* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download 20_otherlink
Distributed firewall wikipedia , lookup
Zero-configuration networking wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Airborne Networking wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Point-to-Point Protocol over Ethernet wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Deep packet inspection wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
IEEE 802.11 wikipedia , lookup
Synchronous optical networking wikipedia , lookup
Internet protocol suite wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
20: Other Technologies used at the Link Layer Last Modified: 5/25/2017 10:02:29 AM 5: DataLink Layer 5a-1 Token Passing: IEEE802.5 standard 4 Mbps max token holding time: 10 ms, limiting frame length SD, ED mark start, end of packet AC: access control byte: token bit: value 0 means token can be seized, value 1 means data follows FC priority bits: priority of packet reservation bits: station can write these bits to prevent stations with lower priority packet from seizing token after token becomes free 5: DataLink Layer 5a-2 Token Passing: IEEE802.5 standard FC: frame control used for monitoring and maintenance source, destination address: 48 bit physical address, as in Ethernet data: packet from network layer; checksum: CRC FS: frame status: set by dest., read by sender set to indicate destination up, frame copied OK from ring limited number of stations: 802.5 have token passing delays at each station 5: DataLink Layer 5a-3 Point to Point Data Link Control one sender, one receiver, one link: easier than broadcast link: no need for explicit MAC addressing full-duplex simultaneous bi-directional operation = no need for media access control e.g., dialup link, ISDN line popular point-to-point protocols: PPP (point-to-point protocol) HDLC: High level data link control 5: DataLink Layer 5a-4 PPP Design/Features packet framing: encapsulation of network-layer datagram in data link frame carry network layer data of any network layer protocol (not just IP) at same time ability to demultiplex upwards bit transparency: must carry any bit pattern in the data field error detection (no correction) connection liveness: detect, signal link failure to network layer network layer address negotiation: endpoint can learn/configure each other’s network address 5: DataLink Layer 5a-5 PPP non-requirements no error correction/recovery no flow control no need to support multipoint links (e.g., polling) Error recovery, flow control, data re-ordering all relegated to higher layers!| 5: DataLink Layer 5a-6 PPP Data Frame Flag: delimiter (framing) Address: does nothing (only one option) Control: does nothing; in the future possible multiple control fields Protocol: upper layer protocol to which frame delivered (eg. IP, PPP-LCP, IPCP, etc) 5: DataLink Layer 5a-7 PPP Data Frame info: upper layer data being carried check: cyclic redundancy check for error detection 5: DataLink Layer 5a-8 Byte Stuffing “data transparency” requirement: data field must be allowed to include flag pattern <01111110> Q: is received <01111110> data or flag? Sender: adds (“stuffs”) extra < 01111110> byte after each < 01111110> data byte Receiver: two 01111110 bytes in a row: discard first byte, continue data reception single 01111110: flag byte 5: DataLink Layer 5a-9 Byte Stuffing flag byte pattern in data to send flag byte pattern plus stuffed byte in transmitted data 5: DataLink Layer 5a-10 PPP Data Control Protocol Before exchanging networklayer data, data link peers must configure PPP link (max. frame length, authentication) learn/configure network layer information for IP: carry IP Control Protocol (IPCP) msgs (protocol field: 8021) to configure/learn IP address 5: DataLink Layer 5a-11 IP over Other Wide Area Network Technologies ATM Frame Relay X-25 5: DataLink Layer 5a-12 ATM architecture Adaptation layer (AAL): only at edge of ATM network roughly analogous to Internet transport layer ATM layer: “network” layer Virutal circuits, routing, cell switching physical layer 5: DataLink Layer 5a-13 ATM Layer: ATM cell 5-byte ATM cell header 48-byte payload Why?: small payload -> short cell-creation delay for digitized voice halfway between 32 and 64 (compromise!) Cell header Cell format 5: DataLink Layer 5a-14 ATM cell header VCI: virtual channel ID will change from link to link thru net PT: Payload type (e.g. RM cell versus data cell) CLP: Cell Loss Priority bit CLP = 1 implies low priority cell, can be discarded if congestion HEC: Header Error Checksum cyclic redundancy check 5: DataLink Layer 5a-15 ATM: network or link