CSE331: Introduction to Networks and Security Lecture 6 Fall 2002.

Slides:



Advertisements
Similar presentations
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
The Network Layer Functions: Congestion Control
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
1 Switching and Forwarding Bridges and Extended LANs.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
CSE331: Introduction to Networks and Security Lecture 5 Fall 2002.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
1 ELEN Lecture 13 LAN Bridges Routers, Switches, Gateways Network layer -IP Reading: 6.7,
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 18 Introduction to Networks and the Internet.
1 Switching and Forwarding Bridges and Extended LANs.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
COMPUTER NETWORKS.
Gursharan Singh Tatla Transport Layer 16-May
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
29-Aug-154/598N: Computer Networks Switching and Forwarding Outline –Store-and-Forward Switches.
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 7 – February 2, 2010.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 5 outline 5.1 Introduction and services
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
CIS 725 Wireless networks. Low bandwidth High error rates.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
CPS 356: Introduction to Computer Networks Lecture 7: Switching technologies Ch 2.8.2, 3.1, 3.4 Xiaowei Yang
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
1 Flow Identification Assume you want to guarantee some type of quality of service (minimum bandwidth, maximum end-to-end delay) to a user Before you do.
Computer Networks with Internet Technology William Stallings
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
1 Other LANs Token Rings Wireless –Wireless LAN (802.11, WiFi) –Broadband Wireless (802.16) –Bluetooth.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Mozafar Bag-Mohammadi University of Ilam
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
CS440 Computer Networks 1 Packet Switching Neil Tang 10/6/2008.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
Computer Communication and Networking Lecture # 4 by Zainab Malik 1.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Fall, 2001CS 6401 Switching and Routing Outline Routing overview Store-and-Forward switches Virtual circuits vs. Datagram switching.
1 Packet Switching Outline Switching and Forwarding Bridges and Extended LANs.
Chapter 3 Part 1 Switching and Bridging
Chapter 3: Packet Switching (overview)
Distributed Systems CS
Networking Devices.
3. Internetworking (part 1)
Packet Switching Outline Store-and-Forward Switches
MAC Addresses and ARP 32-bit IP address:
Network Layer.
Hubs Hubs are essentially physical-layer repeaters:
Switching and Forwarding Bridges and Extended LANs
Chapter 3 Part 1 Switching and Bridging
Chapter 3 Part 3 Switching and Bridging
Hubs Hubs are essentially physical-layer repeaters:
EEC-484/584 Computer Networks
EE 122: Lecture 7 Ion Stoica September 18, 2001.
Network Architecture for Cyberspace
EEC-484/584 Computer Networks
Chapter 3 Part 3 Switching and Bridging
Packet Switching Outline Store-and-Forward Switches
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Virtual LAN (VLAN).
Presentation transcript:

CSE331: Introduction to Networks and Security Lecture 6 Fall 2002

CSE331 Fall Announcements Project 1 will be handed out this Friday –Form groups of two or three –Mail group members to Aditya –If you can’t find a partner, mail Aditya –Groups should be formed before project is handed out

CSE331 Fall Recap Ethernet –Exponential backoff algorithm

CSE331 Fall Today Finish up link layer – –(briefly) Token Rings Packet Switching

CSE331 Fall Multiple Access Collision Avoidance Sender transmits Request To Send (RTS) –Includes length of data to be transmitted –Timout leads to exponential backoff (like Ethernet) Receiver replies with Clear To Send (CTS) –Echoes the length field Receiver sends ACK of frame to sender Any node that sees CTS cannot transmit for durations specified by length Any node that sees RTS but not CTS is not close enough to the receiver to interfere –It’s free to transmit

CSE331 Fall Wireless Access Points Distribution System – wired network infrastructure Access points – stationary wireless device Roaming wireless Distribution System AP1 AP2 AP3A B C D

CSE331 Fall Selecting an Access Point Active scanning –Node sends a Probe frame –All AP’s within reach reply with a Probe Response frame –Node selects an AP and sends Association Request frame –AP replies with Association Response frame Passive scanning –AP periodically broadcasts Beacon frame –Node sends Association Request

CSE331 Fall Node Mobility B moves from AP1 to AP2 B sends Probes, eventually prefers AP2 to AP1 Sends Association Request Distribution System AP1 AP2 AP3A B C D B

CSE331 Fall Frame Format Ctrl: flags (CTS, RTS, or Data?) Body up to 2312 bytes 4 addresses CtrlLengthAddr1Addr2Addr3Addr4SeqBodyCRC

CSE331 Fall Security Issues Packet sniffing is worse –No physical connection needed –Long range (6 blocks) –Current encryption standards (WEP) not that good –WEP = Wired Equivalent Privacy – Denial of service –Association (and Disassociation) Requests are not authenticated We’ll talk more about these issues in the security part of the course.

