Top Banner
5: DataLink Layer 5a-1 Chapter 5: The Data Link Layer Last time: specific link layer technologies Friday’s class: public key encryption start in PL367 Today: specific link layer technologies: Wireless PPP ATM X25, Frame Relay Assign HW9, due Monday: Ch5 #13-16, 18,21,22
23

5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

Dec 29, 2015

Download

Documents

Jesse Waters
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-1

Chapter 5: The Data Link LayerLast time: specific link layer

technologies

Friday’s class: public key

encryption start in PL367

Today: specific link layer

technologies: Wireless PPP ATM X25, Frame Relay

Assign HW9, due Monday: Ch5 #13-16, 18,21,22

Page 2: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-2

Ch4 True/False Quiz1) With a virtual-circuit network layer, packet switches are

involved in virtual circuit setup, and each packet switch it aware of the VCs passing through it.

2) With a datagram network layer, each packet carries the address of the destination host.

3) In the BGP routing algorithm, each AS advertises to its neighbors its estimates of the shortest distances from the AS to all possible destination ASs.

4) Suppose you computer has been configured with an IP address, and you move (along with your computer) to an office down the hall. If afterwards your computer is connected to the same IP net, then it is not necessary to reconfigure the IP address in your computer.

5) Single-homed hosts have one interface and routers typically have two or more interfaces.

Page 3: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-3

IEEE 802.11 Wireless LAN wireless LANs: untethered (often mobile)

networking IEEE 802.11 standard:

MAC protocol unlicensed frequency spectrum: 900Mhz, 2.4Ghz

Basic Service Set (BSS) (a.k.a. “cell”) contains: wireless hosts access point (AP):

base station BSS’s combined to form

distribution system (DS)

Page 4: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-4

Ad Hoc Networks

Ad hoc network: IEEE 802.11 stations can dynamically form network without AP

Applications:“laptop” meeting in conference room,

car interconnection of “personal” devicesbattlefield

IETF MANET WG(Mobile Ad hoc Networks) working group

Page 5: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-5

IEEE 802.11 MAC Protocol: CSMA/CA802.11 CSMA: sender- if sense channel idle for

DIFS sec. then transmit entire frame

(no collision detection)-if sense channel busy

then binary backoff

802.11 CSMA receiver:if received OK return ACK after SIFS

(Distributed Inter Frame Space)

(Short Inter Frame Spacing)

Page 6: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-6

IEEE 802.11 MAC Protocol

802.11 CSMA Protocol: other issues

NAV: Network Allocation Vector

802.11 frame has transmission time field

others (hearing data) defer access for NAV time units

Page 7: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-7

Hidden Terminal effect

hidden terminals: A, C cannot hear each other obstacles, signal attenuation collisions at B

goal: avoid collisions at B CSMA/CA: CSMA with Collision Avoidance

Page 8: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-8

Collision Avoidance: RTS-CTS exchange CSMA/CA: explicit

channel reservation sender: send short

RTS: request to send receiver: reply with

short CTS: clear to send

CTS reserves channel for sender, notifying (possibly hidden) stations

avoid hidden station collisions

Page 9: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-9

Collision Avoidance: RTS-CTS exchange RTS and CTS short:

collisions less likely, of shorter duration

end result similar to collision detection

IEEE 802.11 allows:CSMACSMA/CA:

reservations polling from AP

Page 10: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-10

IEEE 802.11b11Mbit variation Encoded using DSSS (direct-sequence spread

spectrum) Incorporates multiple trans. speeds (e.g., 1Mbps,

2Mbps), depending on distance from transmitter Real-world issues:

Power, roaming (IP assignment)

Sources: http://www.networkcomputing.com/1115/1115ws2.html http://www.isp-planet.com/fixed_wireless/technology/2001/wlan

_primer_p2.html

Page 11: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-11

IEEE 802.11b (cont.)

PLCP: Physical Layer Convergence Protocol One sublayer of the physical layer A common interface to higher-level drivers Provides carrier sense

144-bit preamble, 48-bit header All sent at 1Mbps; thus only 85% efficient

Page 12: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-12

Point to Point Data Link Control one sender, one receiver, one link:

easier than broadcast link:no Media Access Controlno need for explicit MAC addressinge.g., dialup link, ISDN line

popular point-to-point DLC protocols:PPP (point-to-point protocol)HDLC: High level data link control

(Data link used to be considered “high layer” in protocol stack!

Page 13: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-13

PPP Design Requirements [RFC 1557] packet framing: encapsulation of network-

layer datagram in data link frame carry network layer data of any network

layer protocol (not just IP) at same time ability to demultiplex upwards

bit transparency: must carry any bit pattern in the data field

error detection (no correction) connection liveness: detect, signal link failure

to network layer network layer address negotiation: endpoint

can learn/configure each other’s network address

Page 14: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-14

PPP non-requirements

no error correction/recovery no flow control out of order delivery OK no need to support multipoint links (e.g.,

polling)

Error recovery, flow control, data re-ordering all relegated to higher layers!

Page 15: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-15

PPP Data Frame

flag: delimiter (framing) address: does nothing (only one option) control: also does nothing; in the future

possible multiple control fields

Page 16: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-16

PPP Data Frame

protocol: upper layer protocol to which frame delivered (e.g., PPP-LCP, IP, IPCP, etc.)

info: upper layer data being carried check: cyclic redundancy check for error

detection

Page 17: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-17

Byte Stuffing “data transparency” requirement: data field

must be allowed to include flag pattern <01111110> Q: is received <01111110> data or flag?

Sender: adds (“stuffs”) extra < 01111110> byte after each < 01111110> data byte

Receiver: two 01111110 bytes in a row: discard first

byte, continue data reception single 01111110: flag byte

Page 18: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-18

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

Page 19: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-19

PPP Data Control ProtocolBefore exchanging

network-layer data, data link peers must

configure PPP link (max. frame length, authentication)

learn/configure network layer information

for IP: carry IP Control Protocol (IPCP) msgs (protocol field: 8021) to configure/learn IP address

Page 20: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-20

Asynchronous Transfer Mode: ATM 1980s/1990’s standard for high-speed

(155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture

Goal: integrated, end-end transport of carry voice, video, data meeting timing/QoS requirements of voice,

video (versus Internet best-effort model) “next generation” telephony: technical roots

in telephone world packet-switching (fixed length packets, called

“cells”) using virtual circuits

Page 21: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-21

ATM architecture

adaptation layer: only at edge of ATM network data segmentation/reassembly roughly analogous to Internet transport layer

ATM layer: “network” layer cell switching, routing

physical layer

Page 22: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-22

ATM: network or link layer?Vision: end-to-end

transport: “ATM from desktop to desktop” ATM is a network

technology

Reality: used to connect IP backbone routers “IP over ATM” ATM as switched

link layer, connecting IP routers

Page 23: 5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r specific link layer technologies Friday’s class: r public key encryption r start in PL367.

5: DataLink Layer 5a-23

ATM Adaptation Layer (AAL)

ATM Adaptation Layer (AAL): “adapts” upper layers (IP or native ATM applications) to ATM layer below

AAL present only in end systems, not in switches

AAL layer segment (header/trailer fields, data) fragmented across multiple ATM cells analogy: TCP segment in many IP packets