layer? Vision: end-to-end transport: “ATM from desktop to desktop” ATM is a network technology Reality: used to connect IP backbone routers “IP over ATM” ATM as switched link layer, connecting IP routers 5: DataLink Layer 5a-16 Datagram Journey in IP-overATM Network at Source Host: IP layer finds mapping between IP, ATM dest address passes datagram to AAL5 AAL5 encapsulates data, segments to cells, passes to ATM layer ATM network: moves cell along VC to destination (uses existing one or establishes another) at Destination Host: AAL5 reassembles cells into original datagram if CRC OK, datgram is passed to IP 5: DataLink Layer 5a-17 X.25 and Frame Relay Like ATM: wide area network technologies virtual circuit oriented origins in telephony world can be used to carry IP datagrams and can thus be viewed as Link Layers by IP protocol just like ATM 5: DataLink Layer 5a-18 X.25 X.25 builds VC between source and destination for each user connection Per-hop control along path error control (with retransmissions) on each hop per-hop flow control using credits • congestion arising at intermediate node propagates to previous node on path • back to source via back pressure 5: DataLink Layer 5a-19 IP versus X.25 X.25: reliable in-sequence end-end delivery from end-to-end “intelligence in the network” IP: unreliable, out-of-sequence end- end delivery “intelligence in the endpoints” 2000: IP wins gigabit routers: limited processing possible 5: DataLink Layer 5a-20 Frame Relay Designed in late ‘80s, widely deployed in the ‘90s Frame relay service: no error control end-to-end congestion control 5: DataLink Layer 5a-21 Frame Relay (more) Designed to interconnect corporate customer LANs typically permanent VC’s: “pipe” carrying aggregate traffic between two routers switched VC’s: as in ATM corporate customer leases FR service from public Frame Relay network (eg, Sprint, ATT) 5: DataLink Layer 5a-22 Frame Relay (more) flags address data CRC flags Flag bits, 01111110, delimit frame Address = address and congestion control 10 bit VC ID field 3 congestion control bits • FECN: forward explicit congestion notification (frame experienced congestion on path) • BECN: congestion on reverse path • DE: discard eligibility 5: DataLink Layer 5a-23 Frame Relay -VC Rate Control Committed Information Rate (CIR) defined, “guaranteed” for each VC negotiated at VC set up time customer pays based on CIR DE bit: Discard Eligibility bit Edge FR switch measures traffic rate for each VC; marks DE bit DE = 0: high priority, rate compliant frame; deliver at “all costs” DE = 1: low priority, eligible for discard when congestion 5: DataLink Layer 5a-24 Summary principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing, ARP various link layer technologies Ethernet hubs, bridges, switches IEEE 802.11 LANs PPP ATM, X.25, Frame Relay journey down the protocol stack now OVER! 5: DataLink Layer 5a-25 A bit about physical connections 5: DataLink Layer 5a-26 Rating wide area internet connections T0, DS0 – 1 voice channel, 65 Kbps What homes get for 1 telephone line T1 (Level 1 transmission line) or DS1 1.544 Mbps, 24 voice channels at 64 Kbps T3 or DS3 = 28 T1 lines, 44.746 Mbps OC3 = 3 DS3s OC12 = 12 DS3s OC48 = 48 DS3s, 2488 Mbps OC192 = 192 DS3s 5: DataLink Layer 5a-27 SONET and SDH Higher data rates often achieved using synchronous optical networking (SONET) and Synchronous Digital Hierarchy (SDH) SONET in the US and Canada and SDH in the rest of the world Transport over optical fiber using lasers/ LEDs Transporting large amounts of telephone calls and data traffic over the same fiber without synchronization problems 5: DataLink Layer 5a-28 T0 = typical phoneline connection DS3 delivered native on a copper trunk or converted to an optical fiber run when needing longer distances between termination points DS3 transported over SONET is encapsulated in a STS-1 SONET channel Still analog when delivered over fiber When delivering data over an OC3 or greater SONET is used. OC-3 SONET link contains three STS-1s, and therefore may carry three DS3s. Likewise, OC-12, OC-48, and OC-192 may carry 12, 48, and 192 DS3s respectively. 