100
5: DataLink Layer 5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and CMPT 371: Data Communications and Networking Networking Chapter 5: Data Link Layer Chapter 5: Data Link Layer

5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-1

School of Computing Science Simon Fraser University

CMPT 371 Data Communications and CMPT 371 Data Communications and NetworkingNetworking

Chapter 5 Data Link LayerChapter 5 Data Link Layer

5 DataLink Layer 5-2

Chapter 5 The Data Link LayerOur goals

understand principles behind data link layer services error detection correction sharing a broadcast channel multiple access link layer addressing reliable data transfer flow control done

implementation of various link layer technologies

5 DataLink Layer 5-3

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-4

Link Layer IntroductionSome terminology hosts and routers are nodes communication channels

that connect adjacent nodes along communication path are links wired links wireless links LANs

layer-2 packet is a frame encapsulates datagram

ldquolinkrdquo

data-link layer has responsibility of transferring datagram from one node to adjacent node over a link

5 DataLink Layer 5-5

Link layer context

Datagram transferred by different link protocols over different links eg Ethernet on first

link frame relay on intermediate links 80211 on last link

Each link protocol provides different services eg may or may not

provide rdt over link

transportation analogy trip from Burnaby to

Lausanne Switzerland limo Burnaby to YVR plane YVR to Geneva train Geneva to

Lausanne

tourist = datagram transport segment =

communication link transportation mode =

link layer protocol travel agent = routing

algorithm

5 DataLink Layer 5-6

Link Layer Services Framing link access

encapsulate datagram into frame adding header trailer

channel access if shared medium ldquoMACrdquo addresses used in frame headers to identify

source dest bull different from IP address

Reliable delivery between adjacent nodes we learned how to do this already (chapter 3) seldom used on low bit error link (fiber some twisted

pair) wireless links high error rates

bull Q why both link-level and end-end reliabilitybull LL local correction (bet adjacent nodes) fasterbull e-2-e is still needed because not all LL protocols

provide reliability

5 DataLink Layer 5-7

Link Layer Services (more) Flow Control

pacing between adjacent sending and receiving nodes

Error Detection errors caused by signal attenuation noise receiver detects presence of errors

bull signals sender for retransmission or drops frame

Error Correction receiver identifies and corrects bit error(s) without

resorting to retransmission

Half-duplex and full-duplex with half duplex nodes at both ends of link can

transmit but not at same time

5 DataLink Layer 5-8

Adaptors Communicating

link layer implemented in ldquoadaptorrdquo (aka NIC) Ethernet card PCMCI card

80211 card

sending side encapsulates datagram in

a frame adds error checking bits

rdt flow control etc

receiving side looks for errors rdt flow

control etc extracts datagram

passes to rcving node

adapter is semi-autonomous

link amp physical layers

sendingnode

frame

rcvingnode

datagram

frame

adapter adapter

link layer protocol

5 DataLink Layer 5-9

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 2: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-2

Chapter 5 The Data Link LayerOur goals

understand principles behind data link layer services error detection correction sharing a broadcast channel multiple access link layer addressing reliable data transfer flow control done

implementation of various link layer technologies

5 DataLink Layer 5-3

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-4

Link Layer IntroductionSome terminology hosts and routers are nodes communication channels

that connect adjacent nodes along communication path are links wired links wireless links LANs

layer-2 packet is a frame encapsulates datagram

ldquolinkrdquo

data-link layer has responsibility of transferring datagram from one node to adjacent node over a link

5 DataLink Layer 5-5

Link layer context

Datagram transferred by different link protocols over different links eg Ethernet on first

link frame relay on intermediate links 80211 on last link

Each link protocol provides different services eg may or may not

provide rdt over link

transportation analogy trip from Burnaby to

Lausanne Switzerland limo Burnaby to YVR plane YVR to Geneva train Geneva to

Lausanne

tourist = datagram transport segment =

communication link transportation mode =

link layer protocol travel agent = routing

algorithm

5 DataLink Layer 5-6

Link Layer Services Framing link access

encapsulate datagram into frame adding header trailer

channel access if shared medium ldquoMACrdquo addresses used in frame headers to identify

source dest bull different from IP address

Reliable delivery between adjacent nodes we learned how to do this already (chapter 3) seldom used on low bit error link (fiber some twisted

pair) wireless links high error rates

bull Q why both link-level and end-end reliabilitybull LL local correction (bet adjacent nodes) fasterbull e-2-e is still needed because not all LL protocols

provide reliability

5 DataLink Layer 5-7

Link Layer Services (more) Flow Control

pacing between adjacent sending and receiving nodes

Error Detection errors caused by signal attenuation noise receiver detects presence of errors

bull signals sender for retransmission or drops frame

Error Correction receiver identifies and corrects bit error(s) without

resorting to retransmission

Half-duplex and full-duplex with half duplex nodes at both ends of link can

transmit but not at same time

5 DataLink Layer 5-8

Adaptors Communicating

link layer implemented in ldquoadaptorrdquo (aka NIC) Ethernet card PCMCI card

80211 card

sending side encapsulates datagram in

a frame adds error checking bits

rdt flow control etc

receiving side looks for errors rdt flow

control etc extracts datagram

passes to rcving node

adapter is semi-autonomous

link amp physical layers

sendingnode

frame

rcvingnode

datagram

frame

adapter adapter

link layer protocol

5 DataLink Layer 5-9

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 3: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-3

