Networking Chapter 6: Link Layer and LANs
60 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What data is stored in a switch table entry?

  • MAC address, interface to reach host, and time stamp (correct)
  • Protocol type and device type
  • IP address and MAC address
  • MAC address and physical address
  • How does a switch learn the location of a sender?

  • By sending a broadcast frame to all connected devices
  • By using an external routing protocol to update its table
  • By keeping a log of all transmitted frames
  • By recording the incoming LAN segment upon receiving a frame (correct)
  • Which action is taken by the switch when it receives a frame?

  • It forwards the frame to all other devices in the network
  • It records the incoming link and the MAC address of the sending host (correct)
  • It only filters frames based on destination IP
  • It automatically deletes old entries in the switch table
  • What is the role of a switch's self-learning mechanism?

    <p>To learn which hosts can be reached through which interfaces (A)</p> Signup and view all the answers

    What happens to the switch table when a new frame is received?

    <p>The relevant sender/location pair is added to the switch table (A)</p> Signup and view all the answers

    What type of addresses does the switch table index use?

    <p>MAC destination addresses to filter frames (D)</p> Signup and view all the answers

    What is the initial state of a switch's table when it first operates?

    <p>Initially empty until it learns through received frames (D)</p> Signup and view all the answers

    What is the purpose of the time stamp in a switch table entry?

    <p>To determine the validity of the MAC address over time (D)</p> Signup and view all the answers

    What type of links frequently experience high error rates?

    <p>Wireless links (C)</p> Signup and view all the answers

    Which layer implements flow control services in a network?

    <p>Link layer (B)</p> Signup and view all the answers

    What happens during error detection in link layer services?

    <p>The receiver detects errors and signals for retransmission or drops the frame. (B)</p> Signup and view all the answers

    Which mechanism allows a receiver to fix bit errors without retransmission?

    <p>Error correction (B)</p> Signup and view all the answers

    Which statement best describes half-duplex communication?

    <p>Data can flow in one direction only at a time. (B)</p> Signup and view all the answers

    Where is the link layer typically implemented within a computer system?

    <p>In each and every host's network interface card (NIC) (C)</p> Signup and view all the answers

    What is the primary function of the link layer when encapsulating datagrams?

    <p>To add error checking bits (C)</p> Signup and view all the answers

    What role does the physical layer play in communication?

    <p>Handling the actual transmission of data over physical mediums (B)</p> Signup and view all the answers

    Which technology is least likely to use full-duplex communication?

    <p>Half-duplex radio systems (C)</p> Signup and view all the answers

    What is the primary purpose of flow control in the link layer?

    <p>To pace data transmission between sender and receiver (D)</p> Signup and view all the answers

    What is the primary function of port-based VLANs?

    <p>To isolate traffic between defined ports. (B)</p> Signup and view all the answers

    Which protocol is used to add VLAN ID information to frames carried over trunk ports?

    <p>802.1Q (D)</p> Signup and view all the answers

    What happens to frames forwarded between VLANs that span multiple switches?

    <p>They must carry VLAN ID information. (A)</p> Signup and view all the answers

    In a situation with dynamic VLAN membership, how can ports be assigned?

    <p>Dynamically among different VLANs. (D)</p> Signup and view all the answers

    Which of the following is NOT a characteristic of VLANs?

    <p>They allow unfiltered traffic among all devices. (C)</p> Signup and view all the answers

    What is the role of a trunk port in a VLAN system?

    <p>It carries frames for multiple VLANs across switches. (D)</p> Signup and view all the answers

    What is the significance of the VLAN ID in the 802.1Q frame format?

    <p>It enables isolation and proper routing between VLANs. (B)</p> Signup and view all the answers

    Which of these statements about traffic isolation in port-based VLANs is true?

    <p>Ports are restricted to communicate only within their assigned VLAN. (A)</p> Signup and view all the answers

    What is the source MAC address used in the link-layer frame for communication between A and B?

    <p>1A-23-F9-CD-06-9B (B)</p> Signup and view all the answers

    Which protocol stack layer does B transition the datagram to after receiving it?

    <p>Network layer (B)</p> Signup and view all the answers

    What is the primary advantage of the switched Ethernet topology over the bus topology?

    <p>No collisions between packets (D)</p> Signup and view all the answers

    What is the maximum speed of Ethernet technology mentioned in the content?

    <p>400 Gbps (D)</p> Signup and view all the answers

    What type of network technology does Ethernet primarily represent?

    <p>Wired LAN technology (A)</p> Signup and view all the answers

    Which device is primarily used in switched Ethernet topologies to manage data traffic?

    <p>Switch (D)</p> Signup and view all the answers

    What does the MAC address of node A indicate?

    <p>Unique identifier for node A (B)</p> Signup and view all the answers

    What is the function of Address Resolution Protocol (ARP) in the context of LANs?

    <p>To map IP addresses to MAC addresses (C)</p> Signup and view all the answers

    In Ethernet, the frame structure is used to encapsulate which type of packet?

    <p>IP datagram (A)</p> Signup and view all the answers

    What key feature distinguishes switched Ethernet from earlier network topologies?

    <p>Individual collision domains for each network node (C)</p> Signup and view all the answers

    What is the primary function of a load balancer in a datacenter network?

    <p>To direct workload within the data center (C)</p> Signup and view all the answers

    Which network element connects outside the datacenter?

