1 Lecture 7 Datalink – Ethernet, Home David Andersen School of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Advertisements

Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
Computer Networks Ethernet I Professor Hui Zhang
CS 4700 / CS 5700 Network Fundamentals Lecture 7: Bridging (From Hub to Switch by Way of Tree) Revised 1/14/13.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
1 Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Networking, Spring 2008
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Ethernet, ARP.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
CS 453 Computer Networks Lecture 14 Medium Access Control Sublayer.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Network Topologies An introduction to Network Topologies and the Link Layer.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 8: Bridging Slides used with permissions.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
CSC 311 IEEE STANDARD ETHERNET Common Bus topology Uses CSMA/CD Named after “ether”, the imaginary substance many once believed occupied all of space.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
CS 640: Introduction to Computer Networks
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Computer Networks Ethernet II Professor Hui Zhang
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
CS 640: Introduction to Computer Networks
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 6 - Ethernet, Multiple Access and Bridging.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Ethernet. Ethernet standards milestones 1973: Ethernet Invented 1983: 10Mbps Ethernet 1985: 10Mbps Repeater 1990: 10BASE-T 1995: 100Mbps Ethernet 1998:
CS 6401 Introduction to Computer Networks 09/21/2010 Outline - UNIX sockets - A simple client-server program - Project 1 - LAN bridges and learning.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
Peter A. Steenkiste, SCS, CMU 1 Lecture 7 Datalink – Bridging and Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Computer Engineering and Networks, College of Engineering, Majmaah University LAN TECHNOLOGIES Mohammed Saleem Bhat CEN-444 Networks Structure.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Bridging.
Chapter 4 Data Link Layer Switching
Data Link Issues Relates to Lab 2.
Protocol layering and data
Protocol layering and data
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
LAN Technologies LAN TECHNOLOGIES.
Presentation transcript:

1 Lecture 7 Datalink – Ethernet, Home David Andersen School of Computer Science Carnegie Mellon University Networking, Spring

2 Ethernet Physical Refresher l 10Mhz signal (baseband modulation) l Nyquist limit says we should be able to get 20 Mbits/s from that. l Manchester encoding solves runs of 1s and 0s problem »Wastes 1/2 of the possible data rate - back to 10Mbps

3 Ethernet Physical Layer l 10Base2 standard based on thin coax. »Thick coax no longer used »Nodes are connected using thin coax cables and “T” connectors in a bus topology l 10-BaseT uses twisted pair and hubs. »Hub acts as a concentrator l The two designs have the same protocol properties. »Key: electrical connectivity between all nodes »Deployment is different host Hub Host

4 Ethernet over Time Aloha packet radio Ethernet on coax 10base-2 (thinnet) 10base-5 (thicknet) Hub ?baseT with hub (twisted pair) Switch ?baseT with switch (point to point links)

5 Datalink Layer Architectures l Packet forwarding. l Error and flow control. l Media access control. l Scalability.

6 Multiple Access Protocols l Prevent two or more nodes from transmitting at the same time over a broadcast channel. »If they do, we have a collision, and receivers will not be able to interpret the signal l Several classes of multiple access protocols. »Partitioning the channel, e.g. frequency-division or time division multiplexing –With fixed partitioning of bandwidth – not flexible »Taking turns, e.g. token-based, reservation-based protocols, polling based »Contention based protocols, e.g. Aloha, Ethernet

7 Contention-Based Protocol l Goal: share the communication channel among multiple hosts sharing it. l Problem: how to arbitrate between the connected hosts. l Desired properties: »High bandwidth utilization »Avoid starvation, achieve fairness »Simple solution l Idea: access the channel in a random way - when collisions occur, recover. »Collision: two or more nodes transmitting at the same time

8 Aloha l Node sends the message when it has data to send. l If it receives an ack, it considers the transmission completed, otherwise it retransmits after a random delay. l Simple, distributed protocol, but not very efficient »18% maximum utilization l Slotted Aloha: more efficient. »Transmit only in specific time slot »Reduces chances of collision »37% maximum utilization Central Computer

Ethernet Broadcast technology l Carrier-sense multiple access with collision detection (CSMA/CD). »MA = multiple access »CS = carrier sense »CD = collision detection l Base Ethernet standard is 10 Mbs. »Original design was ~2 Mbs »Faster versions discussed later host Hub

10 CSMA/CD Algorithm l Sense for carrier. l If carrier present, wait until carrier ends. »Sending would force a collision and waste time l Send packet and sense for collision. l If no collision detected, consider packet delivered. l Otherwise, abort immediately, perform “exponential back off” and send packet again. »Start to send at a random time picked from an interval »Length of the interval increases with every retransmission