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-4

Link Layer IntroductionSome terminology hosts and routers are nodes communication channels

that connect adjacent nodes along communication path are links wired links wireless links LANs

layer-2 packet is a frame encapsulates datagram

ldquolinkrdquo

data-link layer has responsibility of transferring datagram from one node to adjacent node over a link

5 DataLink Layer 5-5

Link layer context

Datagram transferred by different link protocols over different links eg Ethernet on first

link frame relay on intermediate links 80211 on last link

Each link protocol provides different services eg may or may not

provide rdt over link

transportation analogy trip from Burnaby to

Lausanne Switzerland limo Burnaby to YVR plane YVR to Geneva train Geneva to

Lausanne

tourist = datagram transport segment =

communication link transportation mode =

link layer protocol travel agent = routing

algorithm

5 DataLink Layer 5-6

Link Layer Services Framing link access

encapsulate datagram into frame adding header trailer

channel access if shared medium ldquoMACrdquo addresses used in frame headers to identify

source dest bull different from IP address

Reliable delivery between adjacent nodes we learned how to do this already (chapter 3) seldom used on low bit error link (fiber some twisted

pair) wireless links high error rates

bull Q why both link-level and end-end reliabilitybull LL local correction (bet adjacent nodes) fasterbull e-2-e is still needed because not all LL protocols

provide reliability

5 DataLink Layer 5-7

Link Layer Services (more) Flow Control

pacing between adjacent sending and receiving nodes

Error Detection errors caused by signal attenuation noise receiver detects presence of errors

bull signals sender for retransmission or drops frame

Error Correction receiver identifies and corrects bit error(s) without

resorting to retransmission

Half-duplex and full-duplex with half duplex nodes at both ends of link can

transmit but not at same time

5 DataLink Layer 5-8

Adaptors Communicating

link layer implemented in ldquoadaptorrdquo (aka NIC) Ethernet card PCMCI card

80211 card

sending side encapsulates datagram in

a frame adds error checking bits

rdt flow control etc

receiving side looks for errors rdt flow

control etc extracts datagram

passes to rcving node

adapter is semi-autonomous

link amp physical layers

sendingnode

frame

rcvingnode

datagram

frame

adapter adapter

link layer protocol

5 DataLink Layer 5-9

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 4: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-4

Link Layer IntroductionSome terminology hosts and routers are nodes communication channels

that connect adjacent nodes along communication path are links wired links wireless links LANs

layer-2 packet is a frame encapsulates datagram

ldquolinkrdquo

data-link layer has responsibility of transferring datagram from one node to adjacent node over a link

5 DataLink Layer 5-5

Link layer context

Datagram transferred by different link protocols over different links eg Ethernet on first

link frame relay on intermediate links 80211 on last link

Each link protocol provides different services eg may or may not

provide rdt over link

transportation analogy trip from Burnaby to

Lausanne Switzerland limo Burnaby to YVR plane YVR to Geneva train Geneva to

Lausanne

tourist = datagram transport segment =

communication link transportation mode =

link layer protocol travel agent = routing

algorithm

5 DataLink Layer 5-6

Link Layer Services Framing link access

encapsulate datagram into frame adding header trailer

channel access if shared medium ldquoMACrdquo addresses used in frame headers to identify

source dest bull different from IP address

Reliable delivery between adjacent nodes we learned how to do this already (chapter 3) seldom used on low bit error link (fiber some twisted

pair) wireless links high error rates

bull Q why both link-level and end-end reliabilitybull LL local correction (bet adjacent nodes) fasterbull e-2-e is still needed because not all LL protocols

provide reliability

5 DataLink Layer 5-7

Link Layer Services (more) Flow Control

pacing between adjacent sending and receiving nodes

Error Detection errors caused by signal attenuation noise receiver detects presence of errors

bull signals sender for retransmission or drops frame

Error Correction receiver identifies and corrects bit error(s) without

resorting to retransmission

Half-duplex and full-duplex with half duplex nodes at both ends of link can

transmit but not at same time

5 DataLink Layer 5-8

Adaptors Communicating

link layer implemented in ldquoadaptorrdquo (aka NIC) Ethernet card PCMCI card

80211 card

sending side encapsulates datagram in

a frame adds error checking bits

rdt flow control etc

receiving side looks for errors rdt flow

control etc extracts datagram

passes to rcving node

adapter is semi-autonomous

link amp physical layers

sendingnode

frame

rcvingnode

datagram

frame

adapter adapter

link layer protocol

5 DataLink Layer 5-9

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 5: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-5