    <p>Border routers (D)</p> Signup and view all the answers

    What does the term 'multipath' refer to in datacenter networks?

    <p>The use of multiple routing paths to increase throughput (D)</p> Signup and view all the answers

    Which technology allows remote DMA over Ethernet in datacenter networks?

    <p>RoCE (D)</p> Signup and view all the answers

    What is a key challenge faced by datacenter networks?

    <p>Managing/balancing load across multiple applications (D)</p> Signup and view all the answers

    Which layer uses ECN for congestion control in datacenter networks?

    <p>Transport layer (A)</p> Signup and view all the answers

    What advantage does a rich interconnection among switches provide in a datacenter?

    <p>Increases available bandwidth and redundancy (A)</p> Signup and view all the answers

    What is the function of Orion in Google's datacenter network?

    <p>A SDN control plane for routing and traffic management (C)</p> Signup and view all the answers

    What does SDN stand for in the context of datacenter networks?

    <p>Software-Defined Networking (D)</p> Signup and view all the answers

    How many server blades are typically housed in a server rack?

    <p>20-40 (C)</p> Signup and view all the answers

    What is the purpose of the preamble in an Ethernet frame?

    <p>To synchronize the clock rates of sender and receiver. (B)</p> Signup and view all the answers

    What happens to a frame if the MAC address does not match the destination address?

    <p>The frame is discarded by the adapter. (D)</p> Signup and view all the answers

    Which of the following correctly describes Ethernet's reliability?

    <p>Ethernet is unreliable and connectionless. (A)</p> Signup and view all the answers

    Which layer of the networking model does Ethernet operate at?

    <p>Link layer (A)</p> Signup and view all the answers

    What is the function of the CRC in an Ethernet frame?

    <p>To detect errors during frame transmission. (C)</p> Signup and view all the answers

    What type of protocol does Ethernet utilize for multiple access?

    <p>CSMA/CD (A)</p> Signup and view all the answers

    How does a switch maintain its forwarding table?

    <p>By observing incoming frames and their MAC addresses. (A)</p> Signup and view all the answers

    Which of the following Ethernet standards indicates a transmission speed of 1 Gbps?

    <p>1000BASE-T (B)</p> Signup and view all the answers

    What is a key feature of switches in a local area network?

    <p>They do not need any configuration to operate. (B)</p> Signup and view all the answers

    In an Ethernet switch network, what allows for multiple transmissions simultaneously?

    <p>Each host has a direct connection to the switch. (B)</p> Signup and view all the answers

    Which statement about Ethernet's MAC protocol is correct?

    <p>It employs binary backoff to manage collisions. (A)</p> Signup and view all the answers

    Which of the following statements about the Ethernet frame structure is incorrect?

    <p>The payload can only contain IP packets. (B)</p> Signup and view all the answers

    What characteristic of Ethernet frames makes them suitable for connectionless communication?

    <p>They do not maintain state information between transmissions. (A)</p> Signup and view all the answers

    Which of the following is a property of a switch in an Ethernet network?

    <p>It uses a forwarding table to direct traffic. (A)</p> Signup and view all the answers

    Flashcards

    Flow Control

    The process of regulating the rate of data transmission between two connected devices to prevent data overload at the receiver.

    Error Detection

    A mechanism used to detect errors that may occur during data transmission due to noise or signal attenuation.

    Error Correction

    A technique where the receiver identifies and corrects bit errors without requiring retransmission.

    Half-duplex

    A communication mode where only one device can transmit at a time, preventing data collisions.

    Signup and view all the flashcards

    Full-duplex

    A communication mode where both devices can transmit simultaneously without data collisions, allowing faster data transfer.

    Signup and view all the flashcards

    Link Layer

    The layer in the network stack responsible for handling error detection, error correction, and flow control. It ensures reliable data transmission between two directly connected devices.

    Signup and view all the flashcards

    Host Link-Layer Implementation

    A network interface card (NIC) or on-chip component that implements the link layer protocols for a specific network technology. It connects a host to the physical network.

    Signup and view all the flashcards

    Encapsulation

    The process of adding a header to the data packet with information like destination address and error checking bits. It's the first step in transmitting data in a network.

    Signup and view all the flashcards

    Error Checking and Correction

    The process of examining the received data for errors, verifying the data's integrity, and potentially correcting errors without retransmission.

    Signup and view all the flashcards

    Flow Control

    The process of managing data flow between devices to prevent overload at the receiver, ensuring smooth and efficient data transmission.

    Signup and view all the flashcards

    Switch table

    A table within a switch that maps MAC addresses of connected devices to the switch ports they are connected to.

    Signup and view all the flashcards

    Switch Self-learning

    The process by which a switch learns the MAC addresses of devices connected to its ports by observing the source MAC addresses of frames it receives.

    Signup and view all the flashcards

    Learning a MAC address

    The action of adding a new entry to the switch table with the MAC address of the sender and the corresponding port where the frame arrived.

    Signup and view all the flashcards

    TTL in switch tables

    The time-to-live (TTL) value represents the time (in seconds) that an entry in the switch table is considered valid.

    Signup and view all the flashcards

    Switch table lookup

    When a frame arrives at a switch, the switch uses the destination MAC address to look it up in its switch table.

    Signup and view all the flashcards

    Frame filtering and forwarding

    The process by which a switch uses information gathered from its switch table to forward frames to the appropriate port.

