Chapter 6 the Link Layer and LANs Computer Networking
cerokin579
39 views
80 slides
Sep 08, 2024
Slide 1 of 80
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
About This Presentation
data link layer
Size: 1.82 MB
Language: en
Added: Sep 08, 2024
Slides: 80 pages
Slide Content
Computer Networking: A Top Down Approach A note on the use of these Powerpoint slides: We ’ re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) that you mention their source (after all, we ’ d like people to use our book!) If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 Chapter 6 The Link Layer and LANs 6- 1 Link Layer and LANs
Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links layer-2 packet: frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to physically adjacent node over a link 6- 2 Link Layer and LANs
Data Link Layer 5- 3
Link layer: context datagram transferred by different link protocols over different links: e.g., Ethernet on first link, frame relay on intermediate links, 802.11 on last link each link protocol provides different services e.g., may or may not provide rdt over link transportation analogy: trip from Princeton to Lausanne limo: Princeton to JFK plane: JFK to Geneva train: Geneva to Lausanne tourist = datagram transport segment = communication link transportation mode = link layer protocol travel agent = routing algorithm 6- 4 Link Layer and LANs
Link layer services framing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium “ MAC ” addresses used in frame headers to identify source, destination different from IP address! reliable delivery between adjacent nodes seldom used on low bit-error link (fiber, some twisted pair) wireless links: high error rates goal: correcting an error locally—on the link where the error occurs—rather than forcing an end-to-end retransmission of the data by a transport- or application-layer protocol 6- 5 Link Layer and LANs
error detection : errors caused by signal attenuation, noise. receiver detects presence of errors: signals sender for retransmission or drops frame error correction: receiver identifies and corrects bit error(s) without resorting to retransmission Link layer services (more) 6- 6 Link Layer and LANs
Where is the link layer implemented? in each and every host link layer implemented in “ adaptor ” (aka network interface card NIC) or on a chip Ethernet card, 802.11 card; Ethernet chipset implements link, physical layer 6- 7 Link Layer and LANs
Error detection EDC= Error Detection and Correction bits D = Data protected by error checking, may include header fields Error detection not 100% reliable! protocol may miss some errors otherwise 6- 8 Link Layer and LANs
Parity checking single bit parity: d etect single bit errors two-dimensional bit parity: detect and correct single bit errors 6- 9 Link Layer and LANs * Check out the online interactive exercises for more examples: h ttp://gaia.cs.umass.edu/kurose_ross/interactive/
Internet checksum (review) sender: treat segment contents as sequence of 16-bit integers checksum: addition (1 ’ s complement sum) of segment contents sender puts checksum value into UDP checksum field receiver: compute checksum of received segment check if computed checksum equals checksum field value: NO - error detected YES - no error detected. But maybe errors nonetheless? goal: detect “ errors ” (e.g., flipped bits) in transmitted packet (note: used at transport layer only ) 6- 10 Link Layer and LANs
Cyclic redundancy check CRC uses Generator Polynomial which is available on both sender and receiver side. n: Number of bits in data to be sent from sender side. k: Number of bits in the key obtained from generator polynomial. Sender Side: The binary data is first augmented by adding k-1 zeros in the end of the data Use modulo-2 binary division to divide binary data by the key and store remainder of division. Append the remainder at the end of the data to form the encoded data and send the same 6- 11 Link Layer and LANs
Cyclic redundancy check Receiver Side: Perform modulo-2 division again and if the remainder is 0, then there are no errors. Modulo 2 Division: The process of modulo-2 binary division is the same as the familiar division process we use for decimal numbers. Just that instead of subtraction, we use XOR here. 6- 12 Link Layer and LANs
Cyclic redundancy check Data to be sent: 100100 Key – 1101 Check if any error occurred 6- 13 Link Layer and LANs
Cyclic redundancy check Sender side Receiver side Link Layer and LANs 6- 14
