DOC PREVIEW
CMU 15441 Computer Networking - lecture

This preview shows page 1-2-15-16-17-32-33 out of 33 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 33 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

15-441 - KesdenISO/OSI Reference ModelThe Data Link LayerLink Layer Design IssuesManagement of the MediaLink TypesAddress TypesEncodingNRZ (Non-Return to Zero)Ethernet Manchester Encoding4B/5B EncodingFramingFraming, ExampleExample: Point-To-Point Protocol (PPP), contSlide 15Example: Point-To-Point Protocol (PPP), contLCP Packet TypesError Correction vs. Error DetectionSimple ParityClose Enough?Hamming DistanceThinking about Error Detection and CorrectionHamming Distance and EC/EDSlide 24How Many Check Bits?Hamming’s CodeHamming’s Code (Example)Hamming’s Code (Ex.), cont.Slide 29ChecksumsChecksums, cont.Checksum, cont.Slide 3301/15/19115-441 - Kesden15-441 - KesdenLecture 5/Spring 200701/15/192ISO/OSI Reference ModelISO/OSI Reference ModelApplicationPresentationSessionTransportNetworkData Link – We are herePhysical – We’ve been here01/15/193The Data Link LayerThe Data Link LayerThe physical layer was responsible for hiding the physical properties of the media. The network layer is responsible for moving packets from network to network.The link layer is responsible for getting packets from one machine to another on a particular network. For our purposes, a network is a collection of machines connected via a communications channel such that the connection logically appears as if it was a single wire or bus, regardless of the actual media or configuration.01/15/194Link Layer Design IssuesLink Layer Design IssuesManagement of the media, generallyEncodingFramingError-detection/Error-correction [maybe]Flow control [maybe]01/15/195Management of the MediaManagement of the MediaIn many cases, there may be limitations about who can use the actual physical network connection and when.Broadcast media, such as ethernet, is the classic example. This issue belongs to a sublayer of the data link layer called the Medium Access Control (MAC) layer.01/15/196Link TypesLink TypesBroadcast:–Senders and receivers share medium – all stations hear all transmissions–Radio–Sometimes wired, e.g. ethernetPoint-to-point–Fiber, RS232, USB (upstream vs. downstream)Switched–Token ring01/15/197Address TypesAddress TypesStatic – anointed, soft-configuredStatic – anointed, more hard-wired–Ethernet, 48 bits: [????]24 bits “per manufacturer”24 bits assigned by manufacturer–Port/Position on switchDynamic – “Anyone else use 45?”Special addresses, e.g. designated broadcast01/15/198EncodingEncodingIt is often the case that the physical layer has “personality”. For example, baseband signals send 1s and 0s as high and low voltages. But if the voltage doesn’t change for a long time, timing tolerance becomes and issue.Long streams of 0s or 1s could lead to miscounted bits.Typically, it is the link layer’s responsibility to mitigate this type of physical layer property.This is done by encoding the bits in a way that is not subject to this type of problem.01/15/199NRZ (Non-Return to Zero)NRZ (Non-Return to Zero)00 0 100 