11 Collision Detection Time ABC

12 Collision Detection: Implications l All nodes must be able to detect the collision. »Any node can be sender l => Must either have short wires, long packets, or both. l Can calculate length/distance based on transmission rate and propagation speed. »Messy: propagation speed is media-dependent, low-level protocol details,.. »Minimum packet size is 64 bytes –Cable length ~256 bit times »Example: maximum coax cable length is 2.5 km ABC

13 Minimum Packet Size l Give a host enough time to detect a collision. l In Ethernet, the minimum packet size is 64 bytes. »18 bytes of header and 46 data bytes »If the host has less than 46 bytes to send, the adaptor (pads) bytes to increase the length to 46 bytes l What is the relationship between the minimum packet size and the size of LAN? l How did they pick the minimum packet size? LAN = (min frame size) * light speed / (2 * bandwidth)

14 CSMA/CD: Some Details l Successive frames are separated by an “inter- frame” gap. »Nodes must switch from “send” to “receive” mode »Set to 9.6  sec or 96 bit times l When a sender detects a collision, it sends a “jam signal”. »Make sure that all nodes are aware of the collision »Length of the jam signal is 32 bit times »Permits early abort - don’t waste max transmission time l Exponential backoff operates in multiples of 512 bit times. »Longer than a roundtrip time »Guarantees that nodes that back off longer will notice the earlier retransmission before starting to send

15 Ethernet Frame Format l Preamble marks the beginning of the frame. »Also provides clock synchronization l Source and destination are 48 bit IEEE MAC addresses. »Flat address space »Hardwired into the network interface l Type field is a demultiplexing field. »What network layer (layer 3) should receive this packet? »Is actually a length field in the standard l CRC for error checking. PreambleTypePadDestSourceDataCRC 86624

16 Traditional IEEE 802 Networks: MAC in the LAN and MAN l Ethernet defined as IEEE l The IEEE 802.* set of standards defines a common framing and addressing format for LAN protocols. »Simplifies interoperability »Addresses are 48 bit strings, with no structure l (Ethernet) l (Token bus) l (Token ring) l (Distributed queue dual bus) l (Wireless LAN) l (Cable Modem) l (Wireless Personal Area networks - based on bluetooth) l (Broadband wireless access - “WiMAX”)

17 LAN Properties l Exploit physical proximity. »Often a limitation on the physical distance »E.g. to detect collisions in a contention based network »E.g. to limit the overhead introduced by token passing l Relies on single administrative control and some level of trust. »Broadcasting packets to everybody and hoping everybody (other than the receiver) will ignore the packet »Token-based protocols: everybody plays by the rules l Broadcast: nodes can send messages that can be heard by all nodes on the network. »Almost essential for network administration »Can also be used for applications, e.g. video conferencing l But broadcast fundamentally does not scale.

18 How Do We Go Faster? l How about FDDI? »Too complex l How about switching, e.g. ATM? »Too expensive and complicated l How about a faster Ethernet? Or How about switching Ethernet? »It is simple »It inter-operates with a large installed base »It is Ethernet »Fast Ethernet and Gigabit Ethernet

19 Why Ethernet? l Easy to manage. »You plug in the host and it basically works »No configuration at the datalink layer l Broadcast-based. »In part explains the easy management »Some of the LAN protocols (e.g. ARP) rely on broadcast –Networking would be harder without ARP –Address Resolution Protocol (“who-has ?” -> MAC address). »Not having natural broadcast capabilities adds a lot of complexity to a LAN –Example: ATM l Drawbacks. »Broadcast-based: limits bandwidth since each packets consumes the bandwidth of the entire network »Distance (if shared)

u Fast Ethernet l Apply original CSMA/CD medium access protocol at 100Mbps l Must change either minimum frame or maximum diameter: change diameter l Requires »2 UTP5 pairs (4B5B) or »4 UTP3 pairs (8B6T) or »1 fiber pair l No more “shared wire” connectivity. »Hubs and switches only

z Gigabit Ethernet l Same frame format and size as Ethernet. »This is what makes it Ethernet l Full duplex point-to-point links in the backbone are likely the most common use. »Added flow control to deal with congestion l Alternative is half-duplex shared-medium access. »Cannot cut the diameter any more (set to 200m) »Raise the min frame time (256 bytes), but not frame size l Choice of a range of fiber and copper transmission media. l Defining “jumbo frames” for higher efficiency.

