Additional Materials for Data Link Layer
1 TOC
Frames Error Control, Correction & Detection Schemes Flow Control Sublayers of the Data Link HDLC & PPP Media Access Control (MAC) IEEE802.3 families (Ethernet) Requirements for the Data Link, and Bridges
Information Network 1 / 20132012 2 Frames
Information Network 1 / 20132012 3 Frame
Data link layer Protocol Data Unit (PDU) – Defining the frame borders (delimiters) Can determine if any failures (bit errors) was made – Adding error-detecting / error-correcting code to bit sequences in order to delimit the appropriate frame length Frame header – error detection and flow control – control information
01111110 address control data checksum 01111110
header payload
Information Network 1 / 20132012 4
Frame Synchronization (1)
Character-based frame synchronization – Physical layer transmits data based on character unit. • CCITT X.21 – physical layer frame is 8bit – coding format ASCII(IA5) – Insertion of a special character at the header and footer of the data transmission. • STX, ETX – Data identification by DLE (Data Link Escape) • Possibility to “escape” special character sequences during transmission of binary data • character stuffing
Information Network 1 / 20132012 5 Frame Synchronization (2)
Original Data
“B” DLE “A”
Transmission Sequence
ETX DLE “B” DLE DLE “A” STX DLE
transmission
data frame
character stuffing
Information Network 1 / 20132012 6 Frame Synchronization (3)
Bit-sequence-based frame synchronization – A special bit sequence is inserted to the data header and footer. • synchronization – Insertion of a bit sequence composed of the “same” bit • bit stuffing – special bit sequence only appears at the frame header and footer – e.g. • special bit sequence: 01111110 • if sender detects “11111” in data, it “stuffs” a “0” right after. • if receiver detects “11111” in data, it deletes the following stuffed “0”.
01111110 address control data checksum 01111110
Information Network 1 / 20132012 7 Frame Synchronization (4)
Original Data
01011111111110011
Transmission Sequence
end bit pattern start bit pattern 01111110 0100111110111110011 01111110
transmission
bit stuffing
Information Network 1 / 20132012 8 Error Control, Correction & Detection Schemes
Information Network 1 / 20132012 9 Error Detection with Parity Bit
A parity bit is a bit (0 or 1) that is added to a block of data – ensure that data is not corrupted during the transfer process – detect single bit error • if 2 bits are flipped instead of one, the parity check will pass and an error will be missed Every 7 bits of data may include a parity bit – If the data transmission protocol is set to an odd parity, each packet must have an odd parity – If it is set to even, each packet must have an even parity
Odd parity Even parity • Initial value: 1010101 (four 1s) • Initial value: 1010101 (four 1s) • Parity bit added: 1 • Parity bit added: 0 • Transmitted value: 10101011 • Transmitted value: 10101010 • Result: odd parity (five 1s) • Result: even parity (four 1s)
Information Network 1 / 20132012 10 Cyclic Redundancy Check (1)
It can detect consecutive bits error (burst error) Adds a failure detection CRC check bit after the frame. Polynomial representation of the bit sequence. – n-bit sequence
• (an-1, ….., a1, a0) ※ ai : 0 or 1 – polynomial expression n-1 2 • F(x)=an-1x +…+a2x +a1x+a0 Calculates polynomial expression. – modulo 2 – equivalent to an eXclusive OR
Information Network 1 / 20132012 11 Cyclic Redundancy Check (2)
Calculation procedure – Generate the generator polynomial G(x) of order r (r < m) – In the case a node sends an m-bit frame, the polynomial expression is M(x) (order m-1)
– Generate xrM(x) by adding r bits “0” to the frame tail. – Calculate a remainder R(x) by dividing the polynomial expression xrM(x) by G(x).
