hubs
Backbone hub interconnects LAN segments
Extends max distance between nodes
But individual segment collision domains become one
large collision domain
Can’t interconnect 10BaseT & 100BaseT
hub
hub
hub hub
5: DataLink Layer 5-58
29
30. Switch
Link layer device
stores and forwards Ethernet frames
examines frame header and selectively
forwards frame based on MAC dest address
when frame is to be forwarded on segment,
uses CSMA/CD to access segment
transparent
hosts are unaware of presence of switches
plug-and-play, self-learning
switches do not need to be configured
5: DataLink Layer 5-59
Forwarding
switch
1
2 3
hub
hub hub
• How do determine onto which LAN segment to
forward frame?
• Looks like a routing problem...
5: DataLink Layer 5-60
30
31. Self learning
A switch has a switch table
entry in switch table:
(MAC Address, Interface, Time Stamp)
stale entries in table dropped (TTL can be 60 min)
switch learns which hosts can be reached through
which interfaces
when frame received, switch “learns” location of
sender: incoming LAN segment
records sender/location pair in switch table
5: DataLink Layer 5-61
Filtering/Forwarding
When switch receives a frame:
index switch table using MAC dest address
if entry found for destination
then{
if dest on segment from which frame arrived
then drop the frame
else forward the frame on interface indicated
}
else flood
forward on all but the interface
on which the frame arrived
5: DataLink Layer 5-62
31
32. Switch example
Suppose C sends frame to D
switch address interface
1 A 1
2 3
B 1
E 2
hub hub hub G 3
A
I
D F
B C G H
E
Switch receives frame from from C
notes in bridge table that C is on interface 1
because D is not in table, switch forwards frame into
interfaces 2 and 3
frame received by D 5: DataLink Layer 5-63
Switch example
Suppose D replies back with frame to C.
address interface
switch
A 1
B 1
E 2
hub hub hub G 3
A
I C 1
D F
B C G H
E
Switch receives frame from from D
notes in bridge table that D is on interface 2
because C is in table, switch forwards frame only to
interface 1
frame received by C 5: DataLink Layer 5-64
32
33. Switch: traffic isolation
switch installation breaks subnet into LAN
segments
switch filters packets:
same-LAN-segment frames not usually
forwarded onto other LAN segments
segments become separate collision domains
switch
collision
domain
hub
hub hub
collision domain collision domain 5: DataLink Layer 5-65
Switches: dedicated access
Switch with many A
interfaces
C’ B
Hosts have direct
connection to switch
No collisions; full duplex switch
Switching: A-to-A’ and B-to-B’ C
simultaneously, no collisions
B’ A’
5: DataLink Layer 5-66
33
34. More on Switches
cut-through switching: frame forwarded
from input to output port without first
collecting entire frame
slight reduction in latency
combinations of shared/dedicated,
10/100/1000 Mbps interfaces
5: DataLink Layer 5-67
Institutional network
mail server
to external
network
router web server
switch
IP subnet
hub
hub hub
5: DataLink Layer 5-68
34
35. Switches vs. Routers
both store-and-forward devices
routers: network layer devices (examine network layer
headers)
switches are link layer devices
routers maintain routing tables, implement routing
algorithms
switches maintain switch tables, implement
filtering, learning algorithms
5: DataLink Layer 5-69
Summary comparison
hubs routers switches
traffic no yes yes
isolation
plug & play yes no yes
optimal no yes no
routing
cut yes no yes
through
5: DataLink Layer 5-70
35
36. Link Layer
5.1 Introduction and 5.6 Hubs and switches
services 5.7 PPP
5.2 Error detection 5.8 Link Virtualization:
and correction ATM
5.3Multiple access
protocols
5.4 Link-Layer
Addressing
5.5 Ethernet
5: DataLink Layer 5-71
Point to Point Data Link Control
one sender, one receiver, one link: easier than
broadcast link:
no Media Access Control
no need for explicit MAC addressing
e.g., dialup link, ISDN line
popular point-to-point DLC protocols:
PPP (point-to-point protocol)
HDLC: High level data link control (Data link
used to be considered “high layer” in protocol
stack!