    Signup and view all the flashcards

    Recording incoming link and MAC source

    When a frame arrives at a switch, the switch records the incoming port and the source MAC address of the sending host.

    Signup and view all the flashcards

    Forwarding frame to corresponding port

    If the destination MAC address is found in the switch table, the switch forwards the frame to the corresponding output port.

    Signup and view all the flashcards

    What is a MAC address?

    In a network, a MAC address is a unique identifier assigned to a device's network interface card (NIC). Think of it as a physical address for a device on a local network.

    Signup and view all the flashcards

    What is the purpose of a frame destination address?

    A frame destination address specifies the intended recipient of a data packet within a network. It functions like the postal address on an envelope, guiding the packet to the right destination.

    Signup and view all the flashcards

    What is an IP datagram?

    An IP datagram is a unit of data encapsulated within an IP packet for transmission across a network. Think of it as a container holding the actual data being sent from one device to another.

    Signup and view all the flashcards

    What is the purpose of a network interface card (NIC)?

    A network interface card (NIC) serves as the bridge between a computer and the network. Think of it as the computer's physical connection to the outside world.

    Signup and view all the flashcards

    What is Ethernet?

    Ethernet is a widely used networking technology that allows devices to communicate over a local area network (LAN). Think of it as the language spoken on most local networks.

    Signup and view all the flashcards

    What is a bus topology?

    In a bus topology, all devices share the same communication channel, which means they can collide with each other. Think of it like a crowded hallway where everyone has to share the space.

    Signup and view all the flashcards

    What is a switched topology?

    A switched topology involves a central switch that connects multiple devices. Think of it like a hotel lobby with individual rooms, where each device has its own connection.

    Signup and view all the flashcards

    What is an Ethernet frame?

    An Ethernet frame encapsulates data to be transmitted over a network. Think of it as a package containing a letter, including the sender's address, the recipient's address, and the actual letter itself.

    Signup and view all the flashcards

    What is ARP?

    ARP (Address Resolution Protocol) maps IP addresses to MAC addresses. Think of it like a phone book that translates names to phone numbers.

    Signup and view all the flashcards

    What is a VLAN?

    A VLAN (Virtual Local Area Network) allows logically separating devices on a network. Think of it as creating virtual rooms within a larger building, allowing for separate groups of users.

    Signup and view all the flashcards

    What are VLANs?

    A feature of switches that allows network administrators to segment a network into smaller, more manageable subnets based on logical groups instead of physical location.

    Signup and view all the flashcards

    How do port-based VLANs work?

    In port-based VLANs, devices connected to certain ports on a switch are assigned to specific VLANs, isolating traffic between VLANs. For example, VLAN 1 might hold all the marketing devices, while VLAN 2 holds HR devices.

    Signup and view all the flashcards

    What is dynamic VLAN membership?

    VLANs can dynamically change based on factors like device MAC addresses or network policies, allowing for greater flexibility and scalability.

    Signup and view all the flashcards

    How is communication between VLANs achieved?

    Data packets between different VLANs are forwarded using a router, behaving similarly to separate switches connected via a router, ensuring communication between different VLAN segments.

    Signup and view all the flashcards

    What is a trunk port?

    A physical switch port configured to carry various VLANs, allowing for efficient communication between VLANs across multiple switches.

    Signup and view all the flashcards

    What is the 802.1Q protocol?

    The 802.1Q protocol adds a special tag to Ethernet frames to identify the VLAN they belong to, ensuring proper routing and communication between VLANs across multiple switches.

    Signup and view all the flashcards

    How does the 802.1Q protocol modify the Ethernet frame format?

    The 802.1Q protocol adds a tag to the Ethernet frame header to identify the VLAN. This tag helps the switch understand where the frame is coming from and where to forward it.

    Signup and view all the flashcards

    How do VLANs improve network security?

    VLANs provide improved network security by isolating traffic between different groups, making it difficult for unauthorized devices to access sensitive information. For example, you can separate marketing devices from HR devices, creating separate VLANs for each department.

    Signup and view all the flashcards

    Datacenter Challenges

    Data centers, like those used by Amazon, Google, and Facebook, are designed for massive scale, serving countless clients with high reliability. They handle complex challenges like balancing workloads and avoiding performance bottlenecks.

    Signup and view all the flashcards

    Datacenter Network Hierarchy

    A hierarchical network structure common in data centers, where switches are organized into tiers. Border routers connect the datacenter to the outside world, tier-1 switches connect to tier-2 switches, tier-2 switches connect to Top of Rack (TOR) switches, and TOR switches connect to server blades within racks.

    Signup and view all the flashcards

    Multipath Routing in Datacenters

    A network design where there are multiple, independent paths between servers and switches, allowing for increased throughput and redundancy. If one path fails, data can still be transmitted through other paths.

    Signup and view all the flashcards

    Application-Layer Load Balancer

    A specialized component found in data centers, that directs incoming client requests to different servers based on factors like load and available resources. It acts as a traffic manager within the data center.

    Signup and view all the flashcards

    RoCE (Remote DMA over Converged Ethernet)

    A remote Direct Memory Access (RDMA) protocol used in data centers, enabling fast data transfer over Ethernet networks. It speeds up communication between servers by eliminating unnecessary data copies.

