computer networks medium access control lecture 12
TRANSCRIPT
1
Computer Networks
LECTURE 12
Link and Physical Layer, LANs
Sandhya Dwarkadas
Department of Computer Science
University of Rochester
Link layer services
Medium Access Control Error detection and correction Encoding
Framing
6-2Link Layer and LANs
An ideal multiple access protocol
Given: broadcast channel of rate R bps
Ideal:1. when one node wants to transmit, it can send at rate R.
2. when M nodes want to transmit, each can send at average rate R/M
3. fully decentralized:
• no special node to coordinate transmissions
• no synchronization of clocks, slots
4. simple
6-3Link Layer and LANs
MAC protocols: taxonomy
three broad classes:
channel partitioning• divide channel into smaller “pieces” (time slots, frequency, code)
• allocate piece to node for exclusive use
random access• channel not divided, allow collisions
• “recover” from collisions
“taking turns”• nodes take turns, but nodes with more to send can take longer
turns
6-4Link Layer and LANs
2
Channel partitioning MAC protocols: TDMA
TDMA: time division multiple access access to channel in "rounds" each station gets fixed length slot (length = packet
transmission time) in each round unused slots go idle example: 6-station LAN, 1,3,4 have packets to
send, slots 2,5,6 idle
1 3 4 1 3 4
6-slot
frame
6-slot
frame
6-5Link Layer and LANs
FDMA: frequency division multiple access channel spectrum divided into frequency bands
each station assigned fixed frequency band
unused transmission time in frequency bands go idle
example: 6-station LAN, 1,3,4 have packet to send, frequency bands 2,5,6 idle
frequency b
ands
FDM cable
Channel partitioning MAC protocols: FDMA
6-6Link Layer and LANs
10/13/2016 7
Channel Partitioning MAC protocols: C (code) DMA
use coding to partition channel
each user has its unique code encoded signal:
(original data) X (code) decoding: (encoded
signal) X (code)
inner product all codes consist of 1, -1
bits any bit sequence
multiplying itself becomes 1
10/13/2016 CSC 257/457 - Fall 2014 8
CDMA: Two-sender Interference
allow multiple users to transmit simultaneously (if code1 X code2 = 0---pairwise orthogonal).
combined signal is “data1 X code1 + data2 X code2”
3
Random access protocols
when node has packet to send• transmit at full channel data rate R.• no a priori coordination among nodes
two or more transmitting nodes ➜ “collision”, random access MAC protocol specifies:
• how to detect collisions• how to recover from collisions (e.g., via delayed
retransmissions)
examples of random access MAC protocols:• slotted ALOHA• ALOHA• CSMA, CSMA/CD, CSMA/CA
6-9Link Layer and LANs
“Taking turns” MAC protocols
channel partitioning MAC protocols: share channel efficiently and fairly at high load
inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node!
random access MAC protocols efficient at low load: single node can fully utilize
channel
high load: collision overhead
“taking turns” protocolslook for best of both worlds!
6-10Link Layer and LANs
polling: master node “invites”
slave nodes to transmit in turn
typically used with “dumb” slave devices
concerns:
• polling overhead
• latency
• single point of failure (master)
master
slaves
poll
data
data
“Taking turns” MAC protocols
6-11Link Layer and LANs
token passing: control token passed from
one node to next sequentially.