Link layer context

Datagram transferred by different link protocols over different links eg Ethernet on first

link frame relay on intermediate links 80211 on last link

Each link protocol provides different services eg may or may not

provide rdt over link

transportation analogy trip from Burnaby to

Lausanne Switzerland limo Burnaby to YVR plane YVR to Geneva train Geneva to

Lausanne

tourist = datagram transport segment =

communication link transportation mode =

link layer protocol travel agent = routing

algorithm

5 DataLink Layer 5-6

Link Layer Services Framing link access

encapsulate datagram into frame adding header trailer

channel access if shared medium ldquoMACrdquo addresses used in frame headers to identify

source dest bull different from IP address

Reliable delivery between adjacent nodes we learned how to do this already (chapter 3) seldom used on low bit error link (fiber some twisted

pair) wireless links high error rates

bull Q why both link-level and end-end reliabilitybull LL local correction (bet adjacent nodes) fasterbull e-2-e is still needed because not all LL protocols

provide reliability

5 DataLink Layer 5-7

Link Layer Services (more) Flow Control

pacing between adjacent sending and receiving nodes

Error Detection errors caused by signal attenuation noise receiver detects presence of errors

bull signals sender for retransmission or drops frame

Error Correction receiver identifies and corrects bit error(s) without

resorting to retransmission

Half-duplex and full-duplex with half duplex nodes at both ends of link can

transmit but not at same time

5 DataLink Layer 5-8

Adaptors Communicating

link layer implemented in ldquoadaptorrdquo (aka NIC) Ethernet card PCMCI card

80211 card

sending side encapsulates datagram in

a frame adds error checking bits

rdt flow control etc

receiving side looks for errors rdt flow

control etc extracts datagram

passes to rcving node

adapter is semi-autonomous

link amp physical layers

sendingnode

frame

rcvingnode

datagram

frame

adapter adapter

link layer protocol

5 DataLink Layer 5-9

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 6: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-6

Link Layer Services Framing link access

encapsulate datagram into frame adding header trailer

channel access if shared medium ldquoMACrdquo addresses used in frame headers to identify

source dest bull different from IP address

Reliable delivery between adjacent nodes we learned how to do this already (chapter 3) seldom used on low bit error link (fiber some twisted

pair) wireless links high error rates

bull Q why both link-level and end-end reliabilitybull LL local correction (bet adjacent nodes) fasterbull e-2-e is still needed because not all LL protocols

provide reliability

5 DataLink Layer 5-7

Link Layer Services (more) Flow Control

pacing between adjacent sending and receiving nodes

Error Detection errors caused by signal attenuation noise receiver detects presence of errors

bull signals sender for retransmission or drops frame

Error Correction receiver identifies and corrects bit error(s) without

resorting to retransmission

Half-duplex and full-duplex with half duplex nodes at both ends of link can

transmit but not at same time

5 DataLink Layer 5-8

Adaptors Communicating

link layer implemented in ldquoadaptorrdquo (aka NIC) Ethernet card PCMCI card

80211 card

sending side encapsulates datagram in

a frame adds error checking bits

rdt flow control etc

receiving side looks for errors rdt flow

control etc extracts datagram

passes to rcving node

adapter is semi-autonomous

link amp physical layers

sendingnode

frame

rcvingnode

datagram

frame

adapter adapter

link layer protocol

5 DataLink Layer 5-9

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 7: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-7

Link Layer Services (more) Flow Control

pacing between adjacent sending and receiving nodes

Error Detection errors caused by signal attenuation noise receiver detects presence of errors

bull signals sender for retransmission or drops frame

Error Correction receiver identifies and corrects bit error(s) without

resorting to retransmission

Half-duplex and full-duplex with half duplex nodes at both ends of link can

transmit but not at same time

5 DataLink Layer 5-8

Adaptors Communicating

link layer implemented in ldquoadaptorrdquo (aka NIC) Ethernet card PCMCI card

80211 card

sending side encapsulates datagram in

a frame adds error checking bits

rdt flow control etc

receiving side looks for errors rdt flow

control etc extracts datagram

passes to rcving node

adapter is semi-autonomous

link amp physical layers

sendingnode

frame

rcvingnode

datagram

frame

adapter adapter

link layer protocol

5 DataLink Layer 5-9

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 8: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-8

Adaptors Communicating

link layer implemented in ldquoadaptorrdquo (aka NIC) Ethernet card PCMCI card

80211 card

sending side encapsulates datagram in

a frame adds error checking bits

rdt flow control etc

receiving side looks for errors rdt flow

control etc extracts datagram

passes to rcving node

adapter is semi-autonomous

link amp physical layers

sendingnode

frame

rcvingnode

datagram

frame

adapter adapter

link layer protocol

5 DataLink Layer 5-9

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 9: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-9

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 10: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-10

Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking may include header fields

bull Error detection is not 100 reliablebull protocol may miss some errors but rarelybull larger EDC field yields better detection and correction