Multiple access links, protocols two types of “ links ” : point-to-point PPP for dial-up access point-to-point link between Ethernet switch, host broadcast (shared wire or medium) old-fashioned Ethernet upstream HFC 802.11 wireless LAN shared wire (e.g., cabled Ethernet) shared RF (e.g., 802.11 WiFi) shared RF (satellite) humans at a cocktail party (shared air, acoustical) 6- 15 Link Layer and LANs
Multiple access protocols single shared broadcast channel two or more simultaneous transmissions by nodes: interference collision if node receives two or more signals at the same time multiple access protocol distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit 6- 16 Link Layer and LANs
MAC protocols: taxonomy three broad classes: channel partitioning divide channel into smaller “ pieces ” (time slots, frequency, code) allocate piece to node for exclusive use random access channel not divided, allow collisions “ recover ” from collisions “ taking turns ” nodes take turns, but nodes with more to send can take longer turns 6- 17 Link Layer and LANs
Channel partitioning MAC protocols: TDMA TDMA: time division multiple access access to channel in "rounds" each station gets fixed length slot in each round unused slots go idle example: 6-station LAN, 1,3,4 have packets to send, slots 2,5,6 idle 1 3 4 1 3 4 6-slot frame 6-slot frame 6- 18 Link Layer and LANs
FDMA: frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go idle example: 6-station LAN, 1,3,4 have packet to send, frequency bands 2,5,6 idle frequency bands time FDM cable Channel partitioning MAC protocols: FDMA 6- 19 Link Layer and LANs
Random access protocols when node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes ➜ “ collision ” , random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA 6- 20 Link Layer and LANs
Pure (unslotted) ALOHA when frame first arrives transmit immediately each without checking whether the channel is idle or not collision: frame sent at t collides with other frames sent in [t -1,t +1] 6- 21 Link Layer and LANs
Pure (unslotted) ALOHA Station expects the acknowledgement from the receiver, and if the acknowledgement of the frame is received at the specified time, then it will be OK; Otherwise, the station assumes that the frame is destroyed. Then station waits for a random amount of time, and after that, it retransmits the frame until all the data are successfully transmitted to the receiver. 6- 22 Link Layer and LANs
Pure ALOHA efficiency P(success by given node) = P(node transmits) . P(no other node transmits in [t -1,t ] . P(no other node transmits in [t -1,t ] = p . (1-p) N-1 . (1-p) N-1 = p . (1-p) 2(N-1) … choosing optimum p and then letting n = 1/(2e) = .18 6- 23 Link Layer and LANs
Slotted ALOHA assumptions: all frames same size time divided into equal size slots (time to transmit 1 frame) nodes start to transmit only slot beginning nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision operation: when node obtains fresh frame, transmits in next slot if no collision: node can send new frame in next slot if collision: node retransmits frame in each subsequent slot with prob. p until success 6- 24 Link Layer and LANs
Pros: single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons: collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization Slotted ALOHA 1 1 1 1 2 3 2 2 3 3 node 1 node 2 node 3 C C C S S S E E E 6- 25 Link Layer and LANs
suppose: N nodes with many frames to send, each transmits in slot with probability p prob that given node has success in a slot = p(1-p) N-1 prob that any node has a success = Np(1-p) N-1 max efficiency: find p* that maximizes Np(1-p) N-1 for many nodes, take limit of Np*(1-p*) N-1 as N goes to infinity, gives: max efficiency = 1/e = .37 efficiency : long-run fraction of successful slots (many nodes, all with many frames to send) at best: channel used for useful transmissions 37% of time! ! Slotted ALOHA: efficiency 6- 26 Link Layer and LANs
Data Link Layer 5- 27 In slotted and unslotted ALOHA, a node neither pays attention to whether another node happens to be transmitting when it begins to transmit, nor stops transmitting if another node begins to interfere with its transmission
CSMA (carrier sense multiple access) CSMA : listen before transmit: if channel sensed idle: transmit entire frame if channel sensed busy , defer transmission human analogy: don ’ t interrupt others! 6- 28 Link Layer and LANs
CSMA collisions collisions can still occur: propagation delay means two nodes may not hear each other ’ s transmission collision: entire packet transmission time wasted distance & propagation delay play role in in determining collision probability spatial layout of nodes 6- 29 Link Layer and LANs
CSMA/CD (collision detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time colliding transmissions aborted, reducing channel wastage collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed by local transmission strength human analogy: the polite conversationalist 6- 30 Link Layer and LANs