token message
concerns:
token overhead
latency
single point of failure (token)
T
data
(nothing
to send)
T
“Taking turns” MAC protocols
6-12Link Layer and LANs
4
cable headend
CMTS
ISP
cable modemtermination system
multiple 40Mbps downstream (broadcast) channels
single CMTS transmits into channels
multiple 30 Mbps upstream channels
multiple access: all users contend for certain upstream channel time slots (others assigned)
Cable access network
cablemodem
splitter
…
…
Internet frames, TV channels, control transmitted downstream at different frequencies
upstream Internet frames, TV control, transmitted upstream at different frequencies in time slots
6-13Link Layer and LANs
DOCSIS: data over cable service interface spec FDM over upstream, downstream frequency channels
TDM upstream: some slots assigned, some have contention
• downstream MAP frame: assigns upstream slots
• request for upstream slots (and data) transmitted random access (binary backoff) in selected slots
MAP frame for
Interval [t1, t2]
Residences with cable modems
Downstream channel i
Upstream channel j
t1 t2
Assigned minislots containing cable modem
upstream data frames
Minislots containing
minislots request frames
cable headend
CMTS
Cable access network
6-14Link Layer and LANs
Summary of MAC protocols
channel partitioning, by time, frequency or code• Time Division, Frequency Division
random access (dynamic),
• ALOHA, S-ALOHA, CSMA, CSMA/CD
• carrier sensing: easy in some technologies (wire), hard in others (wireless)
• CSMA/CD used in Ethernet
• CSMA/CA used in 802.11
taking turns
• polling from central site, token passing
• Bluetooth, FDDI, token ring
6-15Link Layer and LANs10/13/2016 16
Encoding
Signals propagate over a physical medium
modulate electromagnetic waves
e.g., vary power
Encode binary data onto signals
e.g., positive voltage as 1 and negative voltage as 0
Also known as Non-Return to Zero (NRZ)
Bits
High-Low
0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
5
10/13/2016 17
Problem with Consecutive 1s or 0s
Clock synchronization both the sender and the receiver maintains a clock
clock synchronized at signal change
Bits
High-Low
Clock
0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
10/13/2016 18
An Alternative Encoding
Transition encoding make a transition from current signal to encode a one; stay at
current signal to encode a zero
only solves the problem of consecutive ones
Bits
High-Low
Transition
0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
10/13/2016 19
Manchester Encoding
Bits
High-Low
Manchester
Transition
0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
Manchester encode 0 into low-to-high transition; encode 1 into high-to-low
transition.
only 50% efficient.
10/13/2016 20
4B/5B Encoding
every 4 bits of data encoded in a 5-bit code
since there are more 5-bit codes than 4-bit data; some codes are not used; we can design a mapping/encoding such that no data is encoded into 5-bit code with more than one leading 0 or more than two trailing 0s
thus, never get more than three consecutive 0s
resulting 5-bit codes are transmitted using the transition encoding
efficiency? 80%
6
10/13/2016 21
Where does each frame begin and end?
Sentinel-based framing delineate frame with special begin/end patterns
e.g.,
problem: end pattern appears in the payload solution: bit stuffing
for pattern 01111110:
Sender – insert 0 after five consecutive 1s
Receiver – delete 0 that follows five consecutive 1s
similar to escape characters in program languages
Header Body
8 16 16 8
EDCBeginningsequence
Endingsequence
10/13/2016 22
Where does each frame begin and end?
Counter-based framing include payload length in header
Link layer, LANs: outline
6.1 introduction, services
6.2 error detection, correction
6.3 multiple access protocols
6.4 LANs• addressing, ARP
• Ethernet
• switches
• VLANS
6.5 link virtualization: MPLS
6.6 data center networking
6.7 a day in the life of a web request
6-23Link Layer and LANs
MAC addresses and ARP
32-bit IP address: • network-layer address for interface
• used for layer 3 (network layer) forwarding
MAC (or LAN or physical or Ethernet) address:• function: used ‘locally” to get frame from one interface to
another physically-connected interface (same network, in IP-addressing sense)
• 48 bit MAC address (for most LANs) burned in NIC ROM, also sometimes software settable
• e.g.: 1A-2F-BB-76-09-AD
hexadecimal (base 16) notation
(each “numeral” represents 4 bits)
6-24Link Layer and LANs
7
LAN addresses and ARP
each adapter on LAN has unique LAN address
adapter
1A-2F-BB-76-09-AD
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
71-65-F7-2B-08-53
LAN
(wired or
wireless)
6-25Link Layer and LANs
LAN addresses (more)
MAC address allocation administered by IEEE
manufacturer buys portion of MAC address space (to assure uniqueness)
analogy:• MAC address: like Social Security Number
• IP address: like postal address
MAC flat address ➜ portability • can move LAN card from one LAN to another
IP hierarchical address not portable• address depends on IP subnet to which node is
attached
6-26Link Layer and LANs
ARP: address resolution protocol
ARP table: each IP node (host, router) on LAN has table
• IP/MAC address mappings for some LAN nodes:
< IP address; MAC address; TTL>
• TTL (Time To Live): time after which address mapping will be forgotten (typically 20 min)
Question: how to determine
interface’s MAC address,
knowing its IP address?