– Generate F(x), the code to be sent • F(x) = xrM(x) + R(x)
Information Network 1 / 20132012 12 Cyclic Redundancy Check (3)
Error detection – F(x) is always divisible by G(x) – If F(x) is not divisible by G(x), there is a remainder – Burst error less than r-bit long is detectable – Other remainders depend on G(x)
Information Network 1 / 20132012 13 Standardized CRC (1)
Typical standards – CRC-12 • x12+x11+x3+x2+x+1 – CRC-16 • x16+x15+x2+1 – CRC-32 • x32+x26+x23+x22+x16+x12+ x11+x10+x8+x7+ x5+x4+x2+x+1 – CRC-CCITT • x16+x12+x5+1
There exist many other CRC standards.
Information Network 1 / 20132012 14 Standardized CRC (2)
Application – CRC-12 for 6-bit character expression – CRC-16 and CRC-CCITT for 8-bit character expression Detection Characteristics (CRC-16 and CRC-CCITT) – all single- and two-consecutive-bit errors – all odd-bit number errors – burst errors less than 16-bit long – 99.997% of burst errors less than 17-bit – 99.998% of burst errors more than 18-bit
Information Network 1 / 20132012 15 Error Correction Code
Error Correction Code – Hamming code – Distance between codes • “a”-bit error detection : >a+1 • “b”-bit error correction : >2b+1
a
1 1 b
Information Network 1 / 20132012 16 Flow Control
Information Network 1 / 20132012 17 Flow Control
Flow Control Protocols deal with how to send sequences of DLL frames They have two jobs: – Recover from lost frames – Prevent buffer overflows Network Layer must receive same set of frames in the same order they were sent Automatic Repeat Request (ARQ) – Stop-and-wait – Go-back-N – Selective-repeat
Information Network 1 / 20132012 18 Unrestricted
Sender send Problem: receiver’s buffers Receiver waits to receive may fill up
Information Network 1 / 20132012 19 Stop-and-wait ARQ (1)
Sender t1 t5
t4
t1 t2 t3 Receiver
t1: Round Trip Time t2: Frame Transmission Time t3: Frame Processing Time t4: ACK Transmission Time t5: ACK Processing Time
Information Network 1 / 20132012 20 Stop-and-wait ARQ (2)
Procedure – Waiting to receive ACK on each frame transmission – Setting a sender timer greater than
2t1+t2+t3+t4 – Retransmission when sender timer times out. Characteristics – Simple – The buffer never contains more than one frame for the receiver and the sender – Line usage rate is extremely bad
Information Network 1 / 20132012 21 Go-back-N ARQ (1)
Procedure – Improving Stop-and-Wait Protocol. – Transmitting a frame in series. – Error detection • A frame in which an error has been detected is dropped until the frame is correctly received.
• No ACK is returned until the frame is correctly received.
Information Network 1 / 20132012 22 Go-back-N ARQ (2)
Time out for Frame3
!! 1 2 3 4 5 3 4 5 6
1 2 4 5 3 4 5 6
Information Network 1 / 20132012 23 Go-back-N ARQ (3)
Characteristics – Wastefulness : upon error detection, correct frames received after the error are also dropped. • Especially, setting a bigger value to the retransmission timer is a disadvantage. – On the sender side, a buffer is necessary for retransmission. • For frames that did not receive an ACK, buffering is necessary to enforce retransmission. • The “N” in Go-back-N corresponds to the number of frames sent without receiving an ACK (on-the-fly frames) • Buffer depends on the retransmission timer value.
Information Network 1 / 20132012 24 Selective-Repeat ARQ (1)
Methods – Improving Go-back-N protocol. – Only retransmitting necessary frames (erroneous frames). Characteristics – Transmission efficiency is better than Go-back-N. • Not dropping correct frames uselessly. – Processing is complex. • Needs a buffer on the receiver side. • Frame sequence control is necessary.