CSMA/CD (collision detection) spatial layout of nodes 6- 31 Link Layer and LANs
Ethernet CSMA/CD algorithm 1. NIC receives datagram from network layer, creates frame 2. If NIC senses channel idle, starts frame transmission. If NIC senses channel busy, waits until channel idle, then transmits. 3. If NIC transmits entire frame without detecting another transmission, NIC is done with frame ! 4. If NIC detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, NIC enters binary (exponential) backoff: after m th collision, NIC chooses K at random from {0,1,2, …, 2 m -1} . NIC waits K · 512 bit times, returns to Step 2 longer backoff interval with more collisions 6- 32 Link Layer and LANs
Binary Exponential Backoff A node attempts to transmit a frame for the first time and while transmitting it detects a collision. The node then chooses k = 0 with probability 0.5 or chooses k = 1 with probability 0.5. If the node chooses k = 0 , it immediately begins sensing the channel. If the node chooses k = 1 , it waits 512 bit times before beginning the sense-and-transmit-when-idle cycle. After a second collision, K is chosen with equal probability from {0,1,2,3}. After three collisions, K is chosen with equal probability from {0,1,2,3,4,5,6,7}. After 10 or more collisions, K is chosen with equal probability from {0,1,2,…, 1023}. Thus, the size of the sets from which K is chosen grows exponentially with the number of collisions 6- 33 Link Layer and LANs
CSMA/CD efficiency T prop = max prop delay between 2 nodes in LAN t trans = time to transmit max-size frame efficiency goes to 1 as t prop goes to 0 as t trans goes to infinity better performance than ALOHA: and simple, cheap, decentralized ! 6- 34 Link Layer and LANs
“ Taking turns ” MAC protocols channel partitioning MAC protocols: share channel efficiently and fairly at high load inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! random access MAC protocols efficient at low load: single node can fully utilize channel high load: collision overhead “ taking turns ” protocols look for best of both worlds! 6- 35 Link Layer and LANs
polling: master node “ invites ” slave nodes to transmit in turn advantage: no collision disadvantage : polling delay single point of failure (master) master slaves poll data data “ Taking turns ” MAC protocols 6- 36 Link Layer and LANs
token passing: control token passed from one node to next sequentially. advantage: decentralized disadvantage : the failure of one node can crash the entire channel. T data (nothing to send) T “ Taking turns ” MAC protocols 6- 37 Link Layer and LANs
MAC addresses 32-bit IP address: network-layer address for interface used for layer 3 (network layer) forwarding MAC (or LAN or physical or Ethernet) address: function: used ‘locally” to get frame from one interface to another physically-connected interface (same network, in IP-addressing sense) 48 bit MAC address (for most LANs) burned in NIC ROM, also sometimes software settable e.g.: 1A-2F-BB-76-09-AD hexadecimal (base 16) notation (each “ numeral ” represents 4 bits) 6- 38 Link Layer and LANs
MAC addresses (more) MAC address allocation administered by IEEE manufacturer buys portion of MAC address space (to assure uniqueness) analogy: MAC address: like Social Security Number IP address: like postal address MAC flat address ➜ portability can move LAN card from one LAN to another IP hierarchical address not portable address depends on IP subnet to which node is attached 6- 39 Link Layer and LANs
MAC addresses and ARP Each network interface in a device has unique MAC address adapter 1A-2F-BB-76-09-AD 58-23-D7-FA-20-B0 0C-C4-11-6F-E3-98 71-65-F7-2B-08-53 LAN (wired or wireless) 6- 40 Link Layer and LANs
ARP: address resolution protocol ARP table: each IP node (host, router) on LAN has table IP/MAC address mappings for some LAN nodes: < IP address; MAC address; TTL> TTL (Time To Live): time after which address mapping will be forgotten (typically 20 min) Question: how to determine interface’s MAC address, knowing its IP address? 1A-2F-BB-76-09-AD 58-23-D7-FA-20-B0 0C-C4-11-6F-E3-98 71-65-F7-2B-08-53 LAN 137.196.7.23 137.196.7.78 137.196.7.14 137.196.7.88 6- 41 Link Layer and LANs
ARP: address resolution protocol ARP table: each IP node (host, router) on LAN has table IP/MAC address mappings for some LAN nodes: < IP address; MAC address; TTL> TTL (Time To Live): time after which address mapping will be forgotten (typically 20 min) 6- 42 Link Layer and LANs