CSE331 Fall Token Rings IBM Token Ring (IEEE 802.5) –Support 4Mbps or 16Mbps over twisted pair for about 250 nodes. FDDI = Fiber Distributed Data Interface –It supports 100Mbps for as much as 200km of fiber and 500 nodes (with at most 2km between nodes). Data always flows one direction around the ring.

CSE331 Fall Token Ring MAC The token is a special bit pattern –Sender gets the token –Inserts a frame –Waits for the frame to return –Forwards the token

CSE331 Fall Token Ring Issues THT = Token Hold Time –Prevent one node from hogging the network –Higher THT = better utilization, but not as fair –Typical THT = 10ms for IBM Token Ring What happens when a node fails? –Must ensure that ring is unbroken. –What happens if the token is lost? Nodes elect a monitor station –Periodically sends “status OK” message –Ensures that there is always one token.

CSE331 Fall OSI Reference Model Application Presentation Session Transport Network Data Link Physical Covered so far: Ethernet, , Token Rings Next: Packet switching, IP

CSE331 Fall Packet Switching A switch –Has many inputs and many outputs –Takes packets that arrive on an input and forwards them to the right output Key problem: finite output bandwidth Switch

CSE331 Fall Star Topology Scalability –Large networks can be built by interconnecting switches. –Can connect via high bandwidth point-to-point links = large distances. –Adding a new host to a switch doesn’t necessarily degrade performance.

CSE331 Fall Switching Issues Contention –Arrival rate of packets going to the same output exceeds output capacity –Switch buffers packets Congestion –Switch runs out of buffer space –Forces packets to be dropped

CSE331 Fall Forwarding Decision How does the switch know where to forward a packet? –Looks at the packet header to make the decision Common approaches –Datagram (or connectionless) e.g. IP –Virtual Circuit (or connection-oriented) e.g. Frame Relay, ATM –(Less common) Source routing

CSE331 Fall Datagram approach Every packet contains a complete destination address –Enough information so that any switch can decide where the packet goes. Features of datagram approach –Packets can be sent at anywhere at any time –Sender doesn’t know if network can deliver the packet (or if destination host is available) –Each packet is forwarded independently (two packets may take different routes) –Possible to route around switch or link failures

CSE331 Fall Forwarding Tables D C A G H E F B Port numbers 12 3 Dest. A B C D E F G H Port Forwarding table for switch 2. Provide route information. Easy to determine if network is known (and unchanging)

CSE331 Fall Virtual Circuit Switching D C A G H E F B In Port In VCI Out Port Out VCI Switch VCI = Virtual Circuit Identifier Incoming port + VCI uniquely identify virtual circuit Setup phase constructs circuit table entries at each switch

CSE331 Fall Virtual Circuits Setup phase –Initial setup message contains complete destination address –Intermediate switches (outgoing pass) Allocate an entry in the table Record In Port, Out Port Generate incoming VCI –Intermediate switches (return pass) Get the outgoing VCI from next hop Reply to previous hop with the incoming VCI

CSE331 Fall Virtual Circuit Switching Features Sender must wait for 1 RTT (minimum) before first data is sent Per-packet overhead reduced –After setup, only port # & VCI needed (small) –Compare to full address in datagrams (big) If a switch or link fails, connection is broken –Also, must deallocate old entries to free up space Can allocate resources to the virtual circuit –Buffer space for reliable, in order delivery –Percentage of outgoing bandwidth (QoS)

CSE331 Fall Source Routing Sender knows net topology Indicates sequence of ports as part of packet –(many implementations) Headers of variable (unbounded?) length IP includes source route option D C A G H E F B ,2,1 2,1 1

CSE331 Fall Bridges and LAN Switches ABC XYZ Bridge Bridge accepts LAN frames on one port, outputs them on another. Optimization: only forward appropriate frames Learning bridges – watch incoming source address A at port number X – add entry to forward address A to port X – if no entry, broadcast to all ports – doesn’t work if there are loops! 1 2