Information Network 1 / 20132012 25 Selective-Repeat ARQ (2)
Time out for Frame3
!! 1 2 3 4 5 3 6 7 8
1 2 4 5 3 6 7 8
Information Network 1 / 20132012 26 Flow control
Stop-and-Wait and Go-back-N don’t have a complex processing on the receiver side. In Selective-Repeat, sequence control is enforced on the receiver side. – Buffer on the receiver side – When sender-side processing does not perform well, there is a possibility that an overflow occurs on the receiver side. Flow control – Overflow control between the receiver and sender using some methods.
Information Network 1 / 20132012 27 Window Flow Control
Window flow control – W : window size • Considering a same buffer size for the receiver. – On sender side, let Nr be in (1) the number of already sent frames, (2) those that did not receive an ACK. – Transmitting until Nr < W – Sliding window flow control
Information Network 1 / 20132012 28 Windows Flow Control
Sender keep frame until ACK is received sent frame sendable frame(maximum size W)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 …
already received ACK last sent frame if sent If ACK is received move to right move to right Receiver received frame receivable frame(maximum size W)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 …
already transmitted ACK if received if ACK is sent last received frame Informationmove to rightNetwork 1 / 2012move to right 29
Summarize – Role Allocation
Role allocation depends on a system design Various solutions exist
Transport sequence assurance flow control Network retransmission surveillance of network error detection and correction Data Link frame range
Information Network 1 / 20132012 30 Sublayers of the Data Link
Information Network 1 / 20132012 31 From monolithic structure to sub-layered structure
Data link basic concepts were formed from the technologies using point-to-point connection type data link back in the 1960s. LAN standardization from the late 1970s moved to sub-layered structure. – Architecture of ISO/OSI 8802 and IEEE802 groups. – Constructing a common IEEE802.2 (ISO8802/2) Logical Link Control (LLC) – IEEE802.x specialized for each medium
Information Network 1 / 20132012 32 Sublayers of the Data Link Layer
ISO/OSI Local Area CCITT Data link Network Layer Network Definitions (8802) Layer Definition
Logical Link 8802/2 LLC Control Sublayer CCITT X.25 Data link Layer (HDLC/LAPB) Media Access 8802/3 8802/4 8802/5 Control Sublayer CSMA/CD Token Bus Token Ring
Physical Layer
Information Network 1 / 20132012 33 Logical Link Control (LLC) (1)
Unacknowledged Connectionless Service (LLC type1) – Transmitting frame without synchronization between sender and receiver. – No special processing, upon error detection. • Enforcing error control in upper layers. – Control method for high speed and errorless links. – LAN, real-time traffic (voice/speech)
Acknowledged Connection-oriented Service (LLC type2) – Setting up a connection, before data transmission • Enabling synchronized processing between sender and receiver – Ensuring reliability (error and sequence) – Processing is usually complex – For low speed and error-prone links
Information Network 1 / 20132012 34 Logical Link Control (LLC) (2)
Acknowledged connectionless Service (LLC type3) – Receiver sends ACK for each frame. – Enforcing error control at data link layer level – Improving reliability Unacknowledged Connection-oriented Service – Not ensuring reliability (error and sequence) – Control method for high speed and errorless links.
Information Network 1 / 20132012 35 Media Access Control (MAC) (1)
Data link layer provides packet send/ receive service to network layer
Physical Layer provides binary send/receive to data link layer
Different media have different constraints about multiple nodes accessing the medium
We want to reserve the medium for a longer space of time!
