11/18/2003-11/20/2003 Ethernet, Hubs/Bridges/Switches, Wireless November 19-20, 2003.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
1 Ethernet EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
5: Link Layer and Local Area Networks5c-1 Hubs, Bridges, and Switches r Used for extending LANs in terms of geographical coverage, number of nodes, administration.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
Lecture 3#1#1 Hubs, Bridges and Switches Lecture 3.
5: DataLink Layer – Ethernet, Hubs and Switches.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
1 Interconnecting LAN segments Repeaters Hubs Bridges Switches.
Lecture 3#1#1 LAN Technologies Completing Lecture 2.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
LAN Technologies. LAN technologies Data link layer so far: –services, error detection/correction, multiple access Next: LAN technologies –addressing –Ethernet.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Chapter 5 outline 5.1 Introduction and services
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Hubs, Bridges, and Switches (oh my) r Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. r Differ.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
Ch 5. Link layer and Local Area Networks from Ch. 5 of Computer Networking by Jim Kurose and Keith W. Ross, Myungchul Kim
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Computer Networking Bridges/Switches, , PPP.
Chapter 5: The Data Link Layer
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
5: DataLink Layer 5a-1 18: Ethernet, Hubs, Bridges, Switches Last Modified: 10/27/2015 1:29:46 PM.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
5: DataLink Layer5c-1 Today r Assign Homework m Ch5 #1,4,5,7,11,12 Due Wednesday October 22 m Ch5 #13-16,18,20 Due Monday, October 27 r Project #2 due.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
5: DataLink Layer5-1 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r Multi-tier design provides.
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
Ch 5. Link layer and Local Area Networks Myungchul Kim
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
LAN Technologies.
Link Layer 5.1 Introduction and services
Computer Communication Networks
Chapter 4 Data Link Layer Switching
Hubs Hubs are essentially physical-layer repeaters:
Chapter 3 Part 1 Switching and Bridging
Point to Point Data Link Control
Mac Addressing, Ethernet, and Interconnections
Hubs Hubs are essentially physical-layer repeaters:
Data Link Issues Relates to Lab 2.
EEC-484/584 Computer Networks
EEC-484/584 Computer Networks
18: Ethernet, Hubs, Bridges, Switches
ECSE-4730: Computer Communication Networks (CCN)
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Link Layer 5.1 Introduction and services
Presentation transcript:

11/18/ /20/2003 Ethernet, Hubs/Bridges/Switches, Wireless November 19-20, 2003

11/18/ /20/2003 Assignments Lab and Homework due Thursday

11/18/ /20/2003 Ethernet cheap $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe’s Ethernet sketch

11/18/ /20/2003 Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern followed by one byte with pattern used to synchronize receiver, sender clock rates

11/18/ /20/2003 Ethernet Frame Structure (more) Addresses: 6 bytes –if adapter receives frame with matching destination address, or with broadcast address (eg ARP packet), it passes data in frame to net-layer protocol –otherwise, adapter discards frame Type: –indicates the higher layer protocol, mostly IP but others may be supported such as Novell IPX and AppleTalk) CRC: –checked at receiver, if error is detected, the frame is simply dropped

11/18/ /20/2003 Unreliable, connectionless service Connectionless: No handshaking between sending and receiving adapter. Unreliable: receiving adapter doesn’t send acks or nacks to sending adapter –stream of datagrams passed to network layer can have gaps –gaps will be filled if app is using TCP –otherwise, app will see the gaps

11/18/ /20/2003 Ethernet CSMA/CD algorithm 1. Adaptor gets datagram from and creates frame 2. If adapter senses channel idle, it starts to transmit frame. If it senses channel busy, waits until channel idle and then transmits 3. If adapter transmits entire frame without detecting another transmission, the adapter is done with frame ! 4. If adapter detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, adapter enters exponential backoff: after the mth collision, adapter chooses a K at random from {0,1,2,…,2 m -1}. Adapter waits K*512 bit times and returns to Step 2

11/18/ /20/2003 Ethernet’s CSMA/CD (more) Jam Signal: make sure all other transmitters are aware of collision; 48 bits; Exponential Backoff: –Goal: adapt retransmission attempts to estimated current load heavy load: random wait will be longer –first collision: choose K from {0,1}; delay is K x 512 bit transmission times –after second collision: choose K from {0,1,2,3}… –after ten collisions, choose K from {0,1,2,3,4,…,1023}

11/18/ /20/2003 Ethernet Technologies: 10Base2 10: 10Mbps; 2: under 200 meters max cable length thin coaxial cable in a bus topology repeaters used to connect up to multiple segments repeater repeats bits it hears on one interface to its other interfaces: physical layer device only! has become a legacy technology

11/18/ /20/ BaseT and 100BaseT 10/100 Mbps rate; latter called “fast ethernet” T stands for Twisted Pair Nodes connect to a hub: “star topology”; 100 m max distance between nodes and hub Hubs are essentially physical-layer repeaters: –bits coming in one link go out all other links –no frame buffering –no CSMA/CD at hub: adapters detect collisions –provides net management functionality hub nodes

11/18/ /20/2003 Manchester encoding Used in 10BaseT, 10Base2 Each bit has a transition Allows clocks in sending and receiving nodes to synchronize to each other –no need for a centralized, global clock among nodes!