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 11: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-11

Error Detection Parity CheckingSingle Bit ParityDetect single bit errors

Two Dimensional Bit ParityDetect and correct single bit errors

0 0

Need to detect more errors with fewer bits

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 12: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-12

Internet checksum

Sender treat segment contents

as sequence of 16-bit integers

checksum addition (1rsquos complement sum) of segment contents

sender puts checksum value into UDP checksum field

Receiver compute checksum of

received segment check if computed checksum

equals checksum field value NO - error detected YES - no error detected

But maybe errors nonetheless

Goal detect ldquoerrorsrdquo (eg flipped bits) in transmitted segment (note used at transport layer only)

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 13: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-13

Cyclic Redundancy Check (CRC) Goal Maximize probability of detecting errors using a

small number of redundant bits

E g CRC-32 used in many protocolsbull uses only 32 bits and detects most of errors in messages

thousands of bytes long

CRC is based on a branch of mathematics called Finite Fields We will cover only the basic ideas here

Represent a message D of length d+1 bits as a polynomial of degree d

10011010 D(x) = x7 + 0 + 0 + x4 + x3 + 0 + x1 + 0 = x7 + x4 + x3 + x1

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 14: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-14

CRC basic idea Sender and receiver agree on a divisor

polynomial G(x) of degree r Sender transmits T(x) which consists

of d+1 data bits AND r redundant bits such that G(x)|T(x) ie the remainder of dividing T(x) by G(x) is

0 Receiver gets Trsquo(x) which may have

corrupted bitsbull If G(x) | Trsquo(x) then no errors occurred

d+1 bits r bits

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 15: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-15

CRC

Notes on polynomial arithmetic modulo-2

Any B(x) can be divided by C(x) if degree of B(x) gt= degree of C(x)

Remainder of B(x)C(x) is obtained by subtracting C(x) from B(x)

Subtraction (and addition) is the same as XORing

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 16: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-16

CRC

How does sender make G(x) | T(x)

Multiply D(x) by xr let T(x) be the result performed as shift left r bits

Divide T(x) by G(x) and find remainder

Subtract remainder from T(x) performed as XOR

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 17: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-17

CRC Example

msg D 101110 G 1001 R T

Let us work it out

R = 011

T = 101110 011

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 18: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-18

CRC

How can we choose G(x) Let E(x) be errors added to message Received message is T(x) + E(x) Need G(x) that is unlikely divides T(x) + E(x) We know G(x) | T(x) we need G(x) that is

unlikely to divide E(x) for common types of errors

Example common error single bit error E(x) = xi

How would you choose G(x) to detect that error Set first and last bit of G(x) to be 1

E(x) G(x) ne 0 for any position I

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 19: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-19

CRC

Widely used G(x) functions can handle many other types of errors Burst of errors lt= r Any odd number of errors All double-bit errors

CRC is efficiently implemented in hardware

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 20: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-20

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 21: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-21

Multiple Access Links and ProtocolsTwo types of ldquolinksrdquo point-to-point

Single sender and single receiver Eg dial-up links point-to-point protocol (PPP)

broadcast (shared wire or medium) Multiple senders and multiple receivers Eg traditional Ethernet 80211 wireless LAN need Multiple Access protocol (MAC)

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 22: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-22

Multiple Access protocols Two or more simultaneous transmissions on a

shared channel interference (collision) Collision node receives two or more signals at the

same time

Multiple Access (MAC) protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 23: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-23

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 When one node wants to transmit it can send

at rate R

2 When M nodes want to transmit each can send at average rate RM

3 Fully decentralized no special node to coordinate transmissions no synchronization of clocks in nodes

4 Simple to implement

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 24: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-24

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use

Random Access channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo Nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 25: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-25

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each node gets fixed length slot in each round

Slot length = pkt trans time

example 6-node LAN Nodes 134 have pkt slots 256 idle

Cons unused slots go idle channel under-utilization in light load scenarios

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 26: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-26

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle

frequ

ency

bands time

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 27: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-27

Random Access Protocols When node has packet to send

transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions)

Examples of random access MAC protocols slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 28: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-28

Slotted ALOHA

Assumptions all frames same size time is divided into

equal size slots time to transmit 1 frame

nodes start to transmit frames only at beginning of slots

nodes are synchronized if 2 or more nodes

transmit in slot all nodes detect collision

Operation when node obtains fresh

frame it transmits in next slot

no collision node can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 29: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-29

Slotted ALOHA

Pros single active node can

continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

very simple

Cons collisions wasting

slots idle slots clock

synchronization

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 30: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-30

Efficiency of Slotted Aloha Efficiency (E) is the fraction of successful slots

in the long run when there are many nodes each with many frames to send

Suppose N nodes each transmits in a slot with probability p Determine max efficiency E