5: DataLink Layer 5-72
36
37. PPP Design Requirements [RFC 1557]
packet framing: encapsulation of network-layer
datagram in data link frame
carry network layer data of any network layer
protocol (not just IP) at same time
ability to demultiplex upwards
bit transparency: must carry any bit pattern in the
data field
error detection (no correction)
connection liveness: detect, signal link failure to
network layer
network layer address negotiation: endpoint can
learn/configure each other’s network address
5: DataLink Layer 5-73
PPP non-requirements
no error correction/recovery
no flow control
out of order delivery OK
no need to support multipoint links (e.g., polling)
Error recovery, flow control, data re-ordering
all relegated to higher layers!
5: DataLink Layer 5-74
37
38. PPP Data Frame
Flag: delimiter (framing)
Address: does nothing (only one option)
Control: does nothing; in the future possible
multiple control fields
Protocol: upper layer protocol to which frame
delivered (eg, PPP-LCP, IP, IPCP, etc)
5: DataLink Layer 5-75
PPP Data Frame
info: upper layer data being carried
check: cyclic redundancy check for error
detection
5: DataLink Layer 5-76
38
39. Byte Stuffing
“data transparency” requirement: data field must
be allowed to include flag pattern <01111110>
Q: is received <01111110> data or flag?
Sender: adds (“stuffs”) extra < 01111110> byte
after each < 01111110> data byte
Receiver:
two 01111110 bytes in a row: discard first byte,
continue data reception
single 01111110: flag byte
5: DataLink Layer 5-77
Byte Stuffing
flag byte
pattern
in data
to send
flag byte pattern plus
stuffed byte in
transmitted data
5: DataLink Layer 5-78
39
40. PPP Data Control Protocol
Before exchanging network-
layer data, data link peers
must
configure PPP link (max.
frame length,
authentication)
learn/configure network
layer information
for IP: carry IP Control
Protocol (IPCP) msgs
(protocol field: 8021) to
configure/learn IP
address
5: DataLink Layer 5-79
Link Layer
5.1 Introduction and 5.6 Hubs and switches
services 5.7 PPP
5.2 Error detection 5.8 Link Virtualization:
and correction ATM and MPLS
5.3Multiple access
protocols
5.4 Link-Layer
Addressing
5.5 Ethernet
5: DataLink Layer 5-80
40
41. Virtualization of networks
Virtualization of resources: a powerful abstraction in
systems engineering:
computing examples: virtual memory, virtual
devices
Virtual machines: e.g., java
IBM VM os from 1960’s/70’s
layering of abstractions: don’t sweat the details of
the lower layer, only deal with lower layers
abstractly
5: DataLink Layer 5-81
The Internet: virtualizing networks
1974: multiple unconnected … differing in:
nets addressing conventions
ARPAnet packet formats
data-over-cable networks error recovery
packet satellite network (Aloha) routing
packet radio network
ARPAnet satellite net
"A Protocol for Packet Network Intercommunication",
V. Cerf, R. Kahn, IEEE Transactions on Communications,
5: DataLink Layer 5-82
May, 1974, pp. 637-648.
41
42. The Internet: virtualizing networks
Internetwork layer (IP): Gateway:
addressing: internetwork “embed internetwork packets in
appears as a single, uniform local packet format or extract
entity, despite underlying local them”
network heterogeneity route (at internetwork level) to
network of networks next gateway
gateway
ARPAnet satellite net
5: DataLink Layer 5-83
Cerf & Kahn’s Internetwork Architecture
What is virtualized?
two layers of addressing: internetwork and local
network
new layer (IP) makes everything homogeneous at
internetwork layer
underlying local network technology
cable
satellite
56K telephone modem
today: ATM, MPLS
… “invisible” at internetwork layer. Looks like a link
layer technology to IP!