    Signup and view all the flashcards

    ECN (Explicit Congestion Notification)

    A congestion control mechanism used in data center networks, explicitly notifying the sender about network congestion. It helps optimize data transmission and avoid network bottlenecks.

    Signup and view all the flashcards

    SDN (Software-Defined Networking)

    A technology that allows centralized control and management of data center networks. It simplifies network configuration and optimization, allowing for more dynamic and efficient routing.

    Signup and view all the flashcards

    Data Locality

    A key principle in data center design where services and data are placed physically close together in the same rack or nearby racks. This minimizes communication delays and improves performance.

    Signup and view all the flashcards

    Orion SDN

    Google's SDN control plane for its data centers, managing routing, traffic engineering, and network controls. It uses a distributed microservice architecture for greater scalability and flexibility.

    Signup and view all the flashcards

    Are Protocols Dying?

    A question arising from the increasing adoption of SDN and other technologies, suggesting that traditional network protocols might become less relevant in future data center architectures.

    Signup and view all the flashcards

    Preamble in Ethernet

    A sequence of binary data used to synchronize the clocks of the sender and receiver in Ethernet communication. It consists of 7 bytes of alternating 1s and 0s followed by a byte with the pattern 10101011.

    Signup and view all the flashcards

    MAC Address (Media Access Control Address)

    A unique identifier assigned to each device connected to a network. Used in Ethernet to distinguish different devices and route data.

    Signup and view all the flashcards

    Type Field in Ethernet

    A field within an Ethernet frame that indicates the type of higher-layer protocol the data in the frame belongs to. This helps the receiver identify the appropriate protocol module to process the data.

    Signup and view all the flashcards

    Encapsulation in Ethernet

    The process of the Ethernet network layer receiving data from the higher layer (e.g., IP) and encapsulating it into a frame before sending it across the network.

    Signup and view all the flashcards

    Decapsulation in Ethernet

    The process of the Ethernet network layer removing data from the frame at the destination and then passing it up to the higher layer that it belongs to.

    Signup and view all the flashcards

    CRC (Cyclic Redundancy Check)

    A method used in Ethernet to detect and correct errors during data transmission. It involves calculating a checksum value based on the data and comparing it at the receiver.

    Signup and view all the flashcards

    Connectionless in Ethernet

    The process of the Ethernet protocol allowing multiple devices to share the same network media without having to coordinate beforehand. It leads to possible data collisions.

    Signup and view all the flashcards

    Unreliable in Ethernet

    The Ethernet protocol's inability to guarantee that a data packet will reach the destination. It's up to the higher layers, like TCP, to manage retransmissions if needed.

    Signup and view all the flashcards

    CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

    A method used for multiple access in Ethernet, where devices listen for the media being idle and then transmit. If a collision occurs, devices back off randomly.

    Signup and view all the flashcards

    Ethernet Switch

    A device that connects multiple devices on a network, learning which addresses are reachable through which ports. It provides a more efficient and faster way to transfer data.

    Signup and view all the flashcards

    Self-learning in Ethernet Switch

    The ability of an Ethernet switch to learn the MAC addresses of connected devices and build a forwarding table, enabling faster data routing.

    Signup and view all the flashcards

    Switch Forwarding Table

    A table maintained by a switch that contains MAC address and the corresponding output port for each connected device.

    Signup and view all the flashcards

    Multiple Simultaneous Transmissions in Ethernet Switch

    The ability of an Ethernet switch to handle multiple simultaneous data transmissions between connected devices without collisions, as each port has its own collision domain.

    Signup and view all the flashcards

    Multiplexing in Ethernet Switch

    The ability of a switch to allow different types of data packets to co-exist and be transmitted simultaneously without interference.

    Signup and view all the flashcards

    Study Notes

    • The PowerPoint slides are freely available for faculty, students, and readers.
    • To use these slides, users are asked to credit source.
    • For revision history, refer to the page's slide notes.
    • Understand the principles behind link layer services, error detection, correction, and sharing a broadcast channel (multiple access).
    • Understand link layer addressing, local area networks (LANs) including Ethernet, VLANs, and data center networks.
    • Understand instantiation and implementation of various link layer technologies.
    • Introduction
    • Error detection, correction
    • Multiple access protocols
    • LANs, including addressing, ARP, Ethernet, switches, VLANs.
    • Link virtualization: MPLS
    • Data center networking
    • a day in the life of a web request
    • Terminology: hosts, routers (nodes)
    • Communication channels that connect adjacent nodes are known as communication paths/links.
    • Wired and wireless LANs are part of communication channels
    • Layer-2 packet: frame that encapsulates a datagram
    • The link layer is responsible for transferring datagrams between physically adjacent nodes over a link.
    • Datagrams are transferred by different link protocols over different links (e.g., WiFi on first, Ethernet on next link).
    • Each link protocol provides different services (e.g., may or may not provide reliable data transfer over a link).