1 11Easy thing to doHard to count 0’s or 1sNot necessarily balanced01/15/1910Ethernet Manchester EncodingEthernet Manchester Encoding00 1 10 = rising transition1 = falling transition•1 transitions per bit, but twice as much bandwidth•High-low pattern has good electrical properties•Balanced signal – no net DC voltage. •This allows AC coupled power supply on receiver. •If code had a DC bias, it would be lost in the transformer on the receiver side.01/15/19114B/5B Encoding4B/5B EncodingData encoded as symbols with 5 bit symbols representing 4 bit patterns100Mbps data requires 125MhzEach valid symbol has at least two 1s–Guarantees transitions16 data symbols–8 additional symbols used for controlIdleFrame boundaryFDDI is one example01/15/1912FramingFramingPhysical layer is typically not error-freeLink layer must discard correct and/or replace defective data, depending on quality of service.Typical approach is to break streams of 1’s and 0’s into more managable pieces called framesFrames typically contain data bits and error correction or error detection bitsDepending on the protocol, defective frames may be corrected (if possible) or discarded. Some link layer protocols might also handle retransmission of defective frames01/15/1913Framing, ExampleFraming, ExampleWhich way do we lose more?01/15/1914Example: Point-To-Point Protocol Example: Point-To-Point Protocol (PPP), (PPP), contcontFlag Address Control Protocol Payload Checksum Flag01111110 11111111 00000011 01111110Indicatesstartof frameIndicatesend of frameAlways all 1s.All stations accept all packetsUsually as shown. Indicates unnumbered frame. Can provide numbered frames and reliable link layer – especially useful for noisy linesWhich network layer is above?The network layer packet111 1 or 2variable 2 or 41Can be omitted by negotiation01/15/1915Example: Point-To-Point Protocol Example: Point-To-Point Protocol (PPP), (PPP), contcontDEADESTABLISHED AUTHENTICATENETWORKTERMINATEOPENCarrier detectfailedfailedOptionsagreedAuthentication successfulNCP configurationdoneCarrier dropped01/15/1916Example: Point-To-Point Protocol Example: Point-To-Point Protocol (PPP), (PPP), contcontFlag Address Control Protocol Payload Checksum Flag01111110 11111111 00000011 01111110111 1 or 2variable 2 or 41 Code Identifier Length Data1231LCP PacketWhat type?To match request and reply01/15/1917LCP Packet TypesLCP Packet TypesName Direction DescriptionConfigure-requestInitiatorResponderData has proposed options and valuesConfigure-ACKInitiatorResponderAll proposed options and values acceptedConfigure-NAKInitiatorResponderData has rejected optionsConfigure-RejectInitiatorResponderData has non-negotiable optionsTerminate-RequestInitiatorResponderRequest to close lineTerminate-ACKInitiatorResponderOK, line is closedCode-RejectInitiatorResponderUnknown requestProtocol-RejectInitiatorResponderUnknown protocolEcho-requestInitiatorResponderPlease echo this frame (send back) (testing)Echo-replyInitiatorResponderHere is the frame back (testing)Discard-requestInitiatorResponderThrow this frame away (testing)01/15/1918Error Correction vs. Error DetectionError Correction vs.