ARP protocol: same LAN A wants to send datagram to B B ’ s MAC address not in A ’ s ARP table. A broadcasts ARP query packet, containing B's IP address destination MAC address = FF-FF-FF-FF-FF-FF all nodes on LAN receive ARP query B receives ARP packet, replies to A with its (B's) MAC address frame sent to A ’ s MAC address (unicast) A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state: information that times out (goes away) unless refreshed ARP is “ plug-and-play ” : nodes create their ARP tables without intervention from net administrator 6- 43 Link Layer and LANs
Data Link Layer 5- 44 ARP request is broadcast ARP reply is unicast
walkthrough : send datagram from A to B via R focus on addressing – at IP (datagram) and MAC layer (frame) assume A knows B ’ s IP address assume A knows IP address of first hop router, R (how?) assume A knows R ’ s MAC address (how?) Addressing: routing to another LAN R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4B CC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B 6- 45 Link Layer and LANs
R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4B CC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN IP Eth Phy IP src: 111.111.111.111 IP dest: 222.222.222.222 A creates IP datagram with IP source A, destination B A creates link-layer frame with R's MAC address as destination address, frame contains A-to-B IP datagram MAC src: 74-29-9C-E8-FF-55 MAC dest: E6-E9-00-17-BB-4B 6- 46 Link Layer and LANs
R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4B CC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN IP Eth Phy frame sent from A to R IP Eth Phy frame received at R, datagram removed, passed up to IP MAC src: 74-29-9C-E8-FF-55 MAC dest: E6-E9-00-17-BB-4B IP src: 111.111.111.111 IP dest: 222.222.222.222 IP src: 111.111.111.111 IP dest: 222.222.222.222 6- 47 Link Layer and LANs
R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4B CC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN IP src: 111.111.111.111 IP dest: 222.222.222.222 R forwards datagram with IP source A, destination B R creates link-layer frame with B's MAC address as destination address, frame contains A-to-B IP datagram MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP Eth Phy IP Eth Phy 6- 48 Link Layer and LANs
R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4B CC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN R forwards datagram with IP source A, destination B R creates link-layer frame with B's MAC address as destination address, frame contains A-to-B IP datagram IP src: 111.111.111.111 IP dest: 222.222.222.222 MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP Eth Phy IP Eth Phy 6- 49 Link Layer and LANs
R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4B CC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN R forwards datagram with IP source A, destination B R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram IP src: 111.111.111.111 IP dest: 222.222.222.222 MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP Eth Phy 6- 50 Link Layer and LANs * Check out the online interactive exercises for more examples: h ttp://gaia.cs.umass.edu/kurose_ross/interactive/
Ethernet “ dominant ” wired LAN technology: first widely used LAN technology simpler, cheap kept up with speed race: 10 Mbps – 10 Gbps Metcalfe ’ s Ethernet sketch 6- 51 Link Layer and LANs
Ethernet: physical topology bus: popular through mid 90s all nodes in same collision domain (can collide with each other) star: prevails today active switch in center each “ spoke ” runs a (separate) Ethernet protocol (nodes do not collide with each other) switch bus: coaxial cable star 6- 52 Link Layer and LANs
Ethernet frame structure sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame preamble: 7 bytes with pattern 10101010 followed by one byte with pattern 10101011 used to inform the receiver that a frame is coming dest. address source address data (payload) CRC preamble type 6- 53 Link Layer and LANs
Ethernet frame structure (more) addresses: 6 byte source, destination MAC addresses if adapter receives frame with matching destination address, or with broadcast address (e.g. ARP packet), it passes data in frame to network layer protocol otherwise, adapter discards frame type: indicates higher layer protocol a value of 0x0800 indicates that the payload is an IP packet, while a value of 0x0806 indicates that the payload is an ARP packet CRC: cyclic redundancy check at receiver error detected: frame is dropped dest. address source address data (payload) CRC preamble type 6- 54 Link Layer and LANs
Ethernet: unreliable, connectionless connectionless: no handshaking between sending and receiving NICs unreliable: receiving NIC doesn't send acks or nacks to sending NIC data in dropped frames recovered only if initial sender uses higher layer rdt (e.g., TCP), otherwise dropped data lost 6- 55 Link Layer and LANs