1A-2F-BB-76-09-AD
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
71-65-F7-2B-08-53
LAN
137.196.7.23
137.196.7.78
137.196.7.14
137.196.7.88
6-27Link Layer and LANs
ARP protocol: same LAN
A wants to send datagram to B
• B’s MAC address not in A’s ARP table.
A broadcasts ARP query packet, containing B's IP address
• destination MAC address = FF-FF-FF-FF-FF-FF
• all nodes on LAN receive ARP query
B receives ARP packet, replies to A with its (B's) MAC address
• frame sent to A’s MAC address (unicast)
A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out)
• soft state: information that times out (goes away) unless refreshed
ARP is “plug-and-play”:• nodes create their ARP
tables without intervention from net administrator
6-28Link Layer and LANs
8
walkthrough: send datagram from A to B via R
focus on addressing – at IP (datagram) and MAC layer (frame)
assume A knows B’s IP address
assume A knows IP address of first hop router, R (how?)
assume A knows R’s MAC address (how?)
Addressing: routing to another LAN
R
1A-23-F9-CD-06-9B222.222.222.220
111.111.111.110E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.22188-B2-2F-54-1A-0F
B
6-29Link Layer and LANs
R
1A-23-F9-CD-06-9B222.222.222.220
111.111.111.110E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.22188-B2-2F-54-1A-0F
B
Addressing: routing to another LAN
IP
Eth
Phy
IP src: 111.111.111.111
IP dest: 222.222.222.222
A creates IP datagram with IP source A, destination B
A creates link-layer frame with R's MAC address as destination address, frame contains A-to-B IP datagram
MAC src: 74-29-9C-E8-FF-55
MAC dest: E6-E9-00-17-BB-4B
6-30Link Layer and LANs
R
1A-23-F9-CD-06-9B222.222.222.220
111.111.111.110E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.22188-B2-2F-54-1A-0F
B
Addressing: routing to another LAN
IP
Eth
Phy
frame sent from A to R
IP
Eth
Phy
frame received at R, datagram removed, passed up to IP
MAC src: 74-29-9C-E8-FF-55
MAC dest: E6-E9-00-17-BB-4B
IP src: 111.111.111.111
IP dest: 222.222.222.222
IP src: 111.111.111.111
IP dest: 222.222.222.222
6-31Link Layer and LANs
R
1A-23-F9-CD-06-9B222.222.222.220
111.111.111.110E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.22188-B2-2F-54-1A-0F
B
Addressing: routing to another LAN
IP src: 111.111.111.111
IP dest: 222.222.222.222
R forwards datagram with IP source A, destination B
R creates link-layer frame with B's MAC address as destination address, frame contains A-to-B IP datagram
MAC src: 1A-23-F9-CD-06-9B
MAC dest: 49-BD-D2-C7-56-2A
IP
Eth
Phy
IP
Eth
Phy
6-32Link Layer and LANs
9
R
1A-23-F9-CD-06-9B222.222.222.220
111.111.111.110E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.22188-B2-2F-54-1A-0F
B
Addressing: routing to another LAN R forwards datagram with IP source A, destination B
R creates link-layer frame with B's MAC address as destination address, frame contains A-to-B IP datagram
IP src: 111.111.111.111
IP dest: 222.222.222.222
MAC src: 1A-23-F9-CD-06-9B
MAC dest: 49-BD-D2-C7-56-2A
IP
Eth
Phy
IP
Eth
Phy
6-33Link Layer and LANs
R
1A-23-F9-CD-06-9B222.222.222.220
111.111.111.110E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.22188-B2-2F-54-1A-0F
B
Addressing: routing to another LAN R forwards datagram with IP source A, destination B
R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram
IP src: 111.111.111.111
IP dest: 222.222.222.222
MAC src: 1A-23-F9-CD-06-9B
MAC dest: 49-BD-D2-C7-56-2A