Information Network 1 / 20132012 36 Media Access Control (MAC) (2)
MAC layer provides medium access service to the data link layer
A separate protocol is needed to implement the service for each different transmission medium
Next class: learn about channel allocation (multiplexing)
Information Network 1 / 20132012 37 HDLC & PPP
Information Network 1 / 20132012 38 High-Level Data Link Control (HDLC)
A bit-oriented synchronous data link layer protocol developed by the ISO It provides both connection-oriented and connectionless service It is still widely used nowadays even if it is an old protocol – Employed in public data communication networks such as ISDN – Existing online network, e.g., online banking system
Information Network 1 / 20132012 39 HDLC Frame (1)
Address: identifies a communication station (terminal) Control: information for communication control Data: information to be transmitted Checksum: CRC-CCITT
Information Network 1 / 20132012 40 HDLC Frame (2) – Control Field
Control field of: (a) an information frame (b) a supervisory frame (c) an unnumbered frame
Information Network 1 / 20132012 41 HDLC Frame (3) – Control Field
Definition of three main types of frames: – Information frame (I-frame) • carry the data to be transmitted for the user • flow- and error-control data are piggybacked on an information frame – Supervisory frame (S-frame) • provide the ARQ mechanism when piggybacking is not used – Unnumbered frame (U-frame) • provide supplemental link control functions, e.g., link termination
Information Network 1 / 20132012 42 X.25
WAN: Wide Area Network – This technology was built at a time when LAN (Local Area Network) and WAN were connected through different technologies – A communication network used by telephone engineers • Nowadays, almost extinct • e.g., ISDN Approved as an international standard – CCITT standard → ITU-T standard Layer 1 – Layer 3 of the OSI reference model – Network layer: PLP – Data link layer: HDLC (ITU-T), LAPB (CCITT) – Physical layer: X.21 bis
Information Network 1 / 20132012 43 X.25 Network Model
DTE DTE DCE PSN
PSE DCE
DTE: Data Terminal Equipment DCE: Data Circuit terminating Equipment DTE PSE: Packet Switch Exchange DCE PSN: Packet Switch Network
Information Network 1 / 20132012 44 Point-to-Point Protocol (PPP)
PPP design requirement (RFC 1557) – Packet framing: encapsulation of network-layer datagram in data link frame • Carry network layer data of any network layer protocol (not just IP) at the same time • Ability to demultiplex upwards – Bit transparency: must carry any bit pattern in the data field – Error detection: (no correction) – Connection liveness: detect signal link failure to network layer – Network layer address negotiation: endpoint can learn/configure each other’s network address Error recovery, flow control, data re-ordering are all relegated to higher layers PPP over SONET/SDH – 2-point connection in large-scale or long-distance
Information Network 1 / 20132012 45 PPP Data Control Protocol
Before exchanging data in the network layer, data link peers must do the following: – configure PPP link (max frame length, authentication) – learn/configure network layer information – For IP: carry IP Control Protocol (IPCP) messages to configure/ learn IP address
Information Network 1 / 20132012 46 PPP Phase Diagram
A simplified phase diagram for bringing a line up and down.
Information Network 1 / 20132012 47 Media Access Control (MAC)
Information Network 1 / 20132012 48 Access Channel
Two types of “links”: – Point-to-point • PPP for dial-up access • Point-to-point link between Ethernet switch and host – Broadcast (shared wire or medium) • Traditional Ethernet • 802.11 wireless LAN
Information Network 1 / 20132012 49 MAC Protocols (1)
Single shared broadcast channel – Two or more simultaneous transmissions by nodes: interference – Collision if node receives two or more signals at the same time Ideal Media Access Protocol – When one node wants to transmit, it can send at rate R – When M nodes want to transmit, each can send at average rate R/ M – Fully decentralized: • No special node to coordinate transmissions • No synchronization of clocks, slots – Simple