Let us work it out prob that a given node (say 1) has success in a

slot = p(1-p)N-1

prob that any node has a success = E = N p(1-p)N-1

Find p that maximizes E = Np(1-p)N-1

Differentiate p = 1N E = (1 - 1N)N-1

As N infin E lt= 1e = 037

Channel used for useful transmissions lt= 37 of time

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 31: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-31

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately

collision probability increases frame sent at t0 collides with other frames sent in [t0-

1t0+1]

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 32: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-32

Pure Aloha efficiencyP(success by given node) = P(node transmits) x

P(no other node transmits in [t0-1t0] x P(no other node transmits in [t0t0+1]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

E = N p (1-p)2(N-1)

choosing optimum p and letting N infin we get

E = 1(2e) = 018

Even worse

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 33: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-33

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmit

If channel sensed idle transmit entire frame

If channel sensed busy defer transmission

Human analogy donrsquot interrupt others

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 34: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-34

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 35: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-35

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage

collision detection easy in wired LANs measure signal strengths

compare transmitted received signals difficult in wireless LANs receiver shut off while

transmitting

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 36: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-36

CSMACD collision detection

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 37: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-37

ldquoTaking Turnsrdquo MAC protocolschannel partitioning MAC protocols

share channel efficiently and fairly at high load

inefficient at low load delay in channel access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 38: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-38

ldquoTaking Turnsrdquo MAC protocolsPolling master node

ldquoinvitesrdquo slave nodes to transmit in turn

concerns polling overhead latency single point of

failure (master)

Token passing control token passed from

one node to next sequentially node gets token sends a

msg concerns

token overhead latency single point of failure (token)

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 39: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-39

Summary of MAC protocols What do you do with a shared media

Channel Partitioning by time frequency or code

bull Time Division Frequency Division Random partitioning (dynamic)

bull ALOHA S-ALOHA CSMA CSMACDbull carrier sensing easy in some technologies (wire)

hard in others (wireless)bull CSMACD used in Ethernetbull CSMACA used in 80211

Taking Turnsbull polling from a central site token passing

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 40: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-40

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 41: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-41

MAC Addresses

32-bit IP address network-layer address used to get datagram to destination IP subnet

MAC (or LAN or physical or Ethernet) address used to get frame from one interface to

another physically-connected interface (same network)

48 bit MAC address (for most LANs) burned in the adapter ROM

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 42: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-42

MAC AddressEach adapter on LAN has unique LAN address

Broadcast address =FF-FF-FF-FF-FF-FF

= adapter

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN(wired orwireless)

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 43: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-43

MAC Address (more)

MAC address allocation administered by IEEE manufacturer buys portion of MAC address

space (to assure uniqueness) Analogy (a) MAC address like Social Insurance

Number (b) IP address like postal address MAC flat address portability

can move LAN card from one LAN to another

IP hierarchical address NOT portable depends on IP subnet to which node is attached

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 44: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-44

MAC and IP addresses Why do we have TWO addresses (IPMAC)

Do we have to have MAC addresses Yes we must have both

To allow different network-layer protocols over same card (eg IP Novell IPX DECnet)

Enable flexibility mobility of cards

Efficiency imagine that nodes have only IP addresses ALL packets sent over LAN will be forwarded by NIC to the IP layer too many useless interrupts

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 45: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-45

ARP Address Resolution Protocol

Each IP node (Host Router) on LAN has ARP table

ARP Table IPMAC address mappings for some LAN nodes

lt IP address MAC address TTLgt

TTL (Time To Live) time after which address mapping will be forgotten (typically 20 min)

ARP determines MAC address of node given its IP address

1A-2F-BB-76-09-AD

58-23-D7-FA-20-B0

0C-C4-11-6F-E3-98

71-65-F7-2B-08-53

LAN

237196723

237196778

237196714

237196788

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 46: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-46

ARP protocol Same LAN (network) A wants to send datagram

to B and Brsquos MAC address not in Arsquos ARP table

A broadcasts ARP query packet containing Bs IP address Dest MAC address = FF-

FF-FF-FF-FF-FF all machines on LAN

receive ARP query B receives ARP packet

replies to A with its (Bs) MAC address frame sent to Arsquos MAC

address (unicast)

A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state information

that times out (goes away) unless refreshed

ARP is ldquoplug-and-playrdquo nodes create their ARP

tables without intervention from net administrator

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 47: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-47

Routing to another LANwalkthrough send datagram from A to B via R assume A knows Brsquos IP address

Two ARP tables in router R one for each IP network (LAN)

In routing table at source Host find router 111111111110 In ARP table at source find MAC address E6-E9-00-17-BB-4B etc

A

RB

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 48: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-48

Detailed steps A creates datagram with source A destination B A uses ARP to get Rrsquos MAC address for 111111111110 A creates link-layer frame with Rs MAC address as dest

frame contains A-to-B IP datagram Arsquos adapter sends frame Rrsquos adapter receives frame R removes IP datagram from Ethernet frame sees its

destined to B R uses ARP to get Brsquos MAC address R creates frame containing A-to-B IP datagram sends to B

Routing to another LAN (contrsquod)