    Transportation analogy

    • Analogy uses a trip from Princeton to Lausanne: limo (Princeton to JFK), plane (JFK to Geneva), train (Geneva to Lausanne).
    • Tourist = datagram
    • Transport segment = communication link
    • Transportation mode = link-layer protocol
    • Travel agent = routing algorithm
    • Framing, link access
    • Encapsulating a datagram into a frame and adding a header and a trailer.
    • Channel access if required for a shared medium
    • MAC addresses in frame headers identify both the source and destination.
    • Reliable delivery between adjacent nodes, often done without retransmission on links with low error rates.
    • Wireless links have high error rates, thus it is useful to consider how to deal with reliability issues at both the link level and the application level.
    • Flow control manages pacing between adjacent sender and receiver nodes.
    • Error detection identifies errors caused by signal attenuation, noise, or other signal issues.
    • Error correction identifies and corrects bit errors without retransmission.
    • Half-duplex and full-duplex: nodes at both ends of a link can transmit but preferably not at the same time (half-duplex).
    • Link layer is implemented on chip(s) or in Network Interface Cards (NICs).
    • It includes physical layer and link layer implementations.
    • Attaches to host's system buses
    • Combination of hardware, software, and firmware.

    Interfaces communicating

    • Sending side: encapsulates datagram in frame, adds error checking bits, reliable data transfer, and flow control.
    • Receiving side: looks for errors, does reliable data transfer, flow control, and extracts datagrams passed to upper layer protocols.
    • Introduction
    • Error detection, correction
    • Multiple access protocols (LANs)
    • Addressing, ARP
    • Ethernet
    • Switches
    • VLANs
    • Link virtualization: MPLS
    • Data center networking
    • a day in the life of a web request

    Error detection

    • EDC: error detection and correction bits (e.g., redundancy).
    • D: data protected by error checking, may include header fields.
    • Error detection not 100% reliable. Protocol may miss some errors, but larger EDC fields yield better detection and correction.

    Parity checking

    • Single bit parity detects single bit errors.
    • Even/odd parity: sets parity bit for an even or odd number of 1's.
    • At receiver: compute parity of received bits, compare with received parity bit; if different from expected value, an error is detected

    Internet checksum

    • Goal: detect errors (e.g., flipped bits) in transmitted segment
    • Sender treats contents of UDP segments (including UDP header fields and IP addresses) as sequence of 16-bit integers and computes checksum. It puts checksum value into UDP checksum field.
    • Receiver computes checksum of received segment and checks if computed checksum equals checksum field value.

    Cyclic Redundancy Check (CRC)

    • More powerful error-detection coding.
    • D: data bits (given).
    • G: bit pattern (generator), of r+1 bits.
    • Sender computes CRC bits (R) such that (D,R) is exactly divisible by G (mod 2).
    • Receiver knows G, divides (D,R) by G. If non-zero remainder, error is detected!
    • Widely used in Ethernet, 802.11 WiFi.
    • Introduction
    • Error detection, correction
    • Multiple access protocols (LANs)
    • Addressing, ARP
    • Ethernet
    • Switches
    • VLANs
    • Link virtualization: MPLS
    • Data center networking
    • A day in the life of a web request
    • Two types of links:
    • Point-to-point: link between Ethernet switch and host; PPP for dial-up access
    • Broadcast: shared wire (e.g., old-school Ethernet, HFC in cable-based access network, 802.11 Wireless LAN, 4G/5G, satellite

    Multiple access protocols

    • Single shared broadcast channel
    • Two or more simultaneous transmissions by nodes
    • Collision if node receives two or more signals at same time
    • Distributed algorithm that determines how nodes share channel
    • Communication about channel sharing must use channel itself!
    • No out-of-band channel for coordination

    An ideal multiple access protocol

    • Given a multiple access channel (MAC) of rate R bps
    • Desiderata:
    • When one node wants to transmit, can send at rate R.
    • When M nodes want to transmit, each can send at average rate R/M.
    • Fully decentralized (no special node to coordinate transmissions, no synchronization of clocks/slots).

    MAC protocols: taxonomy

    • Channel partitioning
    • Divide channel into smaller pieces (e.g., time slots, frequency, code) and allocate piece to node for exclusive use.
    • Random access
    • Channel not divided; allow collisions; "recover" from collisions; "taking turns"
    • Nodes take turns, but nodes with more to send can take longer turns.

    Channel partitioning MAC protocols: TDMA

    • Time division multiple access (TDMA)
    • Channel access in "rounds."
    • Each station gets fixed-length slot (length = packet transmission time) in each round.
    • Unused slots are idle.

    Channel partitioning MAC protocols: FDMA

    • Frequency division multiple access (FDMA)
    • Channel spectrum divided into frequency bands.
    • Each station is assigned a fixed frequency band.
    • Unused transmission time in frequency bands are idle.

    Random access protocols

    • When node has packet to send, transmit at full channel data rate R; no a priori coordination among nodes when two or more nodes transmit: collision.
    • Random access protocol specifies how to detect and recover from collisions.

    Slotted ALOHA

    • Assumptions: all frames same size, time divided into equal size slots (time to transmit 1 frame), nodes start to transmit only at slot beginning, and nodes are synchronized.
    • If 2 or more nodes transmit in slot, all nodes detect collision.
    • Operation: when node obtains fresh frame, transmits in next slot. No collision: node can send new frame on next slot. Collision: node retransmits frame in each subsequent slot with probability p until success.

    Slotted ALOHA

    • Pros: single active node can continuously transmit at full channel rate, highly decentralized, simple.
    • Cons: collisions, wasting slots, idle slots, nodes may be able to detect collision in less than time to transmit packet, clock synchronization required.
    • Efficiency: long-run fraction of successful slots (many nodes, all with many frames to send). Suppose: N nodes, probability p = 1/(2e) ~ .37. At best, channel used for useful transmissions 37% of the time.