Ethernet switch link-layer device: takes an active role store, forward Ethernet frames examine incoming frame ’ s MAC address, selectively forward frame to one-or-more outgoing links when frame is to be forwarded on segment transparent hosts are unaware of presence of switches plug-and-play, self-learning switches do not need to be configured 6- 56 Link Layer and LANs
Switch: multiple simultaneous transmissions hosts have dedicated, direct connection to switch switches buffer packets Ethernet protocol used on each incoming link, but no collisions; full duplex switching: A-to-A ’ and B-to-B ’ can transmit simultaneously, without collisions switch with six interfaces ( 1,2,3,4,5,6 ) A A ’ B B ’ C C ’ 1 2 3 4 5 6 6- 57 Link Layer and LANs
Switch primarily has four functions Learning Flooding Forwarding Filtering 6- 58 Link Layer and LANs switch with six interfaces ( 1,2,3,4,5,6 ) A A ’ B B ’ C C ’ 1 2 3 4 5 6
Switch: Learning a Switch will use the Source MAC address and Destination MAC address to make its forwarding decisions. One of the goals of the Switch is to create a MAC Address Table, mapping each of its switchports to the MAC address of the connected devices. 6- 59 Link Layer and LANs switch with six interfaces ( 1,2,3,4,5,6 ) A A ’ B B ’ C C ’ 1 2 3 4 5 6
Data Link Layer 5- 60 Switch forwarding table
Switch: Learning The MAC address table starts out empty, and every time a Switch receives anything, it takes a look at the Source MAC address field of the incoming frame. It uses the Source MAC and the switchport the frame was received on to build an entry in the MAC Address Table. Sooner or later, as each connected device inevitably sends something, the Switch will have a fully populated MAC Address Table. This table can then be used to smartly forward frames to their intended destination. 6- 61 Link Layer and LANs
A A ’ B B ’ C C ’ 1 2 3 4 5 6 Switch: self-learning switch learns which hosts can be reached through which interfaces when frame received, switch “ learns ” location of sender: incoming LAN segment records sender/location pair in switch table A A ’ Source: A Dest: A ’ MAC addr interface TTL Switch table (initially empty) A 1 60 6- 62 Link Layer and LANs
Switch: Flooding a Switch will at some point receive a frame destined to a MAC address of which the Switch does not know the location. In such cases, the Switch’s only option is to simply duplicate the frame and send it out all ports. This action is known as Flooding. Flooding assures that if the intended device exists and if it is connected to the switch, it will definitely receive the frame. 6- 63 Link Layer and LANs
Switch: Flooding Of course, so will every other device connected to that particular Switch. And though not ideal, this is perfectly normal. The NIC of each connected device will receive the frame and take a look at the Destination MAC address field. If they are not the intended recipient, they will simply silently drop the frame. When the intended device receives the frame, a response will be generated, which when sent to the Switch will allow the switch to learn and create a MAC Address Table mapping that unknown device to its switchport. 6- 64 Link Layer and LANs
Switch: Forwarding Ideally, the Switch will have an entry in its MAC Address Table for every Destination MAC it comes across. When this happens, the Switch happily forwards the frame out the appropriate switchport. 6- 65 Link Layer and LANs
Switch: Filtering a Switch will never forward a frame back out the same port which received the frame. Most commonly, this happens when a Switch needs to flood a frame — the frame will get duplicated and sent out every switchport except the switchport which received the frame. Rarely, a host will send a frame with a destination MAC address of itself. This is usually a host experiencing some sort of error condition or being malicious. Either way, when this happens, the Switch simply discards the frame. 6- 66 Link Layer and LANs
A A ’ B B ’ C C ’ 1 2 3 4 5 6 Switch in action A A ’ Source: A Dest: A ’ MAC addr interface TTL switch table (initially empty) A 1 60 A A ’ A A ’ A A ’ A A ’ A A ’ frame destination, A’, location unknown: flood A ’ A destination A location known: A ’ 4 60 selectively send on just one link 6- 67 Link Layer and LANs
Interconnecting switches self-learning switches can be connected together: Q: sending from A to G - how does S 1 know to forward frame destined to G via S 4 and S 3 ? A: self learning! (works exactly the same as in single-switch case!) A B S 1 C D E F S 2 S 4 S 3 H I G 6- 68 Link Layer and LANs