Information Network 1 / 20132012 50 MAC Protocols (2)
Three techniques: Channel Partitioning – Divide channel into smaller “pieces” (time slots, frequency, code) – Allocate piece to node for exclusive use Random Access – Channel not divided, allow collisions – “Recover” from collisions Taking turns – Nodes take turns – Nodes with more to send can take longer turns
Information Network 1 / 20132012 51 TDMA (1)
Time Division Multiple Access – Access to channel in "rounds" – Divide the medium into different time slots – Each station gets fixed length slot • Length = packet transmission time in each round – A single frame is composed of N slots – Terminal uses a specific slot – Unused slots go idle frame (N=8)
terminal B terminal A
Information Network 1 / 20132012 52 TDMA (2)
Slot reservation and release – Easy: Statistically multiplexing • Assigned by administrator beforehand – Dynamic assignment is complex • Special function is necessary in terminals Time synchronization – Slot is determined on a time basis – Time synchronization between terminals and switching nodes is necessary
Information Network 1 / 20132012 53 TDMA (3)
Time-Division fails with heterogeneous traffic
Information Network 1 / 20132012 54 From TDMA to ATM (digression)
TDMA is a widely used medium access technology – It is simple as it is multiplexing technology – Can guarantee its performance – TDMA is still used in many products • Based on STM (Synchronous transfer mode) • Synchronous networks were widely used until now TDMA has hardships to accommodate LAN traffic – No guarantee for terminal’s time synchronization – Unable to estimate bandwidth used by terminal beforehand Arrival of ATM – Accepts LAN traffic – Aims at performance using multiplexing like TDMA – Asynchronous Transfer Mode
Information Network 1 / 20132012 55 FDMA
Frequency Division Multiple Access – Channel spectrum divided into frequency bands – Each station assigned fixed frequency band – Unused transmission time in frequency bands go idle
1
2
Frequency 3
Time
Information Network 1 / 20132012 56 FDMA (2)
Frequency-Division fails with bursty traffic
Information Network 1 / 20132012 57 OFDM
Orthogonal Frequency Division Multiplexing State-of-the-art high bandwidth digital communication use OFDM – Terrestrial Video Broadcasting in Japan and Europe – ADSL High Speed Modem – WLAN such as IEEE 802.11a/g/n – WiMAX as IEEE 802.16d/e – 4G
Information Network 1 / 20132012 58 Digital Modulation Basics
Digital modulation modulates three parameters of sinusoidal signal.
– A, θk, fc,
s(t) = A⋅cos(2π ⋅ fc ⋅t +θk ) Three type digital modulation: – ASK : Amplitude Shift Keying – PSK : Phase Shift Keying – FSK : Frequency Shift Keying
OFDM uses combination of ASK and PSK such as – Quadrature Amplitude Modulation (QAM)
Information Network 1 / 20132012 59 Symbol Waveform
Digital Information 1 0 1 0 0 carrier
ASK
PSK
FSK
Symbol length
Information Network 1 / 20132012 60 Japan Terrestrial Television Broadcasting (1)
Integrated Services Digital Broadcasting for Terrestrial Television Broadcasting (ISDB-T) Full service area coverage on 2006 – Analog Service ended in 2011 5.6MHz BW is divided into 13 OFDM segments (~430 kHz BW) – HDTV or SDTV: 12 segments – Mobile TV : 1 segment
Information Network 1 / 20132012 61 Japan Terrestrial Television Broadcasting (2)
NHK public paper: http://www.nhk.or.jp/strl/publica/bt/en/le0020.pdf
Information Network 1 / 20132012 62 Random Access Protocols
When node has packet to send – Transmit at full channel data rate R – No a priori coordination among nodes – Classical shared-medium problem: radio antenna Two or more transmitting nodes ➜ “collision” Random access MAC protocol specifies: – How to detect collisions – How to recover from collisions Example of protocols: – ALOHA – Slotted ALOHA – CSMA • CSMA/CD • CSMA/CA
Information Network 1 / 20132012 63 Pure ALOHA (1)