IP
Eth
Phy
6-34Link Layer and LANs
* Check out the online interactive exercises for more examples: http://gaia.cs.umass.edu/kurose_ross/interactive/
Link layer, LANs: outline
6.1 introduction, services
6.2 error detection, correction
6.3 multiple access protocols
6.4 LANs• addressing, ARP
• Ethernet
• switches
• VLANS
6.5 link virtualization: MPLS
6.6 data center networking
6.7 a day in the life of a web request
6-35Link Layer and LANs
Ethernet
“dominant” wired LAN technology:
single chip, multiple speeds (e.g., Broadcom BCM5761)
first widely used LAN technology: standardized as IEEE 802.3
simpler, cheap
kept up with speed race: 10 Mbps – 10 Gbps
Metcalfe’s Ethernet sketch
6-36Link Layer and LANs
Xerox PARC ---1970s
10
Ethernet: physical topology
bus: popular through mid 90s• all nodes in same collision domain (can collide with each
other)
star: prevails today• active switch in center
• each “spoke” runs a (separate) Ethernet protocol (nodes
do not collide with each other)
switch
bus: coaxial cablestar
6-37Link Layer and LANs
Ethernet frame structure
sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame
preamble:
7 bytes with pattern 10101010 followed by one byte with pattern 10101011
used to synchronize receiver, sender clock rates
6-38Link Layer and LANs
dest.address
sourceaddress
data (payload) CRCpreamble
type postamble
Ethernet frame structure (more)
addresses: 6 byte source, destination MAC addresses• if adapter receives frame with matching destination
address, or with broadcast address (e.g. ARP packet), it passes data in frame to network layer protocol
• otherwise, adapter discards frame
type: indicates higher layer protocol (mostly IP but others possible, e.g., Novell IPX, AppleTalk)
CRC: cyclic redundancy check at receiver• error detected: frame is dropped
postamble: end of frame delimiter (in some specs)
6-39Link Layer and LANs
dest.address
sourceaddress
data (payload) CRCpreamble
type postamble
Ethernet: unreliable, connectionless
connectionless: no handshaking between sending and receiving NICs
unreliable: receiving NIC doesn't send acks or nacks to sending NIC
• data in dropped frames recovered only if initial sender uses higher layer rdt (e.g., TCP), otherwise dropped data lost
Ethernet’s MAC protocol: unslotted CSMA/CD with binary backoff
6-40Link Layer and LANs
11
802.3 Ethernet standards: link & physical layers
many different Ethernet standards
• common MAC protocol and frame format
• different speeds: 2 Mbps, 10 Mbps, 100 Mbps, 1Gbps, 10 Gbps, 40 Gbps
• different physical layer media: fiber, cable
• Different encoding techniques: Manchester, 8B/10B
application
transport
network
link
physical
MAC protocol
and frame format
100BASE-TX
100BASE-T4
100BASE-FX100BASE-T2
100BASE-SX 100BASE-BX
fiber physical layercopper (twister
pair) physical layer6-41Link Layer and LANs
10/13/2016 42
Ethernet Efficiency
tprop = max prop between 2 nodes
ttrans = time to transmit a frame
Higher efficiency at lower tprop or higher ttrans
transprop tt /51
1efficiency
More efficient than ALOHA, but still decentralized and simple.
Disclaimer
• Parts of the lecture slides are adapted from
and copyrighted by James Kurose and Keith
Ross and from those by Prof. Kai Shen. The
slides are intended for the sole purpose of
instruction of computer networks at the
University of Rochester. All copyrighted
materials belong to their original owner(s).