11/18/ /20/2003 Gbit Ethernet use standard Ethernet frame format allows for point-to-point links and shared broadcast channels in shared mode, CSMA/CD is used; short distances between nodes to be efficient uses hubs, called here “Buffered Distributors” Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now !

11/18/ /20/2003 Interconnecting LAN segments Hubs Bridges Switches –Remark: switches are essentially multi-port bridges. –What we say about bridges also holds for switches!

11/18/ /20/2003 Interconnecting with hubs Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become one large collision domain –if a node in CS and a node EE transmit at same time: collision Can’t interconnect 10BaseT & 100BaseT

11/18/ /20/2003 Bridges Link layer device –stores and forwards Ethernet frames –examines frame header and selectively forwards frame based on MAC dest address –when frame is to be forwarded on segment, uses CSMA/CD to access segment transparent –hosts are unaware of presence of bridges plug-and-play, self-learning –bridges do not need to be configured

11/18/ /20/2003 Bridges: traffic isolation Bridge installation breaks LAN into LAN segments bridges filter packets: –same-LAN-segment frames not usually forwarded onto other LAN segments –segments become separate collision domains bridge collision domain collision domain = hub = host LAN (IP network) LAN segment

11/18/ /20/2003 Forwarding and Filtering

11/18/ /20/2003 Self learning A bridge has a bridge table entry in bridge table: –(Node LAN Address, Bridge Interface, Time Stamp) –stale entries in table dropped (TTL can be 60 min) bridges learn which hosts can be reached through which interfaces –when frame received, bridge “learns” location of sender: incoming LAN segment –records sender/location pair in bridge table

11/18/ /20/2003 Filtering/Forwarding When bridge receives a frame: index bridge table using MAC dest address if entry found for destination then{ if dest on segment from which frame arrived then drop the frame else forward the frame on interface indicated } else flood

11/18/ /20/2003 Bridge example Suppose C sends frame to D and D replies back with frame to C. Bridge receives frame from from C –notes in bridge table that C is on interface 1 –because D is not in table, bridge sends frame into interfaces 2 and 3 frame received by D

11/18/ /20/2003 Bridge Learning: example D generates frame for C, sends bridge receives frame –notes in bridge table that D is on interface 2 –bridge knows C is on interface 1, so selectively forwards frame to interface 1

11/18/ /20/2003 Interconnection without backbone Not recommended for two reasons ???

11/18/ /20/2003 Backbone configuration Recommended !

11/18/ /20/2003 Bridges Spanning Tree for increased reliability, desirable to have redundant, alternative paths from source to dest with multiple paths, cycles result - bridges may multiply and forward frame forever solution: organize bridges in a spanning tree by disabling subset of interfaces Disabled

11/18/ /20/2003 Bridges vs. Routers both store-and-forward devices –routers: network layer devices (examine network layer headers) –bridges are link layer devices routers maintain routing tables, implement routing algorithms bridges maintain bridge tables, implement filtering, learning and spanning tree algorithms

11/18/ /20/2003 Routers vs. Bridges Bridges + and - + Bridge operation is simpler requiring less packet processing + Bridge tables are self learning - All traffic confined to spanning tree, even when alternative bandwidth is available - Bridges do not offer protection from broadcast storms

11/18/ /20/2003 Routers vs. Bridges Routers + and - + arbitrary topologies can be supported, cycling is limited by TTL counters (and good routing protocols) + provide protection against broadcast storms - require IP address configuration (not plug and play) - require higher packet processing bridges do well in small (few hundred hosts) while routers used in large networks (thousands of hosts)

11/18/ /20/2003 Ethernet Switches Essentially a multi-interface bridge layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-A’ and B-to- B’ simultaneously, no collisions large number of interfaces often: individual hosts, star- connected into switch –Ethernet, but no collisions!

11/18/ /20/2003 Ethernet Switches cut-through switching: frame forwarded from input to output port without awaiting for assembly of entire frame –slight reduction in latency combinations of shared/dedicated, 10/100/1000 Mbps interfaces

11/18/ /20/2003 Not an atypical LAN (IP network) Dedicated Shared

11/18/ /20/2003 Summary comparison

11/18/ /20/2003 Assignments Lab 2

11/18/ /20/2003 IEEE Wireless LAN b –2.4-5 GHz unlicensed radio spectrum –up to 11 Mbps –direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code –widely deployed, using base stations a –5-6 GHz range –up to 54 Mbps g –2.4-5 GHz range –up to 54 Mbps All use CSMA/CA for multiple access All have base-station and ad-hoc network versions