History – Developed in the ALOHA system at the University of Hawaii – Two wireless lines • Terminal -> host (uplink) • Host -> terminal (downlink) – Develop shared medium access for two wireless lines Basic idea: – Each terminal runs independently – Transmission as soon as a terminal has data to send – Receiver sends ACK for data • ACKs sent on separate frequency, so never collide • If ACK is not returned within the RTT (Round Trip Time), it is treated as a packet collision – Back off process • Generation of a random number in [0,K] : r • Retransmission after r seconds
Information Network 1 / 20132012 64 Pure ALOHA (2)
Collision – Wait random amount of time and resend – Randomization is essential
Information Network 1 / 20132012 65 Pure ALOHA (3) – weakness
Each terminal autonomously accesses the medium – Performance is naturally bad due to the chaotic access – Systematic order leads to a complexity of the system Frequent collisions cause performance degradation – Increase of the number of access terminals – Increase of the traffic load Back-off time – K – Affects communication performance
Information Network 1 / 20132012 66 Slotted ALOHA (1)
Slotted ALOHA – Enhanced version of pure ALOHA – Transmission time is divided into time slots – Transmission from terminals is made to follow time slots – Employing “systematic order” – Chaotic line access collision becomes slot contention – Reduces occurrence of contention – Improves performance (throughput 18.4%→36.8%)
Information Network 1 / 20132012 67 Slotted ALOHA (2)
Basic idea: – All frames same size – Time is divided into equal size slots, time to transmit 1 frame – Nodes start to transmit frames only at beginning of slots – Nodes are synchronized – If 2 or more nodes transmit in slot, all nodes detect collision – Frames delayed until beginning of the next slot
Information Network 1 / 20132012 68 Pure ALOHA vs Slotted ALOHA
Both use randomization after collision Slotted reduces probability of collision – If frame is ready in middle of period: • In Pure ALOHA, I will begin sending and destroy any currently sending frames • In Slotted ALOHA, I will wait and only destroy other waiting frames
Information Network 1 / 20132012 69 CSMA (1)
Carrier Sense Multiple Access Senses the medium to confirm whether it is used before transmission – If the medium is not being used, data is transmitted ASAP – Collision unfortunately occurs due to transmission delay – If another terminal transmits a packet within RTT/2, collision occurs • Time for the transmission spreads along the medium
Information Network 1 / 20132012 70 CSMA (2)
In case a carrier is detected – 1-persistent • channel free: send immediately • channel busy: send once it is free – non-persistent • channel free: send immediately • channel busy: send after random amount of time – (slotted) p-persistent CSMA • channel free: transmit with prob p • channel busy: repeat algorithm next slot In case a collision occurs – Wait some time (randomly determined), sense the medium again
Information Network 1 / 20132012 71 CSMA (3)
CSMA also comes in two flavours – Collision Detection (/CD) • Can ascertain if two data frames have collided • Used in Ethernet 802.3 protocol family – Collision Avoidance (/CA) • Channel is reserved using special frames • Data frames will never collide • Used in Wireless LAN 802.11 protocol family
Information Network 1 / 20132012 72 MAC Throughput Performance
Information Network 1 / 20132012 73 Taking Turn MAC Protocols
Channel partitioning MAC protocols: – Share channel efficiently and fairly at high load – Inefficient at low load: • Delay in channel access • 1/N bandwidth allocated even if only 1 active node Random access MAC protocols – Efficient at low load: • Single node can fully utilize channel – high load: • Collision overhead Taking turns protocols – Two implementations: Polling & Token
Information Network 1 / 20132012 74 Token Passing
Employed in 802.4 (Token Bus), 802.5 (Token Ring) FDDI is also a type of Token Passing (more complex) Method – a token is passed around between nodes in a certain order – a node with the token can communicate – token holding timer Characteristics – unlike contention type data link, degradation is not enforced during high load periods – for this reason, token bus and token ring are preferred
Information Network 1 / 20132012 75 Historical Transition
Slotted ALOHA Pure ALOHA
CSMA/CD CSMA (Ethernet)
Token Ring FDDI (gone)