5: DataLink Layer 5-84
42
43. ATM and MPLS
ATM, MPLS separate networks in their own
right
different service models, addressing, routing
from Internet
viewed by Internet as logical link connecting
IP routers
just like dialup link is really part of separate
network (telephone network)
ATM, MPSL: of technical interest in their
own right
5: DataLink Layer 5-85
Asynchronous Transfer Mode: ATM
1990’s/00 standard for high-speed (155Mbps to
622 Mbps and higher) Broadband Integrated
Service Digital Network architecture
Goal: integrated, end-end transport of carry voice,
video, data
meeting timing/QoS requirements of voice, video
(versus Internet best-effort model)
“next generation” telephony: technical roots in
telephone world
packet-switching (fixed length packets, called
“cells”) using virtual circuits
5: DataLink Layer 5-86
43
44. ATM architecture
adaptation layer: only at edge of ATM network
data segmentation/reassembly
roughly analagous to Internet transport layer
ATM layer: “network” layer
cell switching, routing
physical layer
5: DataLink Layer 5-87
ATM: network or link layer?
Vision: end-to-end
transport: “ATM from
IP
desktop to desktop” network
ATM is a network ATM
technology network
Reality: used to connect
IP backbone routers
“IP over ATM”
ATM as switched
link layer,
connecting IP
routers
5: DataLink Layer 5-88
44
45. ATM Adaptation Layer (AAL)
ATM Adaptation Layer (AAL): “adapts” upper
layers (IP or native ATM applications) to ATM
layer below
AAL present only in end systems, not in switches
AAL layer segment (header/trailer fields, data)
fragmented across multiple ATM cells
analogy: TCP segment in many IP packets
5: DataLink Layer 5-89
ATM Adaptation Layer (AAL) [more]
Different versions of AAL layers, depending on ATM
service class:
AAL1: for CBR (Constant Bit Rate) services, e.g. circuit emulation
AAL2: for VBR (Variable Bit Rate) services, e.g., MPEG video
AAL5: for data (eg, IP datagrams)
User data
AAL PDU
ATM cell
5: DataLink Layer 5-90
45
46. ATM Layer
Service: transport cells across ATM network
analogous to IP network layer
very different services than IP network layer
Guarantees ?
Network Service Congestion
Architecture Model Bandwidth Loss Order Timing feedback
Internet best effort none no no no no (inferred
via loss)
ATM CBR constant yes yes yes no
rate congestion
ATM VBR guaranteed yes yes yes no
rate congestion
ATM ABR guaranteed no yes no yes
minimum
ATM UBR none no yes no no
5: DataLink Layer 5-91
ATM Layer: Virtual Circuits
VC transport: cells carried on VC from source to dest
call setup, teardown for each call before data can flow
each packet carries VC identifier (not destination ID)
every switch on source-dest path maintain “state” for each
passing connection
link,switch resources (bandwidth, buffers) may be allocated to
VC: to get circuit-like perf.
Permanent VCs (PVCs)
long lasting connections
typically: “permanent” route between to IP routers
Switched VCs (SVC):
dynamically set up on per-call basis
5: DataLink Layer 5-92
46
47. ATM VCs
Advantages of ATM VC approach:
QoS performance guarantee for connection
mapped to VC (bandwidth, delay, delay jitter)
Drawbacks of ATM VC approach:
Inefficient support of datagram traffic
one PVC between each source/dest pair) does
not scale (N*2 connections needed)
SVC introduces call setup latency, processing
overhead for short lived connections
5: DataLink Layer 5-93
ATM Layer: ATM cell
5-byte ATM cell header
48-byte payload
Why?: small payload -> short cell-creation delay
for digitized voice
halfway between 32 and 64 (compromise!)
