chapter 5 outline

19
Chapter 5 outline 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 LAN addresses and ARP 5.5 Ethernet 5.6 Hubs, bridges, and switches 5.7 Wireless links and LANs 5.8 PPP 5.9 ATM 5.10 Frame Relay

Upload: kaipo

Post on 08-Jan-2016

13 views

Category:

Documents


0 download

DESCRIPTION

5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 LAN addresses and ARP 5.5 Ethernet. 5.6 Hubs, bridges, and switches 5.7 Wireless links and LANs 5.8 PPP 5.9 ATM 5.10 Frame Relay. Chapter 5 outline. Hubs, Bridges, Switches, Routers. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Chapter 5 outline

Chapter 5 outline

5.1 Introduction and services

5.2 Error detection and correction

5.3Multiple access protocols

5.4 LAN addresses and ARP

5.5 Ethernet

5.6 Hubs, bridges, and switches

5.7 Wireless links and LANs

5.8 PPP 5.9 ATM 5.10 Frame Relay

Page 2: Chapter 5 outline

Hubs, Bridges, Switches, Routers

Dedicated

Shared

A hub is just a repeater.

A switch is a multi-port bridge.

A router forwards IP packets.

LAN segment

Page 3: Chapter 5 outline

IEEE 802.11 Wireless LAN

802.11b 2.4-5 GHz unlicensed

radio spectrum up to 11 Mbps direct sequence

spread spectrum (DSSS) in physical layer

• all hosts use same chipping code

widely deployed, using base stations

802.11a 5-6 GHz range up to 54 Mbps

802.11g 2.4-5 GHz range up to 54 Mbps

All use CSMA/CA for multiple access

All have base-station and ad-hoc network versions

Page 4: Chapter 5 outline

Base station approach Wireless host communicates with a base

station base station = access point (AP)

Basic Service Set (BSS) (a.k.a. “cell”) contains: wireless hosts access point (AP): base station

BSSs combined to form distribution system (DS)

Page 5: Chapter 5 outline

Ad Hoc Network approach

No AP (i.e., base station) wireless hosts communicate with each other

to get packet from wireless host A to B may need to route through wireless hosts X,Y,Z

Applications: “laptop” meeting in conference room, car interconnection of “personal” devices battlefield

IETF MANET (Mobile Ad hoc Networks) working group

Page 6: Chapter 5 outline

IEEE 802.11: multiple access Collision if 2 or more nodes transmit at same

time CSMA makes sense:

get all the bandwidth if you’re the only one transmitting shouldn’t cause a collision if you sense another

transmission

Collision detection doesn’t work: hidden terminal problem

Page 7: Chapter 5 outline

IEEE 802.11 MAC Protocol: CSMA/CA

802.11 CSMA: sender- if sense channel idle for DIFS

sec. then transmit entire frame (no

collision detection)-if sense channel busy

then binary backoff802.11 CSMA receiver- if received OK return ACK after SIFS (ACK is needed due to hidden

terminal problem)

Page 8: Chapter 5 outline

Collision avoidance mechanisms Problem:

two nodes, hidden from each other, transmit complete frames to base station

wasted bandwidth for long duration !

Solution: small reservation packets nodes track reservation interval with

internal “network allocation vector” (NAV)

Page 9: Chapter 5 outline

Collision Avoidance: RTS-CTS exchange sender transmits short

RTS (request to send) packet: indicates duration of transmission

receiver replies with short CTS (clear to send) packet notifying (possibly

hidden) nodes

hidden nodes will not transmit for specified duration: NAV

Page 10: Chapter 5 outline

Collision Avoidance: RTS-CTS exchange

RTS and CTS short: collisions less likely, of

shorter duration end result similar to

collision detection IEEE 802.11 allows:

CSMA CSMA/CA: reservations polling from AP

Page 11: Chapter 5 outline

Chapter 5 outline

5.1 Introduction and services

5.2 Error detection and correction

5.3Multiple access protocols

5.4 LAN addresses and ARP

5.5 Ethernet

5.6 Hubs, bridges, and switches

5.7 Wireless links and LANs

5.8 PPP 5.9 ATM 5.10 Frame Relay

Page 12: Chapter 5 outline

Point to Point Data Link Control one sender, one receiver, one link: easier than

broadcast link: no Media Access Control no need for explicit MAC addressing e.g., dialup link, ISDN line

popular point-to-point DLC protocols: PPP (point-to-point protocol) HDLC: High level data link control (Data link

used to be considered “high layer” in protocol stack!

Page 13: Chapter 5 outline

PPP Design Requirements [RFC 1557]

packet framing: encapsulation of network-layer datagram in data link frame carry network layer data of any network layer

protocol (not just IP) at same time ability to demultiplex upwards

bit transparency: must carry any bit pattern in the data field

error detection (no correction) connection liveness: detect, signal link failure to

network layer network layer address negotiation: endpoint can

learn/configure each other’s network address

Page 14: Chapter 5 outline

PPP non-requirements

no error correction/recovery no flow control out of order delivery OK no need to support multipoint links (e.g.,

polling)

Error recovery, flow control, data re-ordering all relegated to higher layers!

Page 15: Chapter 5 outline

PPP Data Frame

Flag: delimiter (framing) Address: does nothing (only one option) Control: does nothing; in the future possible multiple

control fields Protocol: upper layer protocol to which frame delivered

(eg, PPP-LCP, IP, IPCP, etc) info: upper layer data being carried check: cyclic redundancy check for error detection

Page 16: Chapter 5 outline

Byte Stuffing “data transparency” requirement: data field

must be allowed to include flag pattern <01111110> Q: is received <01111110> data or flag?

Sender: adds (“stuffs”) extra < 01111110> byte after each < 01111110> data byte

Receiver: two 01111110 bytes in a row: discard first

byte, continue data reception single 01111110: flag byte

Page 17: Chapter 5 outline

Byte Stuffing

flag bytepatternin datato send

flag byte pattern plusstuffed byte in transmitted data

Page 18: Chapter 5 outline

PPP Link Control ProtocolBefore exchanging network-layer

data, data link peers must configure PPP link (max. frame

length, authentication) learn/configure network layer information

for IP: carry IP Control Protocol (IPCP) msgs (protocol field: 8021) to configure/learn IP address

Page 19: Chapter 5 outline

Chapter 5: Summary

principles behind data link layer services: error detection, correction multiple access protocols link layer addressing, ARP

link layer technologies: Ethernet, interconnecting, IEEE 802.11 LANs, PPP, …

journey down the protocol stack is done next three weeks: multimedia