0% found this document useful (0 votes)
52 views13 pages

Chapter 5: Link Layer: Our Goals

The document discusses chapter 5 of a networking textbook, which covers the link layer. The chapter goals are to understand link layer services like error detection and correction, and multiple access protocols. It also covers instantiating various link layer technologies, including local area networks (LANs) like Ethernet, virtual LANs (VLANs), link virtualization with MPLS, and data center networking. The key services provided by the link layer are framing, reliable delivery between nodes, flow control, error detection using techniques like cyclic redundancy checks (CRCs), and error correction.

Uploaded by

Sana Akram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views13 pages

Chapter 5: Link Layer: Our Goals

The document discusses chapter 5 of a networking textbook, which covers the link layer. The chapter goals are to understand link layer services like error detection and correction, and multiple access protocols. It also covers instantiating various link layer technologies, including local area networks (LANs) like Ethernet, virtual LANs (VLANs), link virtualization with MPLS, and data center networking. The key services provided by the link layer are framing, reliable delivery between nodes, flow control, error detection using techniques like cyclic redundancy checks (CRCs), and error correction.

Uploaded by

Sana Akram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Chapter 5: Link layer

our goals:
 understand principles behind link layer
services:
 error detection, correction
 sharing a broadcast channel: multiple access
 link layer addressing
 local area networks: Ethernet, VLANs
 instantiation, implementation of various link
layer technologies

Link Layer 5-2


Link layer, LANs: outline
5.1 introduction, services 5.5 link virtualization:
5.2 error detection, MPLS
correction 5.6 data center
5.3 multiple access networking
protocols 5.7 a day in the life of a
5.4 LANs web request
 addressing, ARP
 Ethernet
 switches
 VLANS

Link Layer 5-3


Link layer: introduction
terminology:
 hosts and routers: nodes
global ISP
 communication channels that
connect adjacent nodes along
communication path: links
 wired links
 wireless links
 LANs
 layer-2 packet: frame,
encapsulates datagram

data-link layer has responsibility of


transferring datagram from one node
to physically adjacent node over a link
Link Layer 5-4
Link layer: context
 datagram transferred by transportation analogy:
different link protocols over  trip from Princeton to Lausanne
different links:  limo: Princeton to JFK
 e.g., Ethernet on first link,  plane: JFK to Geneva
frame relay on  train: Geneva to Lausanne
intermediate links, 802.11  tourist = datagram
on last link  transport segment =
 each link protocol provides communication link
different services  transportation mode = link
 e.g., may or may not layer protocol
provide rdt over link  travel agent = routing
algorithm

Link Layer 5-5


Link layer services
 framing, link access:
 encapsulate datagram into frame, adding header, trailer
 channel access if shared medium
 “MAC” addresses used in frame headers to identify
source, dest
• different from IP address!
 reliable delivery between adjacent nodes
 we learned how to do this already (chapter 3)!
 seldom used on low bit-error link (fiber, some twisted
pair)
 wireless links: high error rates
• Q: why both link-level and end-end reliability?

Link Layer 5-6


Link layer services (more)
 flow control:
 pacing between adjacent sending and receiving nodes
 error detection:
 errors caused by signal attenuation, noise.
 receiver detects presence of errors:
• signals sender for retransmission or drops frame
 error correction:
 receiver identifies and corrects bit error(s) without resorting to
retransmission
 half-duplex and full-duplex
 with half duplex, nodes at both ends of link can transmit, but not
at same time

Link Layer 5-7


Where is the link layer implemented?
 in each and every host
 link layer implemented in
“adaptor” (aka network
interface card NIC) or on a
chip application
 Ethernet card, 802.11 transport
network cpu memory
card; Ethernet chipset link

 implements link, physical host


layer controller
bus
(e.g., PCI)
link
 attaches into host’s system physical
physical
buses transmission

 combination of hardware,
software, firmware network adapter
card

Link Layer 5-8


Adaptors communicating

datagram datagram

controller controller

sending host receiving host


datagram

frame

 sending side:  receiving side


 encapsulates datagram in  looks for errors, rdt,
frame flow control, etc
 adds error checking bits,  extracts datagram, passes
rdt, flow control, etc. to upper layer at
receiving side
Link Layer 5-9
Link layer, LANs: outline
5.1 introduction, services 5.5 link virtualization:
5.2 error detection, MPLS
correction 5.6 data center
5.3 multiple access networking
protocols 5.7 a day in the life of a
5.4 LANs web request
 addressing, ARP
 Ethernet
 switches
 VLANS

Link Layer 5-10


Error detection
EDC= Error Detection and Correction bits (redundancy)
D = Data protected by error checking, may include header fields

• Error detection not 100% reliable!


• protocol may miss some errors, but rarely
• larger EDC field yields better detection and correction

otherwise

Link Layer 5-11


Internet checksum (review)
goal: detect “errors” (e.g., flipped bits) in transmitted packet
(note: used at transport layer only)

sender: receiver:
 treat segment contents  compute checksum of
as sequence of 16-bit received segment
integers  check if computed
 checksum: addition (1’s checksum equals checksum
complement sum) of field value:
segment contents  NO - error detected
 sender puts checksum  YES - no error detected.
value into UDP But maybe errors
checksum field nonetheless?

Link Layer 5-12


Cyclic redundancy check
 more powerful error-detection coding
 view data bits, D, as a binary number
 choose r+1 bit pattern (generator), G
 goal: choose r CRC bits, R, such that
 <D,R> exactly divisible by G (modulo 2)
 receiver knows G, divides <D,R> by G. If non-zero remainder:
error detected!
 can detect all burst errors less than r+1 bits
 widely used in practice (Ethernet, 802.11 WiFi, ATM)

Link Layer 5-13


CRC example
want:
D.2r XOR R = nG
equivalently:
D.2r = nG XOR R
equivalently:
if we divide D.2r by
G, want remainder R
to satisfy:

D.2r
R = remainder[ ]
G

Link Layer 5-14

You might also like