5: DataLink Layer 5a-29 More on SONET Designed to carry multiple real-time, uncompressed, circuit-switched voice lines encoded in Pulse-Code Modulation (PCM) format Also multiple digital bit streams of differing origin within single framing protocol Multiplex circuit mode communications (T1, T3, DS1, DS3,etc.) from a variety of different sources over same fiber Emphasis is on merging many different flow into 5: DataLink Layer one quickly 5a-30 STM-1 (Synchronous Transport Module, level 1) frame is the basic transmission format for SDH. STM-1 frame is transmitted in exactly 125 µs, therefore, there are 8,000 frames per second on a 155.52 Mbit/s OC-3 fiberoptic circuit 5: DataLink Layer 5a-31 Protocol neutral Not communications protocols in and of themselves Generic, all-purpose transport containers for moving both voice and data. Used to carry ATM, Ethernet, TCP/IP etc. 5: DataLink Layer 5a-32 SONET standard defined by Telcordia and American National Standards Institute (ANSI) standard T1.105 and T1.119 SDH standard specified in International Telecommunication Union (ITU) standards G.707, G.783, G.784, and G.803 SDH originally defined by the European Telecommunications Standards Institute (ETSI) 5: DataLink Layer 5a-33 Carrier Pricing Two simple components: local loop and port Local loop = cost to transport the signal from the end user's central office (CO) to the point of presence (POP) of the carrier Local loop cost based on geography/distance from CO to POP Port = cost to access the network through the carrier's network Port cost based on access speed and yearly commitment level 5: DataLink Layer 5a-34 Fiber cable runs One example from the North Country 5: DataLink Layer 5a-35 Undersea cables 5: DataLink Layer 5a-36 multiple SONET signals can be transported over multiple wavelengths on a single fiber pair by means of wave length-division multiplexing, including dense wavelengthdivision multiplexing (DWDM) and coarse wavelength-division multiplexing (CWDM). DWDM circuits are the basis for all modern submarine communications cable systems and other long-haul circuits. 5: DataLink Layer 5a-37 Other Satellite Links Pros and Cons 5: DataLink Layer 5a-38 Outtakes 5: DataLink Layer 5a-39 IEEE 802.11 MAC Protocol 802.11 CSMA Protocol: others NAV: Network Allocation Vector 802.11 frame has transmission time field others (hearing data) defer access for NAV time units 5: DataLink Layer 5a-40 IEEE 802.11 MAC Protocol: CSMA/CA 802.11 CSMA: sender - if sense channel idle for DISF sec. then transmit entire frame (no collision detection) -if sense channel busy then binary backoff 802.11 CSMA receiver: if received OK return ACK after SIFS 5: DataLink Layer 5a-41 IP-Over-ATM Classic IP only 3 “networks” (e.g., LAN segments) MAC (802.3) and IP addresses Ethernet LANs IP over ATM replace “network” (e.g., LAN segment) with ATM network IP addresses -> ATM addresses just like IP addresses to 802.3 MAC addresses! Ethernet LANs ATM network 5: DataLink Layer 5a-42 ARP in ATM Nets ATM network needs destination ATM address just like Ethernet needs destination Ethernet address IP/ATM address translation done by ATM ARP (Address Resolution Protocol) ARP server in ATM network performs broadcast of ATM ARP translation request to all connected ATM devices hosts can register their ATM addresses with server to avoid lookup 5: DataLink Layer 5a-43 Access Control 802.11 working group considered 2 proposals for a MAC algorithm Distributed access protocols Centralized access protocols 5: DataLink Layer 5a-44 Distributed Access Protocols Distribute the decision to transmit over all the notes Like Carrier-sense mechanisms in Ethernet Makes sense especially for an ad hoc network of peer workstations Can also be good for busty traffic 5: DataLink Layer 5a-45 Centralized Access Protocols Regulation of transmission by a centralized decision maker Natural for networks with a base station Especially good if network is highly utilized ( avoid fighting it out among peers) Also good if some data is time sensitive/high priority 5: DataLink Layer 5a-46 Distributed Foundation Wireless MAC Compromise was Distributed Foundation Wireless MAC (DFWMAC) Distributed Access control mechanism with an optional centralized control layer on top of that Distributed Coordination Function (DCF) on top of physical layer On top of that is optional Point Coordination Function (PCF) that provides contention free service 5: DataLink Layer 5a-47 Access Control CSMA DCF uses Carrier Sense Multiple Access (CSMA) CSMA means listen before you send to make sure the medium is idle No Collision Detection - Not CSMA/CD like Ethernet CD based on listening while you send to make sure you hear only your signal Wireless HW not made to send and listen at same time Large dynamic range of possible signals – cannot effectively distinguish incoming weak signals from noise and the effects of its own transmission 5: DataLink Layer 5a-49 IFS = interframe space Medium Access Control Logic Each time fail increase time to wait before send Interframe Space (IFS) Values Actually three different IFS values Short IFS (SIFS) Shortest IFS Used for