5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
1 Ethernet EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken.
CPSC 441 TUTORIAL TA: FANG WANG HUBS, SWITCHES AND BRIDGES Parts of the slides contents are courtesy of the following people: Jim Kurose, Keith Ross:
Hubs, Bridges and Switches
5: Link Layer and Local Area Networks5c-1 Hubs, Bridges, and Switches r Used for extending LANs in terms of geographical coverage, number of nodes, administration.
CCNA 3 v3.1 Module 4.
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
Local Area Network Lesson 7 NETS2150/2850.
Lecture 3#1#1 Chapter 3 Hubs, Bridges and Switches.
VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can.
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
Lecture 3#1#1 Hubs, Bridges and Switches Lecture 3.
5: DataLink Layer – Ethernet, Hubs and Switches.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
1 Interconnecting LAN segments Repeaters Hubs Bridges Switches.
5: DataLink Layer5a-1 Summary of MAC protocols r What do you do with a shared media? m Channel Partitioning, by time, frequency or code Time Division,Code.
Lecture 3#1#1 LAN Technologies Completing Lecture 2.
11/18/ /20/2003 Ethernet, Hubs/Bridges/Switches, Wireless November 19-20, 2003.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Point to Point protocol (PPP) Point to point, wired data link easier to manage than broadcast link: no Media Access Control Several Data Link Protocols:
HDLC and PPP. The Data Link Layer in the Internet A home personal computer acting as an internet host. Technology like Ethernet cannot provide “high-level”
Connecting LANs, Backbone Networks, and Virtual LANs
3-1 Last time □ Finished introduction and overview: ♦ Network access and physical media ♦ Internet structure and ISPs ♦ Delay & loss in packet-switched.
Chapter 5 outline 5.1 Introduction and services
Hubs, Bridges, and Switches (oh my) r Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. r Differ.
Introduction 1 Lecture 26 Link Layer (PPP, Virtualization) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Computer Networking Bridges/Switches, , PPP.
Chapter 5: The Data Link Layer
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
5: DataLink Layer5c-1 Today r Assign Homework m Ch5 #1,4,5,7,11,12 Due Wednesday October 22 m Ch5 #13-16,18,20 Due Monday, October 27 r Project #2 due.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
5: DataLink Layer5-1 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r Multi-tier design provides.
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
4: DataLink Layer1 Hubs r Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
Lecture 3#1#1 Hubs, Bridges and Switches Lecture 3.
5: DataLink Layer5-1 Link-layer switches. 5: DataLink Layer5-2 Hubs … physical-layer (“dumb”) repeaters: m bits coming in one link go out all other links.
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
Lecture 3 #1#1 Hubs, Bridges and Switches Lecture 3.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Chapter 3 Part 1 Switching and Bridging
Link Layer 5.1 Introduction and services
MAC Addresses and ARP 32-bit IP address:
Chapter 4 Data Link Layer Switching
Hubs Hubs are essentially physical-layer repeaters:
ARP: Address Resolution Protocol
Chapter 3 Part 1 Switching and Bridging
Point to Point Data Link Control
Mac Addressing, Ethernet, and Interconnections
Hubs Hubs are essentially physical-layer repeaters:
Instructor Mazhar Hussain
18: Ethernet, Hubs, Bridges, Switches
Chapter 5 Data Link Layer – Hub, Switch
Presentation transcript:

5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical layer repeaters  repeat received bits on one interface to all other interfaces; no buffering  Transmission by one node may collide with any node residing at any segment connected to the same hub

5/31/05CS118/Spring052 Interconnecting using hubs r Can use a backbone hub to interconnect LAN segments  Extends max distance between nodes r Create a single large collision domain r Can’t interconnect 10BaseT & 100BaseT hub

5/31/05CS118/Spring053 Ethernet Switch r Link layer device: stores and forwards Ethernet frames  forwards frame based on MAC dest address  uses CSMA/CD to access segment r Transparent: hosts are unaware of presence of switches r plug-and-play: switches do not need to be configured hub switch 1 2 3