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 49: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-49

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 50: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-50

Ethernet

ldquodominantrdquo wired LAN technology cheap $20 for 100Mbs first widely used LAN technology Simpler cheaper than token LANs and ATM Kept up with speed race 10 Mbps ndash 10 Gbps

Metcalfersquos Ethernetsketch

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 51: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-51

Star topology

Bus topology popular through mid 90s Now star topology prevails Connection choices hub or switch (more later)

hub orswitch

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 52: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-52

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver sender clock

rates

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 53: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-53

Ethernet Frame Structure (more) Addresses 6 bytes

if adapter receives frame with matching destination address or with broadcast address (eg ARP packet) it passes data in frame to net-layer protocol

otherwise adapter discards frame

Type indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk)

CRC checked at receiver if error is detected the frame is simply dropped

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 54: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-54

Unreliable connectionless service Connectionless No handshaking between

sending and receiving adapter Unreliable receiving adapter doesnrsquot send

acks or nacks to sending adapter stream of datagrams passed to network layer can

have gaps gaps will be filled if app is using TCP otherwise app will see the gaps

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 55: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-55

Ethernet uses CSMACD

No slots adapter doesnrsquot

transmit if it senses that some other adapter is transmitting that is carrier sense

transmitting adapter aborts when it senses that another adapter is transmitting that is collision detection

Before attempting a retransmission adapter waits a random time that is random access

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 56: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-56

Ethernet CSMACD algorithm

1 Adaptor receives datagram from net layer amp creates frame

2 If adapter senses channel idle it starts to transmit frame If it senses channel busy waits until channel idle and then transmits

3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame

4 If adapter detects another transmission while transmitting aborts and sends jam signal

5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 57: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-57

Ethernetrsquos CSMACD (more)

Jam Signal make sure all other transmitters are aware of collision 48 bits

Bit time 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec

Exponential Backoff Goal adapt retransmission

attempts to estimated current load heavy load random wait

will be longer first collision choose K

from 01 delay is K 512 bit transmission times

after second collision choose K from 0123hellip

after ten collisions choose K from 01234hellip1023

Seeinteract with Javaapplet on AWL Web sitehighly recommended

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 58: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-58

CSMACD efficiency

Tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA but still decentralized simple and cheap

transprop tt 51

1efficiency

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 59: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-59

10BaseT and 100BaseT 10100 Mbps rate latter called ldquofast ethernetrdquo T stands for Twisted Pair Nodes connect to a hub ldquostar topologyrdquo 100

m max distance between nodes and hub

twisted pair

hub

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 60: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-60

HubsHubs are essentially physical-layer repeaters

bits coming from one link go out all other links at the same rate no frame buffering no CSMACD at hub adapters detect collisions provides net management functionality

twisted pair

hub

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 61: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-61

Manchester encoding

Used in 10BaseT Each bit has a transition Allows clocks in sending and receiving nodes to

synchronize to each other no need for a centralized global clock among nodes

Hey this is physical-layer stuff

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 62: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-62

Gbit Ethernet

uses standard Ethernet frame format allows for point-to-point links and shared

broadcast channels in shared mode CSMACD is used short

distances between nodes required for efficiency

uses hubs called here ldquoBuffered Distributorsrdquo Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 63: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-63

Commercial Add

The following is a paid slide

Intended for senior students who have passion for networking

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 64: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-64

CMPT 408 in Fall 06

Deeper understanding of network protocols Performance modeling and analysis More interesting topics

Wireless networking Network security Multimedia networking Quality of Service

Very hands-on (C and Java) Implement your OWN IP router More socket programming Video streaming application

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 65: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-65

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Interconnections Hubs and switches

57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 66: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-66

Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large

collision domain Canrsquot interconnect 10BaseT amp 100BaseT

hub

hubhub

hub

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 67: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-67

Switch

Link layer device stores and forwards Ethernet frames examines frame header and selectively

forwards frame based on MAC dest address when frame is to be forwarded on segment

uses CSMACD to access segment transparent

hosts are unaware of presence of switches plug-and-play self-learning

switches do not need to be configured

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 68: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-68

Forwarding

bull How to determine onto which LAN segment to forward framebull Looks like a routing problem

hub

hubhub

switch1

2 3

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 69: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-69

Self learning

A switch has a switch table entry in switch table

(MAC Address Interface Time Stamp) stale entries in table dropped (TTL can be 60

min) switch learns which hosts can be reached through

which interfaces when frame received switch ldquolearnsrdquo location

of sender incoming LAN segment records senderlocation pair in switch table

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 70: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-70

FilteringForwardingWhen switch receives a frame

index switch table using MAC dest addressif entry found for destination

then if dest on segment from which frame arrived

then drop the frame else forward the frame on interface indicated else flood

forward on all but the interface on which the frame arrived

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 71: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-71

Switch example

Suppose C sends frame to D

Switch receives frame from C destined to D notes in switch table that C is on interface 1 because D is not in table switch forwards frame into

interfaces 2 and 3

frame received by D

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEG

1123

12 3

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 72: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-72