    Pure ALOHA

    • Unslotted Aloha: simpler, no synchronization
    • When frame first arrives, transmit immediately.
    • Collision probability increases with no synchronization; frame sent at to collides with other frames sent in [to-1,to+1]
    • Pure Aloha efficiency: 18%.

    CSMA (carrier sense multiple access)

    • Simple CSMA: listen before transmit; if channel idle, transmit entire frame; if channel busy, defer transmission.

    CSMA/CD (CSMA with collision detection)

    • Collisions detected within short time.
    • Colliding transmissions aborted. Reduction in channel wastage.
    • Collision detection easy in wired, difficult with wireless; human analogy: the polite conversationalist.

    CSMA: collisions

    • Collisions can still occur with carrier sensing due to propagation delays.
    • Propagation delay causes to nodes may not hear each other's just-started transmission.
    • Collision: entire packet transmission time wasted; distance and propagation delay in determining collision probability.

    CSMA/CD

    • CSMA/CD reduces amount of time wasted in collisions; transmission aborted on collision detection.

    Ethernet CSMA/CD algorithm

    • Ethernet receives datagram from network layer, creates a frame.
    • If Ethernet senses channel is idle, start frame transmission. If busy, wait until channel idle, then transmit.
    • If entire frame transmitted without collision—done.
    • If another transmission detected while sending, abort, and send jam signal.
    • After aborting, enter binary (exponential) backoff. After mth collision, chooses K from {0,1,2,…2m-1}, Ethernet waits K-512 bit times, returns to step 2. More collisions=longer backoff interval.

    CSMA/CD efficiency

    • T = max prop delay between 2 nodes in LAN, ttrans= time to transmit max size frame.
    • Efficiency = 1 / (1 + 5tprop/ttrans), as ttrans goes to 0, efficiency goes to 1; as tprop goes to infinity, efficiency goes to 0.

    "Taking turns" MAC protocols

    • Channel partitioning MAC protocols: efficient at high load, inefficient at low load. Delay in channel access, 1/N bandwidth allocated even if only 1 active node.
    • Random access MAC protocols efficient at low load; single node can fully utilize channel. High load means significant collision overhead
    • "Taking turns" protocols: look for best of both worlds.

    "Taking turns" MAC protocols: polling

    • Centralized controller "invites" other nodes to transmit in turn.
    • Typically used with "dumb" devices.
    • Concerns: polling overhead, latency, single point of failure (master).
    • Bluetooth uses polling.

    "Taking turns" MAC protocols: token passing

    • Control token message explicitly passed from one node to the next, sequentially.
    • Transmit while holding token.
    • Concerns: token overhead, latency, single point of failure (token).

    Cable access network: FDM, TDM and random access

    • Multiple downstream (broadcast) FDM channels (up to 1.6 Gbps/channel).
    • Single CMTS transmits into channels.
    • Multiple upstream channels (up to 1 Gbps/channel).
    • Multiple access: all users contend (random access) for certain upstream channel time slots.

    Cable access network

    • DOCSIS: Data over Cable Service Interface Specification
    • FDM over upstream, downstream frequency channels.
    • TDM upstream: some slots assigned, others have contention.
    • Downstream MAP frame: assigns upstream slots.
    • Request for upstream slots (and data) transmitted random access (binary backoff) in selected slots.

    Summary of MAC protocols

    • Channel partitioning (by time, frequency, or code).
    • Random access (dynamic): ALOHA, S-ALOHA, CSMA, CSMA/CD, CSMA/CA
    • Carrier sensing: easy in some technologies, hard in others (wireless); CSMA/CD is used in Ethernet, and CSMA/CA used in 802.11
    • Taking turns: polling from central site, token passing, Bluetooth, FDDI, token ring.
    • Introduction
    • Error detection, correction
    • Multiple access protocols (LANs)
    • Addressing, ARP
    • Ethernet
    • Switches
    • VLANs
    • Link virtualization: MPLS
    • Data center networking
    • A day in the life of a web request

    MAC addresses

    • 32-bit IP address used for network-layer addresses and forwarding.
    • MAC (or LAN or physical or Ethernet) address functions locally to move frames from one interface to another physically connected interface (same subnet).
    • 48-bit MAC address burned in NIC ROM, sometimes software settable. Example: 1A-2F-BB-76-09-AD (hexadecimal notation)

    MAC addresses

    • Each interface on LAN has a unique 48-bit MAC address and a locally unique 32-bit IP address. MAC address allocation administered by IEEE; manufacturer buys a portion of MAC address space to ensure uniqueness. Analogy: MAC address like Social Security Number; IP address like postal address; MAC flat address is portable compared to IP address (which depends on IP subnet to which node is attached).

    ARP: address resolution protocol

    • ARP table: each IP node (host, router) on LAN has IP/MAC address mappings for some LAN nodes. TTL (Time To Live): time after which an address mapping will be forgotten (typically 20 minutes).

    ARP protocol in action

    • A wants to send datagram to B. If B's MAC address not in A's ARP table, A uses ARP to find it. A broadcasts ARP query containing B's IP address; all nodes receive ARP query, and B replies with ARP response, giving its MAC address. A receives the reply, adding B's entry into its local ARP table.