TDMA ATM (gone)
Information Network 1 / 20132012 76 Ethernet (IEEE 802.3 Family)
Information Network 1 / 20132012 77 Ethernet
LAN technology based on CSMA/CD Standardized as IEEE802.3 – 10Mbps, base-band transmission – 1500octet MTU – Designed and developed as bus type LAN • Coaxial cable and Transceiver • 10Base5, 10Base2 Emergence of 10BaseT technology using UTP cables – Cabling in star topology – Emerging hub and switch
Information Network 1 / 20132012 78 Fast Ethernet
100Mbps Ethernet – Medium is UTP/CAT5 as well as optical fiber – Direct switchover from 10 Mbps Ethernet environment – Bidirectional 100BaseT • Wider bandwith due to bidirectional data transmission – Auto-sense / Auto-negotiation • Connection type is automatically determined – 10BaseT/100BaseT, Unidirectional / Bidirectional • Interoperability
Information Network 1 / 20132012 79 Gigabit Ethernet (IEEE802.3z)
1Gbps Bidirectional data channel technology – Half-channel is 1Gbps – Full duplex Transmission medium is optical fiber – 1000Base-SX (Short-wavelength), 1000Base-LX (Long- wavelength) Most of the current products today obey IEEE802.3z standard – Interoperability deployment is progressing steadily – NICs altogether with switches are widespread
Information Network 1 / 20132012 80 Gigabit Ethernet (IEEE802.3ab)
New Gigabit Ethernet standard – 1000Base-T – UTP – 1Gbps Ethernet – Maximum 100m
Information Network 1 / 20132012 81 Ethernet Family Strengths
Rapid spread of Fast Ethernet – Simple switchover from 10BaseT – Many cheap products – Substitute 10BaseT networks for Fast Ethernet
Does not require special network management – Plug-and-play – Significant difference with ATM
Information Network 1 / 20132012 82 Comparison of Ethernet Technology
Ethernet Fast Ethernet Gigabit Ethernet
Data Rate 10Mbps 100Mbps 1Gbps
CAT 5 UTP 100m 100m 100m (CAT5+/6) STP/Coax 500m 100m N/A
Multi-mode Fiber 2Km 412m (hd*) 550m 2Km (fd*) Single-mode Fiber 25Km 20Km > 5Km
*IEEE half duplex/full duplex note: IEEE 802.3z
Information Network 1 / 20132012 83 Ethernet’s address
6 octet (48 bit) First three octets defined by IEEE, identify the vendor The following three octets are assigned by the vendor IEEE MAC address “00:a0:cc:7c:47:16”
Assigned by IEEE Assigned by vendor
00 a0 cc 7c 47 16
Information Network 1 / 20132012 84 10Gbps Ethernet
IEEE802.3ae – Standardized by IEEE on June 2002 Divided into WAN use and LAN use – WAN PHY • Using SONET frame – Considering interoperability with SONET/SDH • ~300m, wavelength: 850nm • 10km, wavelength: 1310nm • 40km, wavelength: 1550nm – LAN PHY • Using Ethernet Frame • ~300m, wavelength: 850nm • 10km, wavelength: 1310nm • 40km, wavelength: 1550nm • 10km, wavelength: 1310nm – Introduced in the market in 2002 • 10GBASE-LR serial (1310nm) • 10GBASE-EX4(1550nm WWDM) • Transmission distance: 10Km – 50Km
Information Network 1 / 20132012 85 40Gbps/100Gbps Ethernet
IEEE802.3ba – Standardized by IEEE on June 2010
Goal: To support fast networks over 10Gbps – Only supports full-duplex communication – Preserves the current standard framesize – Supports a transmission quality characterized by a BER (Bit Error Rate) better or equal to 10-12 at the interface with upper layers – Supports OTN(Optical Transport Network)
– Provides physical layer specifications which support 40Gbps operation over: • SMF >10km • OM3 MMF >100m • Copper cable assembly >7m • Backplane >1m
– Provides physical layer specifications which support 100Gbps operation over: • SMF >40km or >10km • OM3 MMF >100m • Copper cable assembly >7m
Information Network 1 / 20132012 86 40Gb/s Ethernet Single-mode Fibre PMD
IEEE802.3bg – Standardized by IEEE on March 2011 – PMD: Physical Medium Dependent Improvements: – Support a BER better than or equal to 10-12 at the MAC/PLS service interface – Support a MAC data rate of 40 Gb/s – Use the 40GBASE-R PCS and PMA – Use only existing electrical and logical interfaces from IEEE Std 802.3 as modified by IEEE P802.3ba – Provide Physical Layer specification which support 40 Gb/s operation over at least 2 km on SMF. – Provide optical compatibility with existing carrier 40Gb/s client interfaces (OTU3/STM-256/OC-768/40G POS).