Switch example

Suppose D replies back with frame to C

Switch receives frame from D destined to C notes in bridge table that D is on interface 2 because C is in table switch forwards frame only to

interface 1

frame received by C

hub

hub hub

switch

A

B CD

EF

G H

I

address interface

ABEGC

11231

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 73: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-73

Switch traffic isolation switch installation breaks subnet into LAN

segments switch filters packets

same-LAN-segment frames not usually forwarded onto other LAN segments

segments become separate collision domains

hub hub hub

switch

collision domain collision domain

collision domain

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 74: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-74

Switches dedicated access Switch with many

interfaces Hosts have direct

connection to switch No collisions full duplex

Switching A-to-Arsquo and B-to-Brsquo simultaneously no collisions

switch

A

Arsquo

B

Brsquo

C

Crsquo

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 75: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-75

More on Switches

cut-through switching frame forwarded from input to output port without first collecting entire frameslight reduction in latency

combinations of shareddedicated 101001000 Mbps interfaces

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 76: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-76

Institutional network

hub

hubhub

switch

to externalnetwork

router

IP subnet

mail server

web server

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 77: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-77

Switches vs Routers both store-and-forward devices

Routers network layer devices Switches link layer devices faster processing

Routers maintain routing tables implement routing algorithms handle complex topologies find efficient paths

Switches maintain switch tables implement learning algorithms handle simpler (spanning tree) topologies paths may not be optimal

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 78: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-78

Summary comparison

hubs routers switches

traffi c isolation

no yes yes

plug amp play yes no yes

optimal routing

no yes no

cut through

yes no yes

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 79: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-79

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 80: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-80

Point to Point Data Link Control one sender one receiver one link easier than

broadcast link no Media Access Control no need for explicit MAC addressing eg dialup link ISDN line

popular point-to-point DLC protocols PPP (point-to-point protocol) HDLC High level data link control

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 81: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-81

PPP Design Requirements [RFC 1557] packet framing encapsulation of network-layer

datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency must carry any bit pattern in the data field

error detection (no correction) connection liveness detect signal link failure to

network layer network layer address negotiation endpoint can

learnconfigure each otherrsquos network address

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 82: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-82

PPP non-requirements

no error correctionrecovery no flow control out of order delivery OK no need to support multipoint links (eg

polling)

Error recovery flow control data re-ordering all relegated to higher layers

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 83: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-83

PPP Data Frame

Flag delimiter (framing) Address does nothing (only one option) Control does nothing in the future possible

multiple control fields Protocol upper layer protocol to which frame

delivered (eg PPP-LCP IP IPCP etc)

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 84: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-84

PPP Data Frame

info upper layer data being carried check cyclic redundancy check for error

detection

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 85: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-85

Byte Stuffing ldquodata transparencyrdquo requirement data field

must be allowed to include flag pattern lt01111110gt Q is received lt01111110gt data or flag

Sender adds (ldquostuffsrdquo) extra lt 01111110gt byte after each lt 01111110gt data byte

Receiver two 01111110 bytes in a row discard first

byte continue data reception single 01111110 flag byte

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 86: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-86

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 87: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-87

PPP Data Control ProtocolBefore exchanging network-

layer data data link peers must

configure PPP link (max frame length authentication)

learnconfigure network layer information

for IP carry IP Control Protocol (IPCP) msgs (protocol field 8021) to configurelearn IP address

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 88: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-88

Link Layer

51 Introduction and services

52 Error detection and correction

53Multiple access protocols

54 Link-Layer Addressing

55 Ethernet

56 Hubs and switches 57 PPP 58 Link Virtualization

ATM and MPLS

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 89: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-89

Virtualization of networks

Virtualization of resources a powerful abstraction in systems engineering

computing examples virtual memory virtual devices Virtual machines eg java IBM VM os from 1960rsquos70rsquos

layering of abstractions donrsquot sweat the details of the lower layer only deal with lower layers abstractly

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 90: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-90

The Internet virtualizing networks

1974 multiple unconnected nets ARPAnet data-over-cable networks packet satellite network (Aloha) packet radio network

hellip differing in addressing conventions packet formats error recovery routing

ARPAnet satellite netA Protocol for Packet Network Intercommunication V Cerf R Kahn IEEE Transactions on Communications May 1974 pp 637-648

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 91: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-91

The Internet virtualizing networks

ARPAnet satellite net

gateway

Internetwork layer (IP) addressing internetwork

appears as a single uniform entity despite underlying local network heterogeneity

network of networks

Gateway ldquoembed internetwork packets

in local packet format or extract themrdquo

route (at internetwork level) to next gateway

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 92: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-92

Cerf amp Kahnrsquos Internetwork ArchitectureWhat is virtualized two layers of addressing internetwork and

local network new layer (IP) makes everything homogeneous

at internetwork layer underlying local network technology

cable satellite 56K telephone modem today ATM MPLS

hellip ldquoinvisiblerdquo at internetwork layer Looks like a link layer technology to IP