5/31/05CS118/Spring054 Building a forwarding table by self learning r When receive data frame: associate sender address with incoming interface r record sender/interface pair in a forwarding table  Each entry: MAC Address, Interface, Time Stamp  stale entries in table dropped (TTL can be 60 min) r Data forwarding algorithm: when receive a frame if entry found for destination then{ if destination on interface from which frame arrived then drop the frame else forward the frame on interface indicated } else flood (forward to all but the interface the frame came from)

5/31/05CS118/Spring055 Switch example Suppose C sends a data frame  to D r Switch receives  from C  Add to forwarding table: C is on interface 1  D is not in table: forwards  to interfaces 2 and 3 r frame received by D When D replies back with a frame  to C r Add to forwarding table: D is on interface 2 r Forward  to C hub switch A B C D E F G H I address interface ABEGABEG C 1 D 2

5/31/05CS118/Spring056 hub switch collision domain Collision domain collision domain More on Switch r Traffic isolation:  same-LAN-segment frames (usually) not forwarded onto other LAN segments  segments become separate collision domains r cut-through switching: frame forwarded from input to output port without first collecting entire frame r can combine 10/100/1000 Mbps interfaces

5/31/05CS118/Spring057 Switches vs. Routers r both are store-and-forward devices  routers: network layer devices (examine network layer headers)  Switches: link layer devices r routers maintain routing tables, implement routing algorithms r switches maintain switch tables, implement self- learning algorithms Switch

5/31/05CS118/Spring058 Switches: advantages and limitations r Transparent: no need for any change to hosts r Isolates collision domains  resulting in higher total max throughput r Can connect different types of Ethernet  because it is a store and forward device r Constrained topology: tree only  all inter-segment traffic concentrated on a single tree  (all multicast traffic forwarded to all LAN’s)

5/31/05CS118/Spring059 Routers: advantages and limitations r Support arbitrary topologies r Efficient support for multicast routing  And can prevent broadcast storms r Require IP address configuration (not plug and play) r More complex data processing than switches r bridges do well in small setting (few hundred hosts), routers are used in large networks

5/31/05CS118/Spring0510 Point to Point Data Link Control r One sender, one receiver, one link  e.g., dialup link, ISDN line r easier than broadcast link:  no Media Access Control  no need for explicit MAC addressing r popular point-to-point DLC protocols:  PPP (point-to-point protocol)  HDLC: High level data link control (Data link used to be considered “high layer” in protocol stack!

5/31/05CS118/Spring0511 PPP Design Requirements [RFC 1661, 1662] r packet framing: encapsulation of network-layer datagram in data link frame  carry data of any network layer protocol (not just IP)  ability to de-multiplex upwards r bit transparency: must carry any bit pattern in data field r error detection r connection liveness: detect, signal link failure to network layer r network layer address negotiation: endpoint can learn/configure each other’s network address Non-requirements r no error correction/recovery r no flow control r out of order delivery OK

5/31/05CS118/Spring0512 PPP Data Frame r Flag: delimiter (framing) r Address: does nothing (only one option) r Control: does nothing; in the future possible multiple control fields r Protocol: upper layer protocol to which frame delivered (eg, PPP-LCP, IP, IPCP, etc) r info: upper layer data being carried r check: cyclic redundancy check for error detection

5/31/05CS118/Spring0513 Byte Stuffing r “data transparency” requirement: data field must be allowed to include flag pattern  Q: is received data or flag? r Define the Control Escape octet as r Sender: adds (“stuffs”) byte after each data byte r Receiver:  followed by : discard first byte, continue data reception  single : flag byte

5/31/05CS118/Spring0514 Byte Stuffing flag byte pattern in data to send flag byte pattern plus stuffed byte in transmitted data

5/31/05CS118/Spring0515 PPP Data Control Protocol Before exchanging network- layer data, data link peers must r configure PPP link (max. frame length, authentication) r learn/configure network layer information  for IP: carry IP Control Protocol (IPCP) msgs (protocol field: 8021) to configure/learn IP address