Information Network 1 / 20132012 87 Future of Ethernet
Terabit Ethernet – P802.3bj under discussion – 4x25G Multi-mode fiber links for up to 100m – Single-mode fiber link is under consideration to increase distance of 2km Network Partitioning – “Switch agnostic” NIC Partitioning (NPAR) – Up to four virtual ports per physical port • Virtual ports: NIC, FCoE, or iSCI OpenFlow – Create research control plane – Fast provisioning of virtual networks – Speed up innovation in networking
Information Network 1 / 2013 Requirements for the Data Link, and Bridges
Information Network 1 / 20132012 89 Today’s data link requirements
Wide bandwidth
Large scale
Virtualization
Coverage expansion
Information Network 1 / 20132012 90 Development of data link technologies
Wide bandwidth Switched media
Large scale Bridges
Virtualization VLAN
Coverage expansion Broadband wireless, residential access, etc.
Information Network 1 / 20132012 91 Wide bandwidth:shared media → switched media
High-bandwidth and commodity LAN Spread of Processor Interconnect Technology
medium access Non-blocking crossbar switch
Information Network 1 / 20132012 92 Shifting to switched media
Confusing switched media and shared media carries out significant problems Failure of demonstration is caused by this
Shared media Voice Video Video Wireless LAN (MPEG2) (MotionJPEG)
Voice Video Video Video Video Switched media (MPEG2) (MotionJPEG) (D1) (HD D1) Ethernet
1996 1998 2000 2002 2004 2006
Information Network 1 / 20132012 93 Large scale: Bridges
Compatibility between physical limitations and LAN convenience – Coverage, capacity
Wiring in floor:coax (~100m)
Wiring between buildings:optical fiber (~5km)
Information Network 1 / 20132012 94 Bridge basics: Transparent bridge
Host is not aware of the bridge Transparent bridge – No modification of MAC frame – Promiscuous: capture all flowing packets – Administrator builds the bridge forwarding table
Transparent A C bridge E G
1 2 B D F H
Fwd to 1 A, B, C, D Fwd to 2 E, F, G, H
Information Network 1 / 20132012 95 Learning bridge
When a frame destined to an unknown MAC is received – Forward to other ports (flooding) – Record source host → register to the forwarding table When a frame destined to a known MAC is received – Forward to appropriate port Broadcast transmission – Received by all active hosts in a same medium
A C E G
1 2 B D F H
Construct a table with learning
Information Network 1 / 20132012 96 Loops in learning bridges
Based on the previous algorithm, what would happen if A sends a frame to G?
A G
1 2 4 5 3 B 6
C F D 7 9
8 10 E
Information Network 1 / 20132012 97 Spanning tree bridges
Spanning tree
A G
1D 2D 4R 5D 3D B 6A C F R: root port D D: designated port 7D 9D A: alternative port
8D 10R E
Information Network 1 / 20132012 98 More various technologies
VLAN – Network virtualization – Nowadays, VLAN is frequently used – Single medium, multiple-network installation WDM MPLS Broadband wireless, residential access, WiMAX, …
Keep on studying more and if you are interested…
Information Network 1 / 20132012 99