Self-learning multi-switch example Suppose C sends frame to I, I responds to C Q: show switch tables and packet forwarding in S 1 , S 2 , S 3 , S 4 A B S 1 C D E F S 2 S 4 S 3 H I G 6- 69 Link Layer and LANs
Switches vs. routers both are store-and-forward: routers: network-layer devices (examine network-layer headers) switches : link-layer devices (examine link-layer headers) both have forwarding tables: routers: compute tables using routing algorithms, IP addresses switches: learn forwarding table using flooding, learning, MAC addresses application transport network link physical network link physical link physical switch datagram application transport network link physical frame frame frame datagram 6- 70 Link Layer and LANs
Institutional network to external network router IP subnet mail server web server 6- 71 Link Layer and LANs
Practice 6- 72 Link Layer and LANs Suppose, A wants to send a packet to D Solution: https://www.youtube.com/watch?v=rYodcvhh7b8&ab_channel=PracticalNetworking
Synthesis: a day in the life of a web request journey down protocol stack complete! application, transport, network, link putting-it-all-together: synthesis! goal: identify, review, understand protocols (at all layers) involved in seemingly simple scenario: requesting www page scenario: student attaches laptop to campus network, requests/receives www.google.com 6- 73 Link Layer and LANs
A day in the life: scenario Comcast network 68.80.0.0/13 Google ’ s network 64.233.160.0/19 64.233.169.105 web server DNS server school network 68.80.2.0/24 web page browser 6- 74 Link Layer and LANs
router (runs DHCP) A day in the life… connecting to the Internet connecting laptop needs to get its own IP address, addr of first-hop router, addr of DNS server: use DHCP DHCP UDP IP Eth Phy DHCP DHCP DHCP DHCP DHCP DHCP UDP IP Eth Phy DHCP DHCP DHCP DHCP DHCP DHCP request encapsulated in UDP , encapsulated in IP , encapsulated in 802.3 Ethernet Ethernet frame broadcast (dest: FFFFFFFFFFFF) on LAN, received at router running DHCP server Ethernet demuxed to IP demuxed, UDP demuxed to DHCP 6- 75 Link Layer and LANs
router (runs DHCP) DHCP server formulates DHCP ACK containing client ’ s IP address, IP address of first-hop router for client, name & IP address of DNS server DHCP UDP IP Eth Phy DHCP DHCP DHCP DHCP DHCP UDP IP Eth Phy DHCP DHCP DHCP DHCP DHCP encapsulation at DHCP server, frame forwarded ( switch learning ) through LAN, demultiplexing at client Client now has IP address, knows name & addr of DNS server, IP address of its first-hop router DHCP client receives DHCP ACK reply A day in the life… connecting to the Internet 6- 76 Link Layer and LANs
router (runs DHCP) A day in the life… ARP (before DNS, before HTTP) before sending HTTP request, need IP address of www.google.com: DNS DNS UDP IP Eth Phy DNS DNS DNS DNS query created, encapsulated in UDP, encapsulated in IP, encapsulated in Eth. To send frame to router, need MAC address of router interface: ARP ARP query broadcast, received by router, which replies with ARP reply giving MAC address of router interface client now knows MAC address of first hop router, so can now send frame containing DNS query ARP query Eth Phy ARP ARP ARP reply 6- 77 Link Layer and LANs
router (runs DHCP) DNS UDP IP Eth Phy DNS DNS DNS DNS DNS IP datagram containing DNS query forwarded via LAN switch from client to 1 st hop router IP datagram forwarded from campus network into Comcast network, routed (tables created by RIP, OSPF, IS-IS and/or BGP routing protocols) to DNS server demux ed to DNS server DNS server replies to client with IP address of www.google.com Comcast network 68.80.0.0/13 DNS server DNS UDP IP Eth Phy DNS DNS DNS DNS A day in the life… using DNS 6- 78 Link Layer and LANs
router (runs DHCP) A day in the life…TCP connection carrying HTTP HTTP TCP IP Eth Phy HTTP to send HTTP request, client first opens TCP socket to web server TCP SYN segment (step 1 in 3-way handshake) inter-domain routed to web server TCP connection established! 64.233.169.105 web server SYN SYN SYN SYN TCP IP Eth Phy SYN SYN SYN SYNACK SYNACK SYNACK SYNACK SYNACK SYNACK SYNACK web server responds with TCP SYNACK (step 2 in 3-way handshake) 6- 79 Link Layer and LANs
router (runs DHCP) A day in the life… HTTP request/reply HTTP TCP IP Eth Phy HTTP HTTP request sent into TCP socket IP datagram containing HTTP request routed to www.google.com IP datagram containing HTTP reply routed back to client 64.233.169.105 web server HTTP TCP IP Eth Phy web server responds with HTTP reply (containing web page) HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP HTTP web page finally (!!!) displayed 6- 80 Link Layer and LANs