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 93: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-93

ATM and MPLS

ATM MPLS separate networks in their own right different service models addressing routing

from Internet viewed by Internet as logical link

connecting IP routers just like dialup link is really part of separate

network (telephone network) ATM MPSL of technical interest in their

own right

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 94: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-94

Asynchronous Transfer Mode ATM 1990rsquos00 standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal integrated end-end transport of voice video data meeting timingQoS requirements of voice

video (versus Internet best-effort model) ldquonext generationrdquo telephony technical roots

in telephone world packet-switching (fixed length packets called

ldquocellsrdquo) using virtual circuits

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 95: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-95

ATM architecture

adaptation layer only at edge of ATM network data segmentationreassembly roughly analogous to Internet transport layer

ATM layer ldquonetworkrdquo layer cell switching routing

physical layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 96: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-96

ATM network or link layerVision end-to-end

transport ldquoATM from desktop to desktoprdquo ATM is a network

technology

Reality used to connect IP backbone routers ldquoIP over ATMrdquo ATM as switched

link layer connecting IP routers

ATMnetwork

IPnetwork

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 97: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-97

IP-Over-ATMClassic IP only 3 ldquonetworksrdquo (eg LAN segments) MAC (8023) and IP addresses

IP over ATM replace ldquonetworkrdquo

(eg LAN segment) with ATM network

ATM addresses IP addresses

ATMnetwork

EthernetLANs

EthernetLANs

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 98: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-98

IP-Over-ATM

AALATMphyphy

Eth

IP

ATMphy

ATMphy

apptransport

IPAALATMphy

apptransport

IPEthphy

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 99: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-99

Datagram Journey in IP-over-ATM Network at Source Host

IP layer maps between IP ATM dest address (using ATMARP)

passes datagram to AAL AAL encapsulates data segments cells passes to ATM layer

ATM network moves cell along VC to destination

at Destination Host AAL5 reassembles cells into original datagram if CRC OK datagram is passed to IP

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary
Page 100: 5: DataLink Layer5-1 School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 5: Data Link Layer

5 DataLink Layer 5-100

Chapter 5 Summary data link layer services

error detection correction sharing a broadcast channel multiple access link layer addressing

various link layer technologies Ethernet (IEEE 8023 CSMACD) switched LANS PPP virtualized networks as a link layer ATM

MPLS

  • School of Computing Science Simon Fraser University
  • Chapter 5 The Data Link Layer
  • Link Layer
  • Link Layer Introduction
  • Link layer context
  • Link Layer Services
  • Link Layer Services (more)
  • Adaptors Communicating
  • Slide 9
  • Error Detection
  • Error Detection Parity Checking
  • Internet checksum
  • Cyclic Redundancy Check (CRC)
  • CRC basic idea
  • CRC
  • Slide 16
  • CRC Example
  • Slide 18
  • Slide 19
  • Slide 20
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slide 29
  • Efficiency of Slotted Aloha
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • ldquoTaking Turnsrdquo MAC protocols
  • Slide 38
  • Summary of MAC protocols
  • Slide 40
  • MAC Addresses
  • MAC Address
  • MAC Address (more)
  • MAC and IP addresses
  • ARP Address Resolution Protocol
  • ARP protocol Same LAN (network)
  • Routing to another LAN
  • Routing to another LAN (contrsquod)
  • Slide 49
  • Ethernet
  • Star topology
  • Ethernet Frame Structure
  • Ethernet Frame Structure (more)
  • Unreliable connectionless service
  • Ethernet uses CSMACD
  • Ethernet CSMACD algorithm
  • Ethernetrsquos CSMACD (more)
  • CSMACD efficiency
  • 10BaseT and 100BaseT
  • Hubs
  • Manchester encoding
  • Gbit Ethernet
  • Slide 63
  • CMPT 408 in Fall 06
  • Slide 65
  • Interconnecting with hubs
  • Switch
  • Forwarding
  • Self learning
  • FilteringForwarding
  • Switch example
  • Slide 72
  • Switch traffic isolation
  • Switches dedicated access
  • More on Switches
  • Institutional network
  • Switches vs Routers
  • Summary comparison
  • Slide 79
  • Point to Point Data Link Control
  • PPP Design Requirements [RFC 1557]
  • PPP non-requirements
  • PPP Data Frame
  • Slide 84
  • Byte Stuffing
  • Slide 86
  • PPP Data Control Protocol
  • Slide 88
  • Virtualization of networks
  • The Internet virtualizing networks
  • Slide 91
  • Cerf amp Kahnrsquos Internetwork Architecture
  • ATM and MPLS
  • Asynchronous Transfer Mode ATM
  • ATM architecture
  • ATM network or link layer
  • IP-Over-ATM
  • Slide 98
  • Datagram Journey in IP-over-ATM Network
  • Chapter 5 Summary