immediate response actions Point coordination function IFS (PIFS) Midlength IFS Used by centralized controller in PCF scheme when using polls Distributed coordination function IFS (DIFS) Longest IFS Used as minimum delay of asynchronous frames contending for access 5: DataLink Layer 5a-51 Priority Stations using SIFS have “priority” over others because they will test for idle faster find and then start transmitting Others that wait longer will find the channel busy when they listen after PIFS or DIFSs 5: DataLink Layer 5a-52 IFS Usage SIFS Acknowledgment (ACK) Clear to send (CTS) Poll response( for PCF) PIFS Used by centralized controller in issuing polls (for PCF) Takes precedence over normal contention traffic DIFS Used for all ordinary asynchronous traffic 5: DataLink Layer 5a-53 Contention Periods/ Contention-Free Periods The DCF and PCF respectively operate in Contention Periods (CPs) and Contention Free Periods (CFPs) In CPs, stations compete with each other to win channel access In CFPs, an Access Point (AP) grants the opportunity of transmission to stations by polling 5: DataLink Layer 5a-54 Polling Since PIFS smaller than DIFS, coordinator can seize coordinator and lock all traffic ( at least traffic that obeys the rules) while it polls and receives responses When polling coordinator sends a poll to a station, it can respond using SIFS ( beating the next PIFS and any DIFS) 5: DataLink Layer 5a-55 Polling In a CFP, a PC polls the first station in its polling list, and it may also piggyback some data to the polling frame. The polled station responds either with an ACK or a data frame piggybacked to the ACK frame. An SIFS separates the polling and responding frames. Once the frame exchange sequence with the first station is done, the PC waits for a PIFS and then polls another station in its polling list. 5: DataLink Layer 5a-56 Superframes CPs and CFPs alternate in a superframe A superframe is an interval between two beacon frame transmissions. A beacon frame is broadcasted by APs in BSSs or random stations in IBSSs. It carries management information to the stations. 5: DataLink Layer 5a-57 IEEE 802.11 MAC Timing PCF Superframe Construction 5: DataLink Layer 5a-58 Superframe Point coordinator would lock out asynchronous traffic by issuing polls Superframe interval defined During first part of superframe interval, point coordinator polls round-robin to all stations configured for polling Point coordinator then idles for remainder of superframe Allowing contention period for asynchronous access At beginning of superframe, point coordinator may seize control and issue polls for given period Time varies because of variable frame size issued by responding stations Rest of superframe available for contention-based access At end of superframe interval, point coordinator contends for access using PIFS If idle, point coordinator gains immediate access Full superframe period follows 5: access DataLink Layer If busy, point coordinator must wait for idle to gain 5a-59 Acknowledgements When station received frame addressed directly to it ( not broadcast or multicast) it replies with an ACK after waiting SIFS ACKs allow for recovery from collision since no collision detection Use of SIFS allows for efficient delivery of an LLC data unit that requires multiple MAC frames Just get SIFS between ACK and then next frame No one else will gain control of the channel until the entire LLC if over 5: DataLink Layer 5a-60 802.11 Physical Layer Standards Op. Freq. Data Rate Typical/Max (Mbit/sec) Range Indoor/Outdoor (meters) Legacy 802.11-1997 2.4 GHz ½ ? 802.11a (1999) 5 GHz 25/54 15-30 802.11b (1999) 2.4 GHz 5.5/11 45-90 802.11g(2003) 2.4 GHz 25/54 45-90 802.11n(2009) 5 and 2.4 GHz 144/600 91/182 5: DataLink Layer 5a-61 802.11b was the first, followed by 802.11a ( higher BW, less popular) 802.11g higher BW, directly compatible with b 802.11n – even higher BW, backwards compatible with b and g 5: DataLink Layer 5a-62 RC4 WEP uses RC4 a stream cipher Stream ciphers are vulnerable to attack if the same key is used twice (depth of two) or more. Say we send messages A and B of the same length, both encrypted using same key, K. The stream cipher produces a string of bits C(K) the same length as the messages. The encrypted versions of the messages then are: E(A) = A xor C E(B) = B xor C where xor is performed bit by bit. Say an adversary has intercepted E(A) and E(B). He can easily compute: E(A) xor E(B) However xor is commutative and has the property that X xor X = 0 (self-inverse) so: E(A) xor E(B) = (A xor C) xor (B xor C) = A xor B xor C xor C = A xor B 5: DataLink Layer 5a-63