    Routing to another subnet: addressing

    • Walkthrough: sending datagram from A to B via R. Assume A knows B's IP address, the IP address of first hop router (R), and R's MAC address.

    Routing to another subnet: addressing

    • A creates an IP datagram with IP source A, destination B.
    • A creates a link-layer frame containing the A-to-B IP datagram.
    • R's MAC address is the frame's destination.

    Routing to another subnet: addressing

    • R determines outgoing interface, passes datagram with IP source A, destination B.
    • R creates link-layer frame containing A-to-B IP datagram.
    • R transmits link-layer frame.

    Routing to another subnet: addressing

    • B receives frame, extracts IP datagram, destination B.
    • B passes datagram up protocol stack to IP.
    • Introduction
    • Error detection, correction
    • Multiple access protocols (LANs)
    • Addressing, ARP
    • Ethernet
    • Switches
    • VLANs
    • Link virtualization: MPLS
    • Data center networking
    • A day in the life of a web request

    Ethernet

    • "Dominant" wired LAN technology; first widely used LAN tech; simpler, cheap; single chip, multiple speeds (e.g., Broadcom BCM5761); kept up with speed race: 10 Mbps—400 Gbps.

    Ethernet: physical topology

    • Bus: popular through mid-90s; all nodes in same collision domain.
    • Switched: prevails today; active link-layer 2 switch in center; each "spoke" runs a (separate) Ethernet protocol; nodes do not collide with each other.

    Ethernet frame structure

    • Sending interface encapsulates IP datagram in Ethernet frame. Includes preamble, destination address, source address, type, data (payload), and CRC.
    • Preamble: used to synchronize receiver/sender clock rates; 7 bytes of 10101010 followed by 1 byte of 10101011.

    Ethernet frame structure (more)

    • Addresses: 6-byte source/destination MAC addresses. If adapter receives frame with matching destination or broadcast address (e.g., ARP), passes data to network layer protocol, otherwise discards frame.
    • Type: indicates higher layer protocol (mostly IP, but others possible).
    • CRC: cyclic redundancy check at receiver; error detected: frame is dropped.

    Ethernet: unreliable, connectionless

    • Connectionless: no handshaking between sending/receiving NICs.
    • Unreliable: receiving NIC doesn't send ACKs or NAKs to sending NIC. Data in dropped frames recovered only if initial sender uses higher-layer rdt (e.g. TCP), otherwise dropped data is lost. Ethernet's MAC protocol: unslotted CSMA/CD with binary backoff.
    • Many different Ethernet standards; common MAC protocol and frame format; different speeds (2 Mbps, 100 Mbps, 1 Gbps, 10 Gbps, 40 Gbps, 80 Gbps); different physical layer media (fiber, cable).
    • Introduction
    • Error detection, correction
    • Multiple access protocols (LANs)
    • Addressing, ARP
    • Ethernet
    • Switches
    • VLANs
    • Link virtualization: MPLS
    • Data center networking
    • A day in the life of a web request

    Ethernet switch

    • Switch is a link-layer device; takes an active role.
    • Store, forward Ethernet (or other type of) frames; examine incoming frame's MAC address, selectively forward frame to one-or-more outgoing links when frame is to be forwarded on the segment; uses CSMA/CD to access segment.
    • Transparent: hosts unaware of presence of switches.
    • Plug-and-play, self-learning: switches do not need to be configured.

    Switch: multiple simultaneous transmissions

    • Hosts have dedicated, direct connection to switch; switches buffer packets; Ethernet protocol used on each incoming link, so no collisions; each link is its own collision domain, and switching allows A-to-A’ and B-to-B’ simultaneous transmissions without collisions.

    Switch forwarding table

    • Q: How does switch know A' reachable via interface 4, B' reachable via interface 5?
    • A: Each switch has a switch table, each entry is (MAC address of host, interface to reach host, time stamp). Looks like a routing table.
    • Q: How are entries created/maintained in switch table? Something like a routing protocol.

    Switch: self-learning

    • Switch learns which hosts can be reached through which interfaces when frame received.
    • Switch learns locations of sender (incoming LAN segment); records sender/location pair in switch table.

    Switch: frame filtering/forwarding

    • When frame received at switch:
      1. Record incoming link, MAC address of sending host.
      2. Index switch table using MAC destination address.
      3. If entry found for destination, if destination is on segment from which frame arrived, then drop frame, else forward frame on interface indicated by entry.
      4. Else, flood (forward) frame on all interfaces except arriving interface.

    Self-learning, forwarding: example

    • Frame destination (A'), location unknown: flood.
    • Destination A location known: selectively send on just one link.

    Interconnecting switches

    • Self-learning switches can be connected together.
    • Q: Sending from A to G - how does S3 know to forward frame destined to G via S1 and S2? A: self learning.

    Self-learning multi-switch example

    • Suppose C sends frame to I, I responds to C.
    • Q: Show switch tables and packet forwarding in S1, S2, S3, and S4.

    UMass Campus Network - Detail

    • UMass network details (4 firewalls, 10 routers, ~2000+ network switches, ~6000 wireless access points, ~30000 active wired network jacks, ~55000 active end-user wireless devices, all built, operated, and maintained by ~15 people).

    Datacenter networks: network elements

    • Border routers (connections outside datacenter).
    • Tier-1 switches (connecting to ~16 T-2s below).
    • Tier-2 switches (connecting to ~16 TORs below).
    • Top of Rack (TOR) switch (one per rack, 100G-400G Ethernet to blades).
    • Server racks (20-40 server blades: hosts).