11/18/ /20/2003 Base station approach Wireless host communicates with a base station –base station = access point (AP) Basic Service Set (BSS) (a.k.a. “cell”) contains: –wireless hosts –access point (AP): base station BSSs combined to form distribution system (DS)

11/18/ /20/2003 Ad Hoc Network approach No AP (i.e., base station) wireless hosts communicate with each other –to get packet from wireless host A to B may need to route through wireless hosts X,Y,Z Applications: –“laptop” meeting in conference room, car –interconnection of “personal” devices –battlefield IETF MANET (Mobile Ad hoc Networks) working group

11/18/ /20/2003 IEEE : multiple access Collision if 2 or more nodes transmit at same time CSMA makes sense: –get all the bandwidth if you’re the only one transmitting –shouldn’t cause a collision if you sense another transmission Collision detection doesn’t work: hidden terminal problem

11/18/ /20/2003 IEEE MAC Protocol: CSMA/CA CSMA: sender –if sense channel idle for DISF sec. –then transmit entire frame (no collision detection) –if sense channel busy then binary backoff CSMA receiver –if received OK return ACK after SIFS (ACK is needed due to hidden terminal problem)

11/18/ /20/2003 Collision avoidance mechanisms Problem: –two nodes, hidden from each other, transmit complete frames to base station –wasted bandwidth for long duration ! Solution: –small reservation packets –nodes track reservation interval with internal “network allocation vector” (NAV)

11/18/ /20/2003 Collision Avoidance: RTS-CTS exchange sender transmits short RTS (request to send) packet: indicates duration of transmission receiver replies with short CTS (clear to send) packet –notifying (possibly hidden) nodes hidden nodes will not transmit for specified duration: NAV

11/18/ /20/2003 Collision Avoidance: RTS-CTS exchange RTS and CTS short: –collisions less likely, of shorter duration –end result similar to collision detection IEEE allows: –CSMA –CSMA/CA: reservations – polling from AP

11/18/ /20/2003 A word about Bluetooth Low-power, small radius, wireless networking technology – meters omnidirectional –not line-of-sight infrared Interconnects gadgets GHz unlicensed radio band up to 721 kbps Interference from wireless LANs, digital cordless phones, microwave ovens: –frequency hopping helps MAC protocol supports: –error correction –ARQ Each node has a 12-bit address

11/18/ /20/2003 Point to Point Data Link Control one sender, one receiver, one link: easier than broadcast link: –no Media Access Control –no need for explicit MAC addressing –e.g., dialup link, ISDN line popular point-to-point DLC protocols: –PPP (point-to-point protocol) –HDLC: High level data link control

11/18/ /20/2003 PPP Design Requirements [RFC 1557] packet framing: encapsulation of network-layer datagram in data link frame bit transparency: must carry any bit pattern in the data field error detection (no correction) connection liveness: detect, signal link failure to network layer network layer address negotiation: endpoint can learn/configure each other’s network address

11/18/ /20/2003 PPP non-requirements no error correction/recovery no flow control out of order delivery OK no need to support multipoint links (e.g., polling) Error recovery, flow control, data re-ordering all relegated to higher layers!

11/18/ /20/2003 PPP Data Frame Flag: delimiter (framing) Address: does nothing (only one option) Control: does nothing; in the future possible multiple control fields Protocol: upper layer protocol to which frame delivered (eg, PPP-LCP, IP, IPCP, etc)

11/18/ /20/2003 PPP Data Frame info: upper layer data being carried check: cyclic redundancy check for error detection

11/18/ /20/2003 Byte Stuffing “data transparency” requirement: data field must be allowed to include flag pattern –Q: is received data or flag?

11/18/ /20/2003 Byte Stuffing “data transparency” requirement: data field must be allowed to include flag pattern –Q: is received data or flag? Sender: adds (“stuffs”) extra byte after each data byte Receiver: –two bytes in a row: discard first byte, continue data reception –single : flag byte

11/18/ /20/2003 Byte Stuffing flag byte pattern in data to send flag byte pattern plus stuffed byte in transmitted data

11/18/ /20/2003 PPP Data Control Protocol Before exchanging network-layer data, data link peers must –configure PPP link (max. frame length, authentication) –learn/configure network layer information for IP: carry IP Control Protocol (IPCP) msgs (protocol field: 8021) to configure/learn IP address

11/18/ /20/2003 Asynchronous Transfer Mode: ATM Goal: integrated, end-end transport of carry voice, video, data –meeting timing/QoS requirements of voice, video (versus Internet best-effort model) –“next generation” telephony: technical roots in telephone world –packet-switching (fixed length packets, called “cells”) using virtual circuits

11/18/ /20/2003 ATM architecture

11/18/ /20/2003 ATM: network or link layer? Vision: end-to-end transport: “ATM from desktop to desktop” –ATM is a network technology Reality: used to connect IP backbone routers –“IP over ATM” –ATM as switched link layer, connecting IP routers