View Full Document

CMU 15441 Computer Networking - lecture

Documents in this Course
Lecture

Lecture

14 pages

Lecture

Lecture

19 pages

Lecture

Lecture

14 pages

Lecture

Lecture

78 pages

Lecture

Lecture

35 pages

Lecture

Lecture

4 pages

Lecture

Lecture

4 pages

Lecture

Lecture

29 pages

Lecture

Lecture

52 pages

Lecture

Lecture

40 pages

Lecture

Lecture

44 pages

Lecture

Lecture

41 pages

Lecture

Lecture

38 pages

Lecture

Lecture

40 pages

Lecture

Lecture

13 pages

Lecture

Lecture

47 pages

Lecture

Lecture

49 pages

Lecture

Lecture

7 pages

Lecture

Lecture

18 pages

Lecture

Lecture

15 pages

Lecture

Lecture

74 pages

Lecture

Lecture

35 pages

Lecture

Lecture

17 pages

lecture

lecture

13 pages

Lecture

Lecture

21 pages

Lecture

Lecture

14 pages

Lecture

Lecture

53 pages

Lecture

Lecture

52 pages

Lecture

Lecture

40 pages

Lecture

Lecture

11 pages

Lecture

Lecture

20 pages

Lecture

Lecture

39 pages

Lecture

Lecture

10 pages

Lecture

Lecture

40 pages

Lecture

Lecture

25 pages

lecture

lecture

11 pages

lecture

lecture

7 pages

Lecture

Lecture

10 pages

lecture

lecture

46 pages

lecture

lecture

7 pages

Lecture

Lecture

8 pages

lecture

lecture

55 pages

lecture

lecture

45 pages

lecture

lecture

47 pages

lecture

lecture

39 pages

lecture

lecture

38 pages

lecture

lecture

9 pages

midterm

midterm

16 pages

Lecture

Lecture

39 pages

Lecture

Lecture

14 pages

Lecture

Lecture

46 pages

Lecture

Lecture

8 pages

Lecture

Lecture

40 pages

Lecture

Lecture

11 pages

Lecture

Lecture

41 pages

Lecture

Lecture

38 pages

Lecture

Lecture

9 pages

Lab

Lab

3 pages

Lecture

Lecture

53 pages

Lecture

Lecture

51 pages

Lecture

Lecture

38 pages

Lecture

Lecture

42 pages

Lecture

Lecture

49 pages

Lecture

Lecture

63 pages

Lecture

Lecture

7 pages

Lecture

Lecture

51 pages

Lecture

Lecture

35 pages

Lecture

Lecture

29 pages

Lecture

Lecture

65 pages

Lecture

Lecture

47 pages

Lecture

Lecture

41 pages

Lecture

Lecture

41 pages

Lecture

Lecture

32 pages

Lecture

Lecture

35 pages

Lecture

Lecture

15 pages

Lecture

Lecture

52 pages

Lecture

Lecture

16 pages

Lecture

Lecture

4 pages

lecture

lecture

27 pages

lecture04

lecture04

46 pages

Lecture

Lecture

46 pages

Lecture

Lecture

13 pages

lecture

lecture

41 pages

lecture

lecture

38 pages

Lecture

Lecture

40 pages

Lecture

Lecture

25 pages

Lecture

Lecture

38 pages

lecture

lecture

11 pages

Lecture

Lecture

42 pages

Lecture

Lecture

12 pages

Lecture

Lecture

36 pages

Lecture

Lecture

46 pages

Lecture

Lecture

35 pages

Lecture

Lecture

34 pages

Lecture

Lecture

9 pages

lecture

lecture

49 pages

class03

class03

39 pages

Lecture

Lecture

8 pages

Lecture 8

Lecture 8

42 pages

Lecture

Lecture

20 pages

lecture

lecture

29 pages

Lecture

Lecture

9 pages

lecture

lecture

46 pages

Lecture

Lecture

12 pages

Lecture

Lecture

24 pages

Lecture

Lecture

41 pages

Lecture

Lecture

37 pages

lecture

lecture

59 pages

Lecture

Lecture

47 pages

Lecture

Lecture

34 pages

Lecture

Lecture

38 pages

Lecture

Lecture

28 pages

Exam

Exam

17 pages

Lecture

Lecture

21 pages

Lecture

Lecture

15 pages

Lecture

Lecture

9 pages

Project

Project

20 pages

Lecture

Lecture

40 pages

L13b_Exam

L13b_Exam

17 pages

Lecture

Lecture

48 pages

Lecture

Lecture

10 pages

Lecture

Lecture

52 pages

21-p2p

21-p2p

16 pages

lecture

lecture

77 pages

Lecture

Lecture

18 pages

Lecture

Lecture

62 pages

Lecture

Lecture

25 pages

Lecture

Lecture

24 pages

Project

Project

20 pages

Lecture

Lecture

47 pages

Lecture

Lecture

38 pages

Lecture

Lecture

35 pages

Roundup

Roundup

45 pages

Lecture

Lecture

47 pages

Lecture

Lecture

39 pages

Lecture

Lecture

13 pages

Midterm

Midterm

22 pages

Project

Project

26 pages

Lecture

Lecture

11 pages

Project

Project

27 pages

Lecture

Lecture

10 pages

Lecture

Lecture

50 pages

Lab

Lab

9 pages

Lecture

Lecture

30 pages

Lecture

Lecture

6 pages

r05-ruby

r05-ruby

27 pages

Lecture

Lecture

8 pages

Lecture

Lecture

28 pages

Lecture

Lecture

30 pages

Project

Project

13 pages

Lecture

Lecture

11 pages

Lecture

Lecture

12 pages

Lecture

Lecture

48 pages

Lecture

Lecture

55 pages

Lecture

Lecture

36 pages

Lecture

Lecture

17 pages

Load more
Download lecture
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view lecture and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view lecture 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?