VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can.

Slides:



Advertisements
Similar presentations
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Advertisements

IPv4 - The Internet Protocol Version 4
5: Link Layer and Local Area Networks5c-1 Hubs, Bridges, and Switches r Used for extending LANs in terms of geographical coverage, number of nodes, administration.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
Ethernet Switches r layer 2 (frame) forwarding, filtering using LAN addresses r Switching: A-to-B and A’- to-B’ simultaneously, no collisions r large number.
Fundamentals of Computer Networks ECE 478/578 Lecture #3: Encoding and Framing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
The Data Link Layer. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Lecture 3#1#1 Hubs, Bridges and Switches Lecture 3.
5: DataLink Layer – Ethernet, Hubs and Switches.
VLANs (Virtual LANs) CS 158B Elaine Lim Allison Nham.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
Lecture 3#1#1 LAN Technologies Completing Lecture 2.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
PPP, ATM, MPLS EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement: Some slides.
Point to Point protocol (PPP) Point to point, wired data link easier to manage than broadcast link: no Media Access Control Several Data Link Protocols:
HDLC and PPP. The Data Link Layer in the Internet A home personal computer acting as an internet host. Technology like Ethernet cannot provide “high-level”
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
3-1 Last time □ Finished introduction and overview: ♦ Network access and physical media ♦ Internet structure and ISPs ♦ Delay & loss in packet-switched.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Chapter 4: Managing LAN Traffic
Chapter 5 outline 5.1 Introduction and services
Midterm Review - Network Layers. Computer 1Computer 2 2.
1 LAN switching and Bridges CS491G: Computer Networking Lab V. Arun Slides adapted from Liebeherr and El Zarki, and Kurose and Ross.
Introduction 1 Lecture 26 Link Layer (PPP, Virtualization) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
Link Layer 5.1 Introduction and services
Introduction to PPP. Using dial-up modems for packet-oriented- networking (i.e connecting to the internet) requires a data-link layer protocol widely-spread.
Computer Networking Bridges/Switches, , PPP.
Chapter 5: The Data Link Layer
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
Chapter 2 Wide Area Network Technologies. What is a WAN ? The set of connecting links between local area networks These links can be made using: –Public.
CS 4396 Computer Networks Lab
1 Physical and Data Link Layer Computer Network System Sirak Kaewjamnong.
Chapter 11 Data Link Control
Ethernet Switches r layer 2 (frame) forwarding, filtering using LAN addresses r Switching: A-to-B and A’- to-B’ simultaneously, no collisions r large number.
5: DataLink Layer5-1 Point to Point Data Link Control r one sender, one receiver, one link: easier than broadcast link: m no Media Access Control m no.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
Ch. 15 Connecting LANs.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
+ PPP Protocol. + Outline WAN Data Link Layer protocols Point-to-point serial communications Transmission Synchronization HDLC.
Data Communications Data Link Layer.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
Lecture 3 #1#1 Hubs, Bridges and Switches Lecture 3.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Chapter 5 Link Layer A note on the use of these ppt slides:
HDLC and PPP.
The University of Adelaide, School of Computer Science
Announcement Written Homework Assignment 2: Due Fri. November 18, 11:59pm Programming Assignment 3: Due Mon. Nov ember 14, 11:59pm Group of three students.
CS 5565 Network Architecture and Protocols
Networking Devices.
OSI Protocol Stack Given the post man exemple.
Part 5: Link Layer Technologies
Hubs Hubs are essentially physical-layer repeaters:
Virtual LANs.
Point to Point Data Link Control
Hubs Hubs are essentially physical-layer repeaters:
Network Virtualization
Data Link Issues Relates to Lab 2.
Instructor Mazhar Hussain
Review of Internet Protocols Link Layer
Presentation transcript:

VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can be configured to define multiple virtual LANS over single physical LAN infrastructure. Virtual Local Area Network … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) 15 … Electrical Engineering (VLAN ports 1-8) … … Computer Science (VLAN ports 9-16) … operates as multiple virtual switches

Port-based VLAN … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) 15 … traffic isolation: frames to/from ports 1-8 can only reach ports 1- 8 – can also define VLAN based on MAC addresses of endpoints, rather than switch port  dynamic membership: ports can be dynamically assigned among VLANs router  forwarding between VLANS: done via routing (just as with separate switches)  in practice vendors sell combined switches plus routers

VLANS spanning multiple switches trunk port: carries frames between VLANS defined over multiple physical switches – frames forwarded within VLAN between switches can’t be vanilla frames (must carry VLAN ID info) – 802.1q protocol adds/removed additional header fields for frames forwarded between trunk ports … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) 15 … Ports 2,3,5 belong to EE VLAN Ports 4,6,7,8 belong to CS VLAN

Type 2-byte Tag Protocol Identifier (value: 81-00) Tag Control Information (12 bit VLAN ID field, 3 bit priority field like IP TOS) Recomputed CRC 802.1Q VLAN frame format frame 802.1Q frame

IP header IPsec header Secure payload IP header IPsec header Secure payload IP header IPsec header Secure payload IP header payload IP header payload headquarters branch office salesperson in hotel Public Internet laptop w/ IPsec Router w/ IPv4 and IPsec Router w/ IPv4 and IPsec Virtual Private Network (VPN)

Point to Point Data Link Control one sender, one receiver, one link: easier than broadcast link: – no Media Access Control – no need for explicit MAC addressing – e.g., dialup link, ISDN line popular point-to-point DLC protocols: – PPP (point-to-point protocol) – HDLC: High level data link control (Data link used to be considered “high layer” in protocol stack!

PPP Design Requirements [RFC 1557] packet framing: encapsulation of network-layer datagram in data link frame – carry network layer data of any network layer protocol (not just IP) at same time – ability to demultiplex upwards bit transparency: must carry any bit pattern in the data field error detection (no correction) connection liveness: detect, signal link failure to network layer network layer address negotiation: endpoint can learn/configure each other’s network address

PPP non-requirements no error correction/recovery no flow control out of order delivery OK no need to support multipoint links (e.g., polling) Error recovery, flow control, data re-ordering all relegated to higher layers!

PPP Data Frame Flag: delimiter (framing) Address: does nothing (only one option) Control: does nothing; in the future possible multiple control fields Protocol: upper layer protocol to which frame delivered (e.g., PPP-LCP, IP, IPCP, etc)

PPP Data Frame info: upper layer data being carried check: cyclic redundancy check for error detection

Byte Stuffing “data transparency” requirement: data field must be allowed to include flag pattern – Q: is received data or flag? Sender: adds (“stuffs”) extra byte after each data byte Receiver: – two bytes in a row: discard first byte, continue data reception – single : flag byte

Byte Stuffing flag byte pattern in data to send flag byte pattern plus stuffed byte in transmitted data

NRZI Encoded Flag Makes Synchronization Easy! HDLC: High-Level Data Link Control HDLC is a bit-oriented protocol Bit-Stuffing: Insert a zero after five consecutive ones. So six ones in a row means it must be a flag.