22 Building Larger LANs: Bridges l Bridges connect multiple IEEE 802 LANs at layer 2. »Only forward packets to the right port »Reduce collision domain compared with single LAN l In contrast, hubs rebroadcast packets. host Bridge

23 Transparent Bridges l Design goals: »“Plug and play” capability »Self-configuring without hardware or software changes »Bridge do not impact the operation of the individual LANs l Three parts to making bridges transparent: 1)Forwarding of frames 2)Learning of addresses 3)Spanning tree algorithm

24 Frame Forwarding l Each switch maintains a forwarding database: MAC address: host or group address Port: port number on the bridge Age: age of the entry l Meaning: A machine with MAC address lies in the direction of number port of the bridge l For every packet, the bridge “looks up” the entry for the packets destination MAC address and forwards the packet on that port. »Other packets are broadcasted – why?

25 Address Lookup l Address is a 48 bit IEEE MAC address. l Next hop: output port for packet. l Timer is used to flush old entries l Size of the table is equal to the number of hosts. Bridge 8711C98900AA 2 AddressNext Hop A21032C9A A323C B C :15 Info 8:36 8:01 8:16 8:

26 Learning Bridges l Bridge tables can be filled in manually. »Time consuming, error-prone »Self-configuring preferred l Keep track of source address of packets arriving on every link, showing what segment hosts are on. »Fill in the forwarding table based on this information host Bridge

27 Spanning Tree Bridges l More complex topologies can provide redundancy. »But can also create loops. l What is the problem with loops? host Bridge

28 Spanning Tree Protocol Overview Embed a tree that provides a single unique path to each destination: 1) Elect a single bridge as a root bridge 2) Each bridge calculates the distance of the shortest path to the root bridge 3) Each LAN identifies a designated bridge, the bridge closest to the root. It will forward packets to the root. 4) Each bridge determines a root port, which will be used to send packets to the root 5) Identify the ports that form the spanning tree

29 Spanning Tree Algorithm Steps l Root of the spanning tree is the bridge with the lowest identifier. »All ports are part of tree l Each bridge finds shortest path to the root. »Remembers port that is on the shortest path »Used to forward packets l Select for each LAN the designated bridge that has the shortest path to the root. »Identifier as tie-breaker »Responsible for that LAN B3 B7 B5 B2 B1 B4B

30 Spanning Tree Algorithm l Each node sends configuration message to all neighbors. »Identifier of the sender »Id of the presumed root »Distance to the presumed root »E.g. B5 sends (B5, B5, 0) l When B receive a message, it decide whether the solution is better than their local solution. »A root with a lower identifier? »Same root but lower distance? »Same root, distance but sender has lower identifier? l After convergence, each bridge knows the root, distance to root, root port, and designated bridge for each LAN. B3 B7 B5 B2 B1 B4B6

31 Spanning Tree Algorithm (part 2) l Each bridge B can now select which of its ports make up the spanning tree: »B’s root port »All ports for which B is the designated bridge on the LAN l Bridges can not configure their ports. »Forwarding state or blocked state, depending on whether the port is part of the spanning tree l Root periodically sends configuration messages and bridges forward them over LANs they are responsible for. B3 B7 B5 B2 B1 B4B6

32 Spanning Tree Algorithm Example B3 B7 B5 B2 B1 B4B l Node B2: »Sends (B2, B2, 0) »Receives (B1, B1, 0) from B1 »Sends (B2, B1, 1) “up” »Continues the forwarding forever l Node B1: »Will send notifications forever l Node B7: »Sends (B7, B7, 0) »Receives (B1, B1, 0) from B1 »Sends (B7, B1, 1) “up” and “right” »Receives (B5, B5, 0) - ignored »Receives (B5, B1, 1) - better »Continues forwarding the B1 messages forever to the “right”

33 Ethernet Switches l Bridges make it possible to increase LAN capacity. »Packets are no longer broadcasted - they are only forwarded on selected links »Adds a switching flavor to the broadcast LAN »Some packets still sent to entire tree (e.g., ARP) l Ethernet switch is a special case of a bridge: each bridge port is connected to a single host. »Can make the link full duplex (really simple protocol!) »Simplifies the protocol and hardware used (only two stations on the link) – no longer full CSMA/CD »Can have different port speeds on the same switch –Unlike in a hub, packets can be stored –An alternative is to use cut through switching

34 Virtual LANs l Single physical LAN infrastructure that carries multiple “virtual” LANs simultaneously. l Each virtual LAN has a LAN identifier in the packet. »Switch keeps track of what nodes are on each segment and what their virtual LAN id is l Can bridge and route appropriately. l Broadcast packets stay within the virtual LAN. »Limits the collision domain for the packet host Switch

35 Floor 3 Floor 1Floor 2Floor 4 Example LAN Configuration l 10 or 100 Mbit/second connectivity to the desk top using switch or hubs in wiring closets. l 100 or 1000 Mbit/second switch fabric between wiring closets or floors. l Management simplified by having wiring based on star topology with wiring closet in the center. l Network manager can manage capacity in two ways: »speed of individual links »hub/bridge/switch tradeoff