    Datacenter networks: multipath

    • Rich interconnection among switches/racks increases throughput between racks (multiple routing paths possible) and reliability via redundancy. -Highlighted disjoint paths between racks 1 and 11 showing two different possible routes.

    Datacenter networks: application-layer routing

    • Load balancer: receives external client requests; directs workload within data center; returns results to external client (data center internals hidden from client).

    Datacenter networks: protocol innovations

    • Link layer: ROCE (remote DMA over Converged Ethernet).
    • Transport layer: ECN (explicit congestion notification) in transport-layer congestion control (DCTCP, DCQCN); experimentation with hop-by-hop (backpressure) congestion control.
    • Routing, management: SDN widely used within/among organizations' datacenters, place related services/data as close as possible (e.g., in same rack or nearby rack) to minimize tier-2/tier-1 communication.

    ORION: Google's new SDN control plane

    • Routing (intradomain, iBGP), traffic engineering (implemented in applications on top of Orion core), edge-edge flow-based controls (e.g., CoFlow scheduling) to meet contract SLAs, and management (pub-sub distributed microservices in Orion core; OpenFlow for switch signaling/monitoring).
    • Note: no routing protocols, congestion control (partially) also managed by SDN rather than by protocol; are protocols dying?
    • Introduction
    • Error detection, correction
    • Multiple access protocols (LANs)
    • Addressing, ARP
    • Ethernet
    • Switches
    • VLANs
    • Link virtualization: MPLS
    • Data center networking
    • A day in the life of a web request

    Synthesis: a day in the life of a web request

    • Our journey down the protocol stack is complete (except PHY).
    • Solid understanding of networking principles, practice!.
    • Could stop here... but may be other topics of interest like wireless or security.

    A day in the life: scenario

    • Arriving mobile client attaches to network, requests a web page, gets a simple sound effect.

    A day in the life: connecting to the Internet

    • Connecting laptop needs to get its own IP address, address of first-hop router, and address of DNS server. Use DHCP.
    • DHCP request encapsulated in UDP, encapsulated in IP, encapsulated in 802.3 Ethernet.
    • Ethernet frame broadcast, received by router running DHCP server.
    • Ethernet de-muxed to IP, de-muxed to UDP, and de-muxed to DHCP.

    A day in the life: connecting to the Internet

    • DHCP server formulates DHCP ACK containing client's IP address, IP address of first-hop router, and name and IP address of DNS server.
    • Encapsulation at DHCP server, frame forwarded (switch learning), through LAN; demultiplexing at client.
    • Client receives DHCP ACK reply. Client now has IP address, knows name and address of DNS server and IP address of its first-hop router.

    A day in the life... ARP (before DNS, before HTTP)

    • Before sending HTTP request, need IP address of www.google.com: DNS.
    • DNS query created, encapsulated in UDP, encapsulated in IP, encapsulated in Eth. To send frame to router, need MAC address of router interface: ARP.
    • ARP query broadcast, received by router, which replies with ARP reply giving MAC address of router interface.
    • Client now knows MAC address of first hop router, so can send a frame containing a DNS query.

    A day in the life... using DNS

    • IP datagram containing DNS query forwarded via LAN switch from client to 1st hop router.
    • IP datagram forwarded from campus network to Comcast network, routed (tables created by RIP, OSPF, IS-IS, and/or BGP routing protocols) to DNS server.
    • Demuxed to DNS; DNS reply to client with IP address of www.google.com.

    A day in the life... TCP connection carrying HTTP

    • To send HTTP request, client first opens TCP socket to web server.
    • TCP SYN segment (Step 1 in TCP 3-way handshake) inter-domain routed to web server.
    • Web server responds with TCP SYNACK (Step 2 in TCP 3-way handshake).
    • TCP connection established.

    A day in the life... HTTP request/reply

    • HTTP request sent into TCP socket; IP datagram containing HTTP request routed to www.google.com; web server responds with HTTP reply (containing web page); IP datagram containing HTTP Reply routed back to client.

    Chapter 6: Summary

    • Principles behind data link layer services (error detection, correction, sharing a broadcast channel: multiple access; link layer addressing).
    • Instantiation/implementation of various link layer technologies (Ethernet, switched LANs, VLANs, virtualized networks as a link layer: MPLS)
    • Synthesis: a day in the life of a web request.

    Chapter 6: Let's take a breath

    • Journey down protocol stack complete (except PHY).
    • Solid understanding of networking principles and practice.
    • Could stop here... but more interesting topics exist (e.g., wireless or security).

    Additional Chapter 6 slides

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers key concepts from Chapter 6, focusing on the link layer services, error detection, and local area networks (LANs). You'll explore Ethernet, VLANs, and data center networking, while understanding multiple access protocols and link layer addressing. Ideal for students and educators looking to enhance their understanding of networking principles.

    More Like This

    Link Layer Services and Local Area Networks Quiz
    5 questions
    Link Layer and LANs Quiz
    5 questions

    Link Layer and LANs Quiz

    IlluminatingRhinoceros avatar
    IlluminatingRhinoceros
    Data Link Layer Chapter Outline
    36 questions
    Use Quizgecko on...
    Browser
    Browser