• Sonuç bulunamadı

(PART 1) Chapter 5: Link Layer 55490005

N/A
N/A
Protected

Academic year: 2021

Share "(PART 1) Chapter 5: Link Layer 55490005"

Copied!
14
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

Chapter 5: Link Layer (PART 1)

1

Computer Networking: A Top Down Approach 6th Edition

Jim Kurose, Keith Ross

(2)

Introduction

Error Detection and Correction

Multiple Access Protocols

Outline

(3)

Introduction

Data-link layer transfers datagram from one node to physically adjacent node over a link

Hosts and routers are considered as nodes

Communication channels are considered as links

Wired links

Wireless links

LANs

Layer-2 packet: Frame

(4)

Introduction

Datagrams may be transferred by

different link protocols on different links

Ethernet on first link, 802.11 on last link

Each link protocol provides different services

May or may not provide reliable data

transfer over link

(5)

Introduction

Link layer services

Framing, link access

Reliable delivery between adjacent nodes

Flow control

Error detection

Error correction

Half-duplex and full-duplex

(6)

Error Detection and Correction

Error detection

Parity checking

Single bit parity

Two-dimensional bit parity

Internet checksum

Cyclic redundancy check

(7)

Multiple Access Protocols

Two types of links

Point-to-point

Between ethernet switch and host

Broadcast (shared wirw or medium)

Old-fashioned Ethernet

Upstream HFC

802.11 wireless LAN

(8)

Multiple Access Protocols

We have single shared broadcast channel

Two or more simultaneous transmissions by nodes

Collision if one of the nodes gets two or more signals at the same time

Multiple access protocol

A distributed algorithm that specifies how nodes uses same channel

Communication about channel sharing must

use channel itself

(9)

Multiple Access Protocols

An ideal multiple access protocol

Broadcast channel of R bps

When one node wants to transmit, it can send at rate R

When M nodes want to transmit, each can send at average rate R/M

Fully decentralized

Simple

(10)

Multiple Access Protocols

Three broad classes:

Channel Partitioning

Divide channel into smaller pieces

Random access

Channel not divided, allow collisions

Recover from collisions

Taking turns

Nodes take turns

(11)

Multiple Access Protocols

Channel Partitioning MAC protocols

TDMA: Time division multiple access

Access to channel in rounds

Each station gets fixed length slot

Unused slots go idle

FDMA: Frequency division multiple access

Channel spectrum divided into frequency bands

Each station assigned fixed frequency band

(12)

Multiple Access Protocols

Random access protocols

When node has packet to send

Transmit at full channel data rate R

No coordination among nodes

Two or more transmitting nodes creates collision

Random access MAC protocol defines:

How to detect collision

How to recover from collision

Examples:

Slotted ALOHA

ALOHA

CSMA, CSMA/CD, CSMA/CA

(13)

Multiple Access Protocols

Random access protocols

Slotted ALOHA

All frames have same size

Time divided into equal size slots

Nodes start to transmit only slot begining

Nodes are synchronized

Collision detected by all nodes

(14)

Multiple Access Protocols

Random access protocols

Pure ALOHA

Simpler, no synchronization

When frame first arrives, transmit immediately

Collision probability increases

Pure ALOHA efficiency is worse than slotted

ALOHA

Referanslar

Benzer Belgeler

network core, each packet is forwarded from one router to the next one based on the path (packet switching).  The full link capacity is used for individual

 If there are no free buffers, packets dropped (loss) and need to be resend using reliable data transfer protocols.... Cars propagates at

 When you create a network apps you do not need to write software for network

 Multiple objects can be sent over single TCP connection between client server.. Web

 Reliable data transfer is important in applicaiton, transport and link layers.  The complexity of reliable data transfer protocol is related to the characteristics of

 If sender receives 3 ACKs for same data, resend unacked segment with smallest sequence number..  TCP flow control.  Receiver controls sender so sender will not

 Datagram networks provides network- layer connectionless service.  Virtual-circuit network provides network- layer

 Replace (source IP address port #) of every outgoing datagram to (NAT IP address, new port #).  Remember every (source IP address port #) to (NAT IP address, new port