Cell header
Cell format
5: DataLink Layer 5-94
47
48. ATM cell header
VCI: virtual channel ID
will change from link to link thru net
PT: Payload type (e.g. RM cell versus data cell)
CLP: Cell Loss Priority bit
CLP = 1 implies low priority cell, can be
discarded if congestion
HEC: Header Error Checksum
cyclic redundancy check
5: DataLink Layer 5-95
ATM Physical Layer (more)
Two pieces (sublayers) of physical layer:
Transmission Convergence Sublayer (TCS): adapts
ATM layer above to PMD sublayer below
Physical Medium Dependent: depends on physical
medium being used
TCS Functions:
Header checksum generation: 8 bits CRC
Cell delineation
With “unstructured” PMD sublayer, transmission
of idle cells when no data cells to send
5: DataLink Layer 5-96
48
49. ATM Physical Layer
Physical Medium Dependent (PMD) sublayer
SONET/SDH: transmission frame structure (like a
container carrying bits);
bit synchronization;
bandwidth partitions (TDM);
several speeds: OC3 = 155.52 Mbps; OC12 = 622.08
Mbps; OC48 = 2.45 Gbps, OC192 = 9.6 Gbps
TI/T3: transmission frame structure (old
telephone hierarchy): 1.5 Mbps/ 45 Mbps
unstructured: just cells (busy/idle)
5: DataLink Layer 5-97
IP-Over-ATM
IP over ATM
Classic IP only replace “network”
3 “networks” (e.g., (e.g., LAN segment)
LAN segments) with ATM network
MAC (802.3) and IP ATM addresses, IP
addresses addresses
ATM
network
Ethernet Ethernet
LANs LANs
5: DataLink Layer 5-98
49
50. IP-Over-ATM
app
app transport
transport IP IP
IP AAL AAL
Eth Eth ATM
ATM
phy phy phy ATM phy
phy
ATM
phy
5: DataLink Layer 5-99
Datagram Journey in IP-over-ATM Network
at Source Host:
IP layer maps between IP, ATM dest address (using ARP)
passes datagram to AAL5
AAL5 encapsulates data, segments cells, passes to ATM layer
ATM network: moves cell along VC to destination
at Destination Host:
AAL5 reassembles cells into original datagram
if CRC OK, datagram is passed to IP
5: DataLink Layer 5-100
50
51. IP-Over-ATM
Issues: ATM
IP datagrams into network
ATM AAL5 PDUs
from IP addresses
to ATM addresses
just like IP
addresses to
Ethernet
802.3 MAC
LANs
addresses!
5: DataLink Layer 5-101
Multiprotocol label switching (MPLS)
initial goal: speed up IP forwarding by using fixed
length label (instead of IP address) to do
forwarding
borrowing ideas from Virtual Circuit (VC) approach
but IP datagram still keeps IP address!
PPP or Ethernet
MPLS header IP header remainder of link-layer frame
header
label Exp S TTL
20 3 1 5
5: DataLink Layer 5-102
51
52. MPLS capable routers
a.k.a. label-switched router
forwards packets to outgoing interface based
only on label value (don’t inspect IP address)
MPLS forwarding table distinct from IP forwarding
tables
signaling protocol needed to set up forwarding
RSVP-TE
forwarding possible along paths that IP alone would
not allow (e.g., source-specific routing) !!
use MPLS for traffic engineering
must co-exist with IP-only routers
5: DataLink Layer 5-103
MPLS forwarding tables
in out out
label label dest interface
10 A 0 in out out
12 D 0 label label dest interface
8 A 1 10 6 A 1
12 9 D 0
R6
0 0
D
1 1
R4 R3
R5
0 0
A
R2 in outR1 out
label label dest interface
in out out
label label dest interface 6 - A 0
8 6 A 0
5: DataLink Layer 5-104
52
53. Chapter 5: Summary
principles behind data link layer services:
error detection, correction
sharing a broadcast channel: multiple access
link layer addressing
instantiation and implementation of various link
layer technologies
Ethernet
switched LANS
PPP
virtualized networks as a link layer: ATM, MPLS
5